CN111095899B - 针对可信执行环境的分布式密钥管理 - Google Patents
针对可信执行环境的分布式密钥管理 Download PDFInfo
- Publication number
- CN111095899B CN111095899B CN201980004164.2A CN201980004164A CN111095899B CN 111095899 B CN111095899 B CN 111095899B CN 201980004164 A CN201980004164 A CN 201980004164A CN 111095899 B CN111095899 B CN 111095899B
- Authority
- CN
- China
- Prior art keywords
- tee
- tees
- node
- key
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
- H04L2209/127—Trusted platform modules [TPM]
Abstract
Description
Claims (10)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2019/084530 WO2019137565A2 (en) | 2019-04-26 | 2019-04-26 | Distributed key management for trusted execution environments |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111095899A CN111095899A (zh) | 2020-05-01 |
CN111095899B true CN111095899B (zh) | 2021-12-24 |
Family
ID=67219326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201980004164.2A Active CN111095899B (zh) | 2019-04-26 | 2019-04-26 | 针对可信执行环境的分布式密钥管理 |
Country Status (11)
Country | Link |
---|---|
US (3) | US10715339B1 (zh) |
EP (1) | EP3643041B1 (zh) |
JP (1) | JP6869374B2 (zh) |
KR (1) | KR102194077B1 (zh) |
CN (1) | CN111095899B (zh) |
AU (1) | AU2019207312B2 (zh) |
CA (1) | CA3061268C (zh) |
ES (1) | ES2872101T3 (zh) |
PL (1) | PL3643041T3 (zh) |
SG (1) | SG11201909855YA (zh) |
WO (1) | WO2019137565A2 (zh) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11528258B2 (en) * | 2018-11-02 | 2022-12-13 | Intel Corporation | System and apparatus for data confidentiality in distributed ledger |
US11489672B2 (en) * | 2018-11-06 | 2022-11-01 | International Business Machines Corporation | Verification of conditions of a blockchain transaction |
AU2019207312B2 (en) | 2019-04-26 | 2020-06-25 | Advanced New Technologies Co., Ltd. | Distributed key management for trusted execution environments |
CN110971408A (zh) * | 2019-12-25 | 2020-04-07 | 上海沄界信息科技有限公司 | 基于区块链网络的tee节点认证方法及认证系统 |
WO2021186754A1 (ja) * | 2020-03-17 | 2021-09-23 | 株式会社モールサービス | 情報処理システム、情報処理方法、情報処理プログラム、秘密分散システム、秘密分散方法、秘密分散プログラム、秘密計算システム、秘密計算方法、及び、秘密計算プログラム |
CN111092727B (zh) * | 2020-03-18 | 2020-07-17 | 支付宝(杭州)信息技术有限公司 | 共享集群密钥的方法及装置 |
CN111614686B (zh) * | 2020-05-26 | 2023-01-17 | 牛津(海南)区块链研究院有限公司 | 一种密钥管理方法、控制器及系统 |
CN111885050B (zh) * | 2020-07-21 | 2022-01-11 | 腾讯科技(深圳)有限公司 | 基于区块链网络的数据存储方法、装置、相关设备及介质 |
CN111881474B (zh) * | 2020-07-24 | 2023-09-15 | 杭州弦冰科技有限公司 | 基于可信计算环境的私钥管理方法和装置 |
CN111680305B (zh) * | 2020-07-31 | 2023-04-18 | 支付宝(杭州)信息技术有限公司 | 一种基于区块链的数据处理方法、装置及设备 |
US11601262B2 (en) * | 2020-10-15 | 2023-03-07 | Dell Products L.P. | Distributed key management system |
CN112231652B (zh) * | 2020-10-28 | 2022-02-22 | 百度在线网络技术(北京)有限公司 | 可信环境远程验证方法、装置、设备、系统及介质 |
CN112448819A (zh) * | 2020-11-06 | 2021-03-05 | 支付宝(杭州)信息技术有限公司 | 物联网设备的校验、签名文件的生成方法及装置 |
US20220198070A1 (en) * | 2020-12-22 | 2022-06-23 | International Business Machines Corporation | Provisioning secure/encrypted virtual machines in a cloud infrastructure |
US11849028B2 (en) * | 2021-01-13 | 2023-12-19 | Tata Consultancy Services Limited | Method and system for secure IoT device onboarding using a blockchain network |
CN113037499B (zh) * | 2021-03-15 | 2024-01-05 | 杭州链网科技有限公司 | 一种区块链加密通讯方法及系统 |
US11416450B1 (en) | 2021-03-16 | 2022-08-16 | EMC IP Holding Company LLC | Clustering data management entities distributed across a plurality of processing nodes |
CN113688394B (zh) * | 2021-06-07 | 2023-08-25 | 重庆大学 | 安全可信执行环境下的基于区块链的外包计算系统及方法 |
US11809607B2 (en) | 2021-08-05 | 2023-11-07 | International Business Machines Corporation | Customization of multi-part metadata of a secure guest |
US11829495B2 (en) * | 2021-08-05 | 2023-11-28 | International Business Machines Corporation | Confidential data provided to a secure guest via metadata |
US20230070163A1 (en) * | 2021-09-09 | 2023-03-09 | International Business Machines Corporation | Prevention of race conditions in a dual-server storage system for generation of encryption key |
CN113869901B (zh) * | 2021-12-02 | 2022-05-10 | 腾讯科技(深圳)有限公司 | 密钥生成方法、装置、计算机可读存储介质及计算机设备 |
WO2023099895A1 (en) * | 2021-12-02 | 2023-06-08 | Royal Holloway University Of London | A method and system for securely sharing data |
CN114553590B (zh) * | 2022-03-17 | 2023-08-22 | 抖音视界有限公司 | 数据传输方法及相关设备 |
US20230353358A1 (en) * | 2022-04-27 | 2023-11-02 | Dell Products L.P. | Disaggregated key management in a distributed system |
CN114584307B (zh) * | 2022-05-07 | 2022-09-02 | 腾讯科技(深圳)有限公司 | 一种可信密钥管理方法、装置、电子设备和存储介质 |
JP2023168952A (ja) * | 2022-05-16 | 2023-11-29 | 株式会社日立製作所 | データ管理システム及びデータ管理方法 |
CN114978730B (zh) * | 2022-05-27 | 2023-09-15 | 深圳铸泰科技有限公司 | 一种感知态势处物联网安全检测方法及存储介质 |
CN115134145B (zh) * | 2022-06-28 | 2023-10-20 | 蚂蚁区块链科技(上海)有限公司 | 区块链系统中的共识方法、装置、计算设备和计算机可读存储介质 |
CN115484031B (zh) * | 2022-09-13 | 2024-03-08 | 山东大学 | 基于sgx的无可信第三方云存储密文去重方法及系统 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106454528A (zh) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | 基于可信执行环境的业务处理方法和客户端 |
CN107395349A (zh) * | 2017-08-16 | 2017-11-24 | 深圳国微技术有限公司 | 一种基于自认证公钥体制的区块链网络密钥分发方法 |
CN107623569A (zh) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | 基于秘密共享技术的区块链密钥托管和恢复方法、装置 |
CN107919954A (zh) * | 2017-10-20 | 2018-04-17 | 浙江大学 | 一种基于sgx的区块链用户密钥保护方法和装置 |
Family Cites Families (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9690941B2 (en) * | 2011-05-17 | 2017-06-27 | Microsoft Technology Licensing, Llc | Policy bound key creation and re-wrap service |
US9215249B2 (en) * | 2012-09-29 | 2015-12-15 | Intel Corporation | Systems and methods for distributed trust computing and key management |
US8924727B2 (en) * | 2012-10-12 | 2014-12-30 | Intel Corporation | Technologies labeling diverse content |
US9141769B1 (en) * | 2013-02-08 | 2015-09-22 | Amazon Technologies, Inc. | Secure transfer and use of secret material in a shared environment |
KR101687275B1 (ko) * | 2013-03-14 | 2016-12-16 | 인텔 코포레이션 | 공개 클라우드에서의 신뢰 데이터 프로세싱 |
EP3036680B1 (en) * | 2013-08-21 | 2018-07-18 | Intel Corporation | Processing data privately in the cloud |
US9509502B2 (en) * | 2014-03-13 | 2016-11-29 | Intel Corporation | Symmetric keying and chain of trust |
US20160036826A1 (en) * | 2014-07-29 | 2016-02-04 | Mcafee, Inc. | Secure content packaging using multiple trusted execution environments |
US9467296B2 (en) * | 2014-08-29 | 2016-10-11 | Intel Corporation | Virally distributable trusted messaging |
WO2016137224A1 (ko) * | 2015-02-24 | 2016-09-01 | 엘지전자 주식회사 | 무선 통신 시스템에서 데이터를 전송하는 방법 및 장치 |
US10304143B2 (en) * | 2016-05-05 | 2019-05-28 | Lance Timothy Kasper | Consensus system for manipulation resistant digital record keeping |
US9830480B2 (en) * | 2015-05-27 | 2017-11-28 | Google Llc | Policies for secrets in trusted execution environments |
US9842065B2 (en) * | 2015-06-15 | 2017-12-12 | Intel Corporation | Virtualization-based platform protection technology |
JP6951329B2 (ja) * | 2015-10-14 | 2021-10-20 | ケンブリッジ ブロックチェーン,エルエルシー | デジタルアイデンティティを管理するためのシステム及び方法 |
CA3008705C (en) * | 2015-12-14 | 2020-03-10 | Coinplug, Inc. | System for issuing public certificate on basis of block chain, and method for issuing public certificate on basis of block chain by using same |
US10063529B2 (en) * | 2016-03-28 | 2018-08-28 | Accenture Global Solutions Limited | Secure 3D model sharing using distributed ledger |
US10521775B2 (en) * | 2016-04-18 | 2019-12-31 | R3 Ltd. | Secure processing of electronic transactions by a decentralized, distributed ledger system |
US11829998B2 (en) * | 2016-06-07 | 2023-11-28 | Cornell University | Authenticated data feed for blockchains |
US10417217B2 (en) * | 2016-08-05 | 2019-09-17 | Chicago Mercantile Exchange Inc. | Systems and methods for blockchain rule synchronization |
EP3337119B1 (en) * | 2016-12-13 | 2019-09-11 | Nxp B.V. | Updating and distributing secret keys in a distributed network |
US10341116B2 (en) * | 2016-12-28 | 2019-07-02 | Intel Corporation | Remote attestation with hash-based signatures |
US20180183586A1 (en) * | 2016-12-28 | 2018-06-28 | Intel Corporation | Assigning user identity awareness to a cryptographic key |
US11438155B2 (en) * | 2017-01-24 | 2022-09-06 | Microsoft Technology Licensing, Llc | Key vault enclave |
US20180225661A1 (en) * | 2017-02-07 | 2018-08-09 | Microsoft Technology Licensing, Llc | Consortium blockchain network with verified blockchain and consensus protocols |
US10691793B2 (en) * | 2017-02-20 | 2020-06-23 | AlphaPoint | Performance of distributed system functions using a trusted execution environment |
CN106941487B (zh) * | 2017-02-24 | 2021-01-05 | 创新先进技术有限公司 | 一种数据发送方法及装置 |
US10397005B2 (en) * | 2017-03-31 | 2019-08-27 | Intel Corporation | Using a trusted execution environment as a trusted third party providing privacy for attestation |
WO2018189658A1 (en) * | 2017-04-11 | 2018-10-18 | nChain Holdings Limited | Secure transfer between blockchains |
US10742393B2 (en) | 2017-04-25 | 2020-08-11 | Microsoft Technology Licensing, Llc | Confidentiality in a consortium blockchain network |
GB201707168D0 (en) * | 2017-05-05 | 2017-06-21 | Nchain Holdings Ltd | Computer-implemented system and method |
US10671733B2 (en) * | 2017-05-19 | 2020-06-02 | International Business Machines Corporation | Policy enforcement via peer devices using a blockchain |
EP3639468B1 (en) * | 2017-06-14 | 2024-03-20 | nChain Licensing AG | Systems and methods for avoiding or reducing cryptographically stranded resources on a blockchain network |
US10558812B2 (en) * | 2017-06-21 | 2020-02-11 | Microsoft Technology Licensing, Llc | Mutual authentication with integrity attestation |
CN107342858B (zh) * | 2017-07-05 | 2019-09-10 | 武汉凤链科技有限公司 | 一种基于可信环境的智能合约保护方法和系统 |
US10567359B2 (en) * | 2017-07-18 | 2020-02-18 | International Business Machines Corporation | Cluster of secure execution platforms |
US10554634B2 (en) * | 2017-08-18 | 2020-02-04 | Intel Corporation | Techniques for shared private data objects in a trusted execution environment |
US10541804B2 (en) * | 2017-08-18 | 2020-01-21 | Intel Corporation | Techniques for key provisioning in a trusted execution environment |
CN107590738A (zh) * | 2017-08-24 | 2018-01-16 | 阿里巴巴集团控股有限公司 | 选择共识节点的处理方法、装置及服务器 |
US10460283B2 (en) * | 2017-09-13 | 2019-10-29 | Vijay Madisetti | Smart contract optimization for multiparty service or product ordering system |
US20190095879A1 (en) * | 2017-09-26 | 2019-03-28 | Cornell University | Blockchain payment channels with trusted execution environments |
TW201923639A (zh) * | 2017-10-11 | 2019-06-16 | 美商劍橋區塊鏈公司 | 用於管理數位身份之間的關係的系統和方法 |
US11943368B2 (en) * | 2017-11-03 | 2024-03-26 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment based on chain of trust including platform |
US20190140846A1 (en) * | 2017-11-03 | 2019-05-09 | Microsoft Technology Licensing, Llc | Provisioning trusted execution environment(s) based on chain of trust including platform |
US20190158275A1 (en) * | 2017-11-22 | 2019-05-23 | Michael Beck | Digital containers for smart contracts |
US11244309B2 (en) * | 2017-11-22 | 2022-02-08 | Cornell University | Real-time cryptocurrency exchange using trusted hardware |
US10735450B2 (en) * | 2017-11-30 | 2020-08-04 | Intel Corporation | Trust topology selection for distributed transaction processing in computing environments |
US11288740B2 (en) * | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
US11126699B2 (en) * | 2018-02-07 | 2021-09-21 | Nec Corporation | Replica trusted execution environment: enabling seamless replication of trusted execution environment (TEE)-based enclaves in the cloud |
US11218324B2 (en) * | 2018-04-05 | 2022-01-04 | Ares Technologies, Inc. | Systems and methods authenticating a digitally signed assertion using verified evaluators |
US11615060B2 (en) * | 2018-04-12 | 2023-03-28 | ISARA Corporation | Constructing a multiple entity root of trust |
US11138132B2 (en) * | 2018-06-20 | 2021-10-05 | Intel Corporation | Technologies for secure I/O with accelerator devices |
US11057366B2 (en) * | 2018-08-21 | 2021-07-06 | HYPR Corp. | Federated identity management with decentralized computing platforms |
US10270770B1 (en) * | 2018-08-23 | 2019-04-23 | Xage Security, Inc. | Generic computing device attestation and enrollment |
WO2020057757A1 (en) * | 2018-09-21 | 2020-03-26 | NEC Laboratories Europe GmbH | Method for signing a new block in a decentralized blockchain consensus network |
US10708247B2 (en) | 2018-09-27 | 2020-07-07 | Intel Corporation | Technologies for providing secure utilization of tenant keys |
GB201816837D0 (en) * | 2018-10-16 | 2018-11-28 | Microsoft Technology Licensing Llc | Database management |
RU2724181C1 (ru) | 2018-11-07 | 2020-06-22 | Алибаба Груп Холдинг Лимитед | Упрощение консенсуса в цепочках блоков по принципу практичной отказоустойчивости на основе византийского соглашения и синхронизации узлов |
AU2018348322C1 (en) | 2018-11-27 | 2020-06-25 | Advanced New Technologies Co., Ltd. | Asymmetric key management in consortium blockchain networks |
EP3563329B1 (en) * | 2018-12-13 | 2022-02-09 | Advanced New Technologies Co., Ltd. | Off-chain smart contract service based on trusted execution environment |
US10936723B2 (en) * | 2019-03-27 | 2021-03-02 | Intel Corporation | Fast and secure protocol to bootstrap a blockchain by restoring the blockchain state using trusted execution environment |
AU2019207312B2 (en) | 2019-04-26 | 2020-06-25 | Advanced New Technologies Co., Ltd. | Distributed key management for trusted execution environments |
-
2019
- 2019-04-26 AU AU2019207312A patent/AU2019207312B2/en active Active
- 2019-04-26 CN CN201980004164.2A patent/CN111095899B/zh active Active
- 2019-04-26 ES ES19739185T patent/ES2872101T3/es active Active
- 2019-04-26 KR KR1020197032096A patent/KR102194077B1/ko active IP Right Grant
- 2019-04-26 EP EP19739185.7A patent/EP3643041B1/en active Active
- 2019-04-26 CA CA3061268A patent/CA3061268C/en active Active
- 2019-04-26 WO PCT/CN2019/084530 patent/WO2019137565A2/en unknown
- 2019-04-26 PL PL19739185T patent/PL3643041T3/pl unknown
- 2019-04-26 JP JP2019559274A patent/JP6869374B2/ja active Active
- 2019-04-26 SG SG11201909855Y patent/SG11201909855YA/en unknown
- 2019-10-31 US US16/671,024 patent/US10715339B1/en active Active
-
2020
- 2020-06-04 US US16/893,122 patent/US11038700B2/en active Active
-
2021
- 2021-06-14 US US17/347,037 patent/US11356285B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106454528A (zh) * | 2015-08-07 | 2017-02-22 | 阿里巴巴集团控股有限公司 | 基于可信执行环境的业务处理方法和客户端 |
CN107395349A (zh) * | 2017-08-16 | 2017-11-24 | 深圳国微技术有限公司 | 一种基于自认证公钥体制的区块链网络密钥分发方法 |
CN107623569A (zh) * | 2017-09-30 | 2018-01-23 | 矩阵元技术(深圳)有限公司 | 基于秘密共享技术的区块链密钥托管和恢复方法、装置 |
CN107919954A (zh) * | 2017-10-20 | 2018-04-17 | 浙江大学 | 一种基于sgx的区块链用户密钥保护方法和装置 |
Non-Patent Citations (1)
Title |
---|
基于TEE的移动密钥管理技术研究;张艳丽;《中国优秀硕士学位论文全文数据库 (信息科技辑)》;20180315;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111095899A (zh) | 2020-05-01 |
US20200304319A1 (en) | 2020-09-24 |
PL3643041T3 (pl) | 2021-09-06 |
JP2020524421A (ja) | 2020-08-13 |
US10715339B1 (en) | 2020-07-14 |
EP3643041A2 (en) | 2020-04-29 |
CA3061268A1 (en) | 2019-07-18 |
ES2872101T3 (es) | 2021-11-02 |
SG11201909855YA (en) | 2019-11-28 |
WO2019137565A3 (en) | 2020-03-12 |
US20210306164A1 (en) | 2021-09-30 |
KR20200126320A (ko) | 2020-11-06 |
JP6869374B2 (ja) | 2021-05-12 |
WO2019137565A2 (en) | 2019-07-18 |
KR102194077B1 (ko) | 2020-12-23 |
CA3061268C (en) | 2020-09-22 |
US11356285B2 (en) | 2022-06-07 |
AU2019207312B2 (en) | 2020-06-25 |
US11038700B2 (en) | 2021-06-15 |
EP3643041B1 (en) | 2021-03-10 |
EP3643041A4 (en) | 2020-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111095899B (zh) | 针对可信执行环境的分布式密钥管理 | |
CN111095256B (zh) | 在可信执行环境中安全地执行智能合约操作 | |
TWI725655B (zh) | 用於在可信執行環境中執行子邏輯代碼的程式執行和資料證明的方法、設備和系統 | |
US11095629B2 (en) | Retrieving access data for blockchain networks using highly available trusted execution environments | |
CN111066286B (zh) | 使用高可用性的可信执行环境检索区块链网络的公共数据 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200927 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Innovative advanced technology Co.,Ltd. Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant before: Advanced innovation technology Co.,Ltd. Effective date of registration: 20200927 Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands Applicant after: Advanced innovation technology Co.,Ltd. Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands Applicant before: Alibaba Group Holding Ltd. |
|
TA01 | Transfer of patent application right | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40029519 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |