WO2011126357A1 - A method and system for a remote attestation in a trusted foundation platform - Google Patents

A method and system for a remote attestation in a trusted foundation platform Download PDF

Info

Publication number
WO2011126357A1
WO2011126357A1 PCT/MY2010/000192 MY2010000192W WO2011126357A1 WO 2011126357 A1 WO2011126357 A1 WO 2011126357A1 MY 2010000192 W MY2010000192 W MY 2010000192W WO 2011126357 A1 WO2011126357 A1 WO 2011126357A1
Authority
WO
WIPO (PCT)
Prior art keywords
hash list
platform
trusted
trust
hash
Prior art date
Application number
PCT/MY2010/000192
Other languages
French (fr)
Inventor
Abd Aziz Norazah
Mazalan Lucyantie
Azzudin Parman Mohd
Muzairie Abdul Mutalib Abdul
Shahnim Khalid Putri
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Publication of WO2011126357A1 publication Critical patent/WO2011126357A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

A method and system (100) for providing a remote attestation in a trusted foundation platform through the use of a trust hash list. The system comprising at least one foundation server (101), at least one trusted certificate authority (102), at least one client platform (104) and at least one application server (103). The at least one foundation server (101) having means for creating at least one hash list and maintaining the at least one hash list. The at least one trusted certificate authority (102) having means for protecting integrity of a trust hash list through a certification process available in an installation media package. The at least one client platform (104) having means for installing a trusted package platform and booting the trust hash list. The at least one application server (103) having means for executing the remote attestation process.

Description

A METHOD AND SYSTEM FOR A REMOTE ATTESTATION IN A TRUSTED
FOUNDATION PLATFORM
FIELD OF INVENTION
The present invention relates to a method and a system for providing a remote attestation in a trusted foundation platform through the use of a trust hash list.
BACKGROUND ART
Existing computing platforms stand under various security problems because of the weaknesses in the complexity of the architectural of the configuration of the hardware and software. Thus, Trusted Computing Group (TCG) which develops trusted computing technology came out with a new approach of computing platforms in order to enhance the security of the hardware and software building block.
Remote attestation is recommended as an essential feature in Trusted Platform Module (TPM). Remote attestation allows changes to the user's computing platform to be detected by authorized parties wherein the hardware generates a certificate which states the type of software which is currently running. The said computer platform then presents the certificate to a remote party as a proof that the software has not been tampered with. In addition, remote attestation is usually combined with public-key encryption which allows information sent to be read by the programs that presented and requested the attestation and not by a third party (i.e. an eavesdropper).
In general, attestation is a process of assuring that information is accurate and is critical for the trusted platform. If a system is not able to attest the accuracy of that information, then the trust to the platform does not exist. Attestation is closely related to authentication. In a networked environment, anonymous authentication access would facilitate the security mechanism. The authentication concept performed by the access requestor requires an access to the facilities without necessarily revealing their identities to external parties. This requirement stems from the possible need for each individual to maintain some degree of plausible deniability. One of the approaches to perform this requirement is by using protocols proposed by the said Trusted Computing Group.
The protocol of remote attestation implementation is necessary in order to guarantee the trustworthiness of trusted platform as well as vouching the accuracy of the information and protecting the privacy of the host platform.
The approach of the present invention is an enhanced system and protocol for remote attestation which guarantees the trustworthiness and privacy of remote platform. The present invention involves the creation of the trust hash list.
The subject matter claimed herein is not limited to embodiments that solve any disadvantages or that operate only in environments such as those described above. Rather, this background is only provided to illustrate one exemplary technology area where some embodiments described herein may be practice.
SUMMARY OF INVENTION
One aspect of the present invention is a method for providing a remote attestation in a trusted foundation platform through the use of a trust hash list. The method comprising the steps of creating at least one hash list (200), maintaining the at least one hash list (300), protecting integrity of a trust hash list through a certification process available in an installation media package (400), installing a trusted package platform at a client platform (500), booting the trust hash list into the client platform (600) and executing the remote attestation process (700). The method for maintaining the at least one hash list further comprises the steps of storing the created hash list (302), comparing* the hash list with an untrust hash list through a hash operation (304) and removing blaek list which exists in the hash list to obtain a trust hash list indicating a clean platform (306).
Preferably, the trusted package platform further comprises booting information from the installation media package (502), extracting an endorsement public key from a Trusted Platform Module (504), requesting an endorsement key certificate from a trusted certificate authority (506), receiving the endorsement key certificate and the trust hash list license key (508) and sealing the endorsement key certificate with- the client's trusted platform module key (510).
Another aspect of the present invention is a system (100) for providing a remote attestation in a trusted foundation platform through the use of a trust hash list. The system comprising at least one foundation server (101), at least one trusted certificate authority (102), at least one client platform (104) and at least one application server (103). The at least one foundation server (101) having means for creating at least one hash list and maintaining the at least one hash list. The at least one trusted certificate authority (102) having means for protecting integrity of a trust >ash list through a certification process available in an installation media package. The at least one client platform (104) having means for installing a trusted package platform and booting the trust hash list. The at least one application server (103) having means for executing the remote attestation process.
Preferably the foundation server (101) further comprises means for storing the created hash list, comparing the hash list with an untrust hash list through a hash operation and removing black list which exists in the hash list to obtain a trust hash list indicating a clean platform.
The present invention consists of features and a combination of parts hereinafter fully described and illustrated in the accompanying drawings, it being understood that various changes in the details may be made without departing from the scope of the invention or sacrificing any of the advantages of the present invention.
-
5
BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS
To further clarify various aspects of some embodiments of the present invention, a more particular description of the invention will be rendered by references to specific embodiments thereof, which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail through the accompanying drawings in which:
FIG. 1 illustrates system architecture for remote attestation in a trusted foundation platform.
FIG. 2 is a flowchart illustrating a method for providing a remote attestation in a trusted foundation platform through the use of a trust hash list.
FIG. 3 is a flowchart illustrating a method for maintaining the at least one hash list.
FIG. 4 is a flowchart illustrating a method for installing a trusted package platform at a client platform.
FIG. 5 is a flowchart illustrating a method for booting the trust hash list into the client platform.
FIG. 6 is a flowchart illustrating a method for executing a remote attestation process.
FIG. 7 is a flowchart illustrating a method for verifying validity of the remote attestation process. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
The invention relate to a method and system for providing a remote attestation in a trusted foundation platform through the use of a trust hash list. Hereinafter, this specification will describe the present invention according to the preferred embodiments. It is to be understood that limiting the description to the preferred embodiments of the invention is merely to facilitate discussion of the present invention and it is envisioned without departing from the scope of the appended claims.
Reference is first being made to FIG. 1. FIG. 1 illustrates architecture of a system for remote attestation in a trusted foundation platform. The system arrangement for remote attestation in a trusted foundation platform comprises four major parts, a Foundation Server (101), a Trusted Certificate Authority (102), a Client Platform (104) and an Application Server (103).
The Foundation Server (101) comprises of a Database List which stores blacklisted data which contains the Database List to store all blacklisted data while the deployment positions a Trusted Certificate Authority (Trusted CA) (102) which contains a Storage Database (Storage DB) to maintain the latest trust hash list, PCR data and certificate for each client platform. A Trusted Platform Module (TPM) is embedded in multiple machine platforms which communicate through a secured channel.
Trust hash list is typically a list of hashes of data blocks in a file or set of files used for different purposes, such as fast table lookup (hash tables) and distributed databases (distributed hash tables) to guarantee data integrity.
Trusted Certificate Authority is a trusted third party provider. Certificate Authorities are characteristic of infrastructure schemes. The present disclosure deploys a Trusted Certificate Authority (102) which functions to manage the mechanism of handling the interoperability and accuracy of the configuration of a computing platform as well as signing the Endorsement Key of trusted platform clients and validates all certificates involved in the attestation process. The attestation mechanism implements a system to maintain the accuracy and interoperability of computing platform configuration by having the foundation server which interacts with the Trusted Certificate Authority (102) as an entity which handles the trust hash list of an uncompromised foundation server.
The Trusted Certificate Authority (102) comprises a Storage Database which maintains the latest trust hash list, Platform Configuration Registers (PCR) data and certificate for each client platform. Each embodiment may have Trusted Platform Module (TPM) and with communicate each other by a secure channel.
Reference is now being made to FIG. 2 and FIG. 3 collectively. FIG. 2 is a flowchart illustrating a method for providing a remote attestation in a trusted foundation platform through the use of a trust hash list while FIG.3 is a flowchart illustrating a method for maintaining the at least one hash list. The method (100) for providing a remote attestation in a trusted foundation platform through the use of a trust hash list comprising the steps of creating at least one hash list (200), maintaining the at least one hash list (300), protecting integrity of a trust hash list through a certification process available in an installation media package (400), installing a trusted package platform at a client platform (500), booting the trust hash list into the client platform (600) and executing the remote attestation process (700). The method for maintaining the at least one hash list further comprises storing the created hash list (302), comparing the hash list with an untrust hash list through a hash operation (304) and removing black list which exists in the hash list to obtain a trust hash list indicating a clean platform (306). The removal of all blacklisted entries from the database list provides a 'trusted hash' indicating a clean platform. The trust hash list is further sealed and signed by the Trusted Certificate Authority to protect the integrity of the said list.
Reference is now being made to FIG. 4. FIG. 4 is a flowchart illustrating a method for installing a trusted package platform at a client platform. The method for installing a trusted package platform at a client platform further comprises booting information from the installation media package (502). The booting process will invoke a trusted application to extract the endorsement public key from the trusted platform module (504). The application will request for an endorsement certificate (506) by providing an endorsement public key, PCR values of a trusted platform module and serial numbers of the registers to the Trusted Certificate Authority. Subsequently, the endorsement key certificate and the trust hash list license key are sent to the client machine (508). Thereafter, the endorsement key certificate is sealed with the client's trusted platform module key (510).
Validation of an application is based on a trust hash list which begins when the client platform attempts to execute the application. The installed module will check and compare the hash value of a running application with the hash value of the trust hash list. Reference is now being made to FIG. 5. FIG. 5 is a flowchart illustrating a method for booting the trust hash list into the client platform. If the hash value of that application is listed in the trust hash list then the remote attestation module will initiate the remote attestation process (602).The application can only execute after the module receives the success status of remote attestation. If the matching hash value procedure fails wherein the hash value in the client platform is not in the trust hash list, the module will check the policy regarding severity of hash value and will report the failure of the hash value if (604). Thereafter, the booting process will be terminated if the hash value in the client platform is not in the trust hash list (606).
Reference is now being made to FIG.6 and FIG.7 collectively. FIG. 6 is a flowchart illustrating a method for executing a remote attestation process while FIG. 7 is a flowchart illustrating a method for verifying validity of the remote attestation process. The method for executing a remote attestation process comprises generating attestation parameters at the client platform and a server platform based on information of the endorsement public key (702), forwarding attestation parameters to the trusted certificate authority for endorsement (704), forwarding endorsed attestation parameters to the application server for an attestation process (706) and verifying validity of the remote attestation process (708). The method for verifying validity of the remote attestation process further comprises receiving attestation parameters of the application server (802), identifying a status of the attestation parameters of the application server with the trusted certificate authority (804), reiterating a status check of the attestation parameters of the application server if an invalid status is obtained (806) and terminating the remote attestation process if the status check is invalid (808).
The methodology and system for providing a remote attestation in a trusted foundation platform lies in the content of the trust hash list which is created by comparing a list of data (in the physical machine) against a database of blacklisted data. The present invention may be embodied in other specific forms without departing from its essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope.

Claims

1. A method (100) for providing a remote attestation in a trusted foundation platform through the use of a trust hash list, the method comprising the steps of: creating at least one hash list (200); maintaining the at least one hash list (300); protecting integrity of a trust hash list through a certification process available in an installation media package (400); installing a trusted package platform at a client platform (500); booting the trust hash list into the client platform (600); and executing the remote attestation process (700). characterized in that maintaining the at least one hash list further comprises the steps of: storing the created hash list (302); comparing the hash list with an untrust hash list through a hash operation (304); and removing black list which exists in the hash list to obtain a trust hash list indicating a clean platform (306).
2. A method according to claim 1 , wherein installing a trusted package platform at a client platform further comprises the following steps: booting information from the installation media package (502); extracting an endorsement public key from a Trusted Platform Module (504); requesting an endorsement key certificate from a trusted certificate authority (506); receiving the endorsement key certificate and the trust hash list license key (508); and sealing the endorsement key certificate with the client's trusted platform module key (510).
A method according to claim 1, wherein booting the trust hash list into the client platform further comprises the following steps: initiating the remote attestation process if the hash value in the client platform is in the trust hash list (602); reporting failure of the hash value if the hash value in the client platform is not in the trust hash list (604); and terminating the booting process if the hash value in the client platform is not in the trust hash list (606).
A method according to claim 1 wherein executing a remote attestation process further comprises the steps of: generating attestation parameters at the client platform and a server platform based on information of the endorsement public key (702); forwarding attestation parameters to the trusted certificate authority for endorsement (704); forwarding endorsed attestation parameters to the application server for an attestation process (706); and verifying validity of the remote attestation process (708).
5. A method according to claim 4 wherein verifying validity of the remote attestation process further comprises the steps of: receiving attestation parameters of the application server (802); identifying a status of the attestation parameters of the application server with the trusted certificate authority (804); reiterating a status check of the attestation parameters of the application server if an invalid status is obtained (806); and terminating the remote attestation process if the status check is invalid (808).
6. A method according to claim 1 wherein the step involve creating multiple hash list and maintaining multiple hash list.
7. A system (100) for providing a remote attestation in a trusted foundation platform through the use of a trust hash list, the system comprising: at least one foundation server (101); at least one trusted certificate authority (102); at least one client platform (104); and at least one application server (103). characterized in that the at least one foundation server (101) having means for: creating at least one hash list; and maintaining the at least one hash list. the at least one trusted certificate authority (102) having means for protecting integrity of a trust hash list through a certification process available in an installation media package; the at least one client platform (104) having means for: installing a trusted package platform; and booting the trust hash list. the at least one application server (103) having means for executing the remote attestation process.
8. A system (100) according to claim 7 wherein the at least one foundation server (101) further comprises means for. storing the created hash list; comparing the hash list with an untrust hash list through a hash operation; and removing black list which exists in the hash list to obtain a trust hash list indicating a clean platform.
9. A system according to claim 7 wherein the at least one client platform (104) having means for: booting information from the installation media package; extracting an endorsement public key from a Trusted Platform Module; requesting an endorsement key certificate from a trusted certificate authority; receiving the endorsement key certificate and the trust hash list license key; and sealing the endorsement key certificate with the client's trusted platform module key.
10. A system according to claim 7 wherein the at least one client platform (104) further comprises means for: generating attestation parameters based on information of the endorsement public key; forwarding attestation parameters to the trusted certificate authority for endorsement; forwarding endorsed attestation parameters to the application server for an attestation process; and verifying validity of the remote attestation process.
11. A system according to claim 7 wherein the at least one trusted certificate authority (102) further comprises means for: receiving attestation parameters of the application server; identifying a status of the attestation parameters of the application server with the trusted certificate authority; reiterating a status check of the attestation parameters of the application server if an invalid status is obtained; and terminating the remote attestation process if the status check is invalid.
12. The system according to claim 7 and claim 9 wherein the at least one client platform (104) further comprising means for: initiating the remote attestation process if the hash value in the client platform is in the trust hash list; reporting failure of the hash value if the hash value in the client platform is not in the trust hash list; and terminating the booting process if the hash value in the client platform is not in the trust hash list.
13. A system according to claim 7 wherein the step involve creating multiple hash list and maintaining multiple hash list.
PCT/MY2010/000192 2010-04-09 2010-09-30 A method and system for a remote attestation in a trusted foundation platform WO2011126357A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI2010001586 2010-04-09
MYPI2010001586A MY147280A (en) 2010-04-09 2010-04-09 A method and system for a remote attestation in a trusted foundation platform

Publications (1)

Publication Number Publication Date
WO2011126357A1 true WO2011126357A1 (en) 2011-10-13

Family

ID=44763124

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2010/000192 WO2011126357A1 (en) 2010-04-09 2010-09-30 A method and system for a remote attestation in a trusted foundation platform

Country Status (2)

Country Link
MY (1) MY147280A (en)
WO (1) WO2011126357A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714168A (en) * 2017-10-25 2019-05-03 阿里巴巴集团控股有限公司 Trusted remote method of proof, device and system
CN115085966A (en) * 2022-04-28 2022-09-20 麒麟软件有限公司 Method for establishing openpts remote trusted connection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574729B1 (en) * 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US20060005009A1 (en) * 2004-06-30 2006-01-05 International Business Machines Corporation Method, system and program product for verifying an attribute of a computing device
US20070136814A1 (en) * 2005-12-12 2007-06-14 Michael Lee Critical function monitoring and compliance auditing system
US20100058431A1 (en) * 2008-08-26 2010-03-04 Mccorkendale Bruce Agentless Enforcement of Application Management through Virtualized Block I/O Redirection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6574729B1 (en) * 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US20060005009A1 (en) * 2004-06-30 2006-01-05 International Business Machines Corporation Method, system and program product for verifying an attribute of a computing device
US20070136814A1 (en) * 2005-12-12 2007-06-14 Michael Lee Critical function monitoring and compliance auditing system
US20100058431A1 (en) * 2008-08-26 2010-03-04 Mccorkendale Bruce Agentless Enforcement of Application Management through Virtualized Block I/O Redirection

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714168A (en) * 2017-10-25 2019-05-03 阿里巴巴集团控股有限公司 Trusted remote method of proof, device and system
CN109714168B (en) * 2017-10-25 2022-05-27 阿里巴巴集团控股有限公司 Trusted remote attestation method, device and system
US11621843B2 (en) 2017-10-25 2023-04-04 Alibaba Group Holding Limited Trusted remote proving method, apparatus and system
CN115085966A (en) * 2022-04-28 2022-09-20 麒麟软件有限公司 Method for establishing openpts remote trusted connection
CN115085966B (en) * 2022-04-28 2024-04-05 麒麟软件有限公司 Method for establishing remote trusted connection of peers

Also Published As

Publication number Publication date
MY147280A (en) 2012-11-30

Similar Documents

Publication Publication Date Title
CN110799941B (en) Anti-theft and tamper-proof data protection
US8312272B1 (en) Secure authentication token management
JP4662706B2 (en) Secure recovery in serverless distributed file system
JP5860815B2 (en) System and method for enforcing computer policy
US8555072B2 (en) Attestation of computing platforms
Samuel et al. Survivable key compromise in software update systems
EP1622301B1 (en) Methods and system for providing a public key fingerprint list in a PK system
US8601265B2 (en) Method and system for improving storage security in a cloud computing environment
US20150089219A1 (en) Systems and methods for enforcing third party oversight of data anonymization
CN110770729B (en) Method and apparatus for proving integrity of virtual machine
US20060005009A1 (en) Method, system and program product for verifying an attribute of a computing device
CN106790045B (en) distributed virtual machine agent device based on cloud environment and data integrity guarantee method
Böck et al. Towards more trustable log files for digital forensics by means of “trusted computing”
CN108632251B (en) Credible authentication method based on cloud computing data service and encryption algorithm thereof
CN108027856B (en) Real-time indicator for establishing attack information using trusted platform module
US20230289478A1 (en) Generating signed measurements
KR20170089352A (en) Firmware integrity verification for performing the virtualization system
CN115001695A (en) Secure provisioning of baseboard management controller identities for platforms
Balfe et al. Challenges for trusted computing
CN113132116A (en) Sensitive data anonymous access method based on knowledge signature
WO2011126357A1 (en) A method and system for a remote attestation in a trusted foundation platform
Black et al. Be careful who you trust: Issues with the Public Key Infrastructure
US11868460B2 (en) Authorized encryption
Lucyantie et al. Attestation with trusted configuration machine
CN114117554B (en) Law enforcement data credibility verification method, processing method and system and law enforcement instrument

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10849554

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10849554

Country of ref document: EP

Kind code of ref document: A1