Chained security systems

A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each hav...

Full description

Saved in:
Bibliographic Details
Main Authors Brandwine, Eric Jason, Ilac, Cristian M, Campagna, Matthew John, Wilson, Matthew Shawn, Rubin, Gregory Alan
Format Patent
LanguageEnglish
Published 14.04.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each having its own cryptographic boundary, secure storage, and trusted computing capabilities. A trusted, limited subsystem can handle the administrative tasks for virtual machines running on the main system of a host computing device. The limited system can receive a certificate from a certificate authority, and can act as a certificate authority to provide credentials to the main system. Upon an attestation request, the subsystems can provide attestation information using the respective credentials as well as the certificate chain. An entity having the appropriate credentials can determine the state of the system from the response and verify the state is as expected.
Bibliography:Application Number: US201916237703