[go: up one dir, main page]

Cooper et al. - Google Patents

NIST Cybersecurity White Paper csrc. nist. gov

Cooper et al.

View DOC
Document ID
17722314186578178787
Author
Cooper D
Regenscheid A
Souppaya M
Bean C
Boyle M
Cooley D
Jenkins M

External Links

Snippet

A wide range of software products (also known as code)—including firmware, operating systems, mobile applications, and application container images—must be distributed and updated in a secure and automatic way to prevent forgery and tampering. Digitally signing …
Continue reading at tsapps.nist.gov (DOC) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07758Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card arrangements for adhering the record carrier to further objects or living beings, functioning as an identification tag
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards

Similar Documents

Publication Publication Date Title
Cooper et al. Security considerations for code signing
US9542568B2 (en) Systems and methods for enforcing third party oversight of data anonymization
US8621591B2 (en) Software signing certificate reputation model
US8954732B1 (en) Authenticating third-party programs for platforms
US10333930B2 (en) System and method for transparent multi-factor authentication and security posture checking
JP4278327B2 (en) Computer platform and operation method thereof
US8555072B2 (en) Attestation of computing platforms
US9900157B2 (en) Object signing within a cloud-based architecture
US20060195689A1 (en) Authenticated and confidential communication between software components executing in un-trusted environments
US20090055918A1 (en) Method of mutually authenticating between software mobility device and local host and a method of forming input/output (i/o) channel
CN113614720A (en) Apparatus and method for dynamically configuring access control of trusted applications
US11438161B2 (en) Implicit attestation for network access
CN116781359B (en) Portal security design method using network isolation and cryptograph
Fernandez et al. A cluster of patterns for trusted computing
Thijsman et al. Trusting the Cloud-Native Edge: Remotely Attested Kubernetes Workers
Gopalan et al. Policy driven remote attestation
Cooper et al. NIST Cybersecurity White Paper csrc. nist. gov
KR101506577B1 (en) A method for mutual authentication between a software mobile device and a local host, a method for forming an I / O channel, and a device therefor
Matsumoto et al. CASTLE: CA signing in a touch-less environment
Saravanan et al. Automated policy based remote attestation in trusted computing
Tian et al. SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration
Shiraishi et al. Hardware Authenticator Binding: A Secure Alternative to Passkeys
Luke et al. Using FIDO-based Authentication to Improve the Security of Software Supply Chains
JP2025139899A (en) Authentication system, authentication method, authentication device, and program
WO2025163752A1 (en) Information processing device, terminal, communication system, communication method, and program