MY181899A - Method of providing trusted application services - Google Patents
Method of providing trusted application servicesInfo
- Publication number
- MY181899A MY181899A MYPI2010700032A MYPI2010700032A MY181899A MY 181899 A MY181899 A MY 181899A MY PI2010700032 A MYPI2010700032 A MY PI2010700032A MY PI2010700032 A MYPI2010700032 A MY PI2010700032A MY 181899 A MY181899 A MY 181899A
- Authority
- MY
- Malaysia
- Prior art keywords
- trusted
- application
- platform module
- trusted application
- measured
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Trusted platform module is a processor that stores cryptographic keys according to a specification. This invention proposes a method for software application to access trusted platform module function. Trusted application service and software application is configured (306) to be measured to check the integrity of the trusted application service and software application. Measured trusted application service and system configuration is stored in trusted storage (310). The measured information is compared whenever a user login or application is used. Hence, a user and application is authenticated with trusted platform module. Fig. 1
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010700032A MY181899A (en) | 2010-05-26 | 2010-05-26 | Method of providing trusted application services |
PCT/MY2010/000328 WO2011149329A1 (en) | 2010-05-26 | 2010-12-20 | Method of providing trusted application services |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010700032A MY181899A (en) | 2010-05-26 | 2010-05-26 | Method of providing trusted application services |
Publications (1)
Publication Number | Publication Date |
---|---|
MY181899A true MY181899A (en) | 2021-01-12 |
Family
ID=45004147
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2010700032A MY181899A (en) | 2010-05-26 | 2010-05-26 | Method of providing trusted application services |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY181899A (en) |
WO (1) | WO2011149329A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116340956A (en) * | 2023-05-25 | 2023-06-27 | 国网上海能源互联网研究院有限公司 | Trusted protection optimization method and device for electric embedded terminal equipment |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105308610A (en) * | 2013-03-26 | 2016-02-03 | 爱迪德技术有限公司 | Method and system for platform and user application security on a device |
CN110647740B (en) * | 2018-06-27 | 2023-12-05 | 复旦大学 | Container trusted starting method and device based on TPM |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7716494B2 (en) * | 2004-07-15 | 2010-05-11 | Sony Corporation | Establishing a trusted platform in a digital processing system |
US7870399B2 (en) * | 2006-02-10 | 2011-01-11 | Arxan Defense Systems | Software trusted platform module and application security wrapper |
US8752130B2 (en) * | 2007-12-21 | 2014-06-10 | Samsung Electronics Co., Ltd. | Trusted multi-stakeholder environment |
US9559842B2 (en) * | 2008-09-30 | 2017-01-31 | Hewlett Packard Enterprise Development Lp | Trusted key management for virtualized platforms |
WO2010080771A1 (en) * | 2009-01-07 | 2010-07-15 | Telcordia Technologies, Inc. | System, method, and computer program products for enabling trusted access to information in a diverse service environment |
-
2010
- 2010-05-26 MY MYPI2010700032A patent/MY181899A/en unknown
- 2010-12-20 WO PCT/MY2010/000328 patent/WO2011149329A1/en active Application Filing
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116340956A (en) * | 2023-05-25 | 2023-06-27 | 国网上海能源互联网研究院有限公司 | Trusted protection optimization method and device for electric embedded terminal equipment |
CN116340956B (en) * | 2023-05-25 | 2023-08-08 | 国网上海能源互联网研究院有限公司 | Trusted protection optimization method and device for electric embedded terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2011149329A1 (en) | 2011-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2013001603A (en) | Role-based content rendering. | |
BR112014019847A8 (en) | GUARANTEED SECURE ACCESS TO A LOCATION DISCOVERY SERVER FOR A MOBILE DEVICE | |
GB2466071B (en) | Associating a signing key with a software component of a computing platform | |
SG190128A1 (en) | Authentication federation system and id provider device | |
BR112013012964A2 (en) | method for authorizing access to protected content | |
GB2525361A (en) | User authentication | |
MX336148B (en) | Social data overlay. | |
WO2011083343A3 (en) | System and method of enforcing a computer policy | |
MX2009007995A (en) | Method and apparatus for securing location information and access control using the location information. | |
WO2016077017A3 (en) | Trusted platform module certification and attestation utilizing an anonymous key system | |
WO2013002833A3 (en) | Binding of cryptographic content using unique device characteristics with server heuristics | |
WO2014039898A3 (en) | Human workflow aware recommendation engine | |
MX2011010848A (en) | Systems and methods for assessing the legitimacy of a transportation provider. | |
GB201302293D0 (en) | Protecting packages from tampering | |
WO2012092423A3 (en) | Extending data confidentiality into a player application | |
DE602006004457D1 (en) | SIGNATURE FOR ACCESS TOKENS | |
AR076308A1 (en) | VALIDATION AND / OR AUTHENTICATION OF A DEVICE FOR COMMUNICATION WITH A NETWORK | |
GB2495448A (en) | Security model for workflows aggregating third party secure services | |
MX345061B (en) | Method, one or more computer-readable non-transitory storage media and a device, in particular relating to computing resources and/or mobile-device-based trust computing. | |
WO2010046436A3 (en) | Method and apparatus for secure software platform access | |
MX352442B (en) | Method relating to presence granularity with augmented reality. | |
WO2014081867A3 (en) | Secure data transmission | |
WO2015056010A3 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
GB2472169A (en) | System and method for providing a system management command | |
DE602008003120D1 (en) | SECURE LOGIN LOG |