TECHNIQUES FOR REMOTE SGX ENCLAVE AUTHENTICATION

    公开(公告)号:US20180241572A1

    公开(公告)日:2018-08-23

    申请号:US15600667

    申请日:2017-05-19

    Abstract: Techniques for remote SGX enclave authentication are described. An attestation service may be used to attest that an enclave was successfully established on a Software Guard Extensions (SGX) enabled platform. Further, an attestation service may, in embodiments, be used as a notary system to attest that a public-key certificate was generated by a particular SGX enclave and, therefore, may be trusted by other remote enclaves for authentication. In an embodiment, a client-side SGX enclave may generate a public-private key pair (SK, PK), compute a cryptographic hash H of PK, create a report R containing H, obtain a quote Q on the report R from a quoting enclave component, obtain remote attestation response RA from an attestation service, and broadcast RA and PK to one or more server side SGX enclaves. Other embodiments are described and claimed.

    SGX BASED FLOW CONTROL FOR DISTRIBUTED LEDGERS

    公开(公告)号:US20220171789A1

    公开(公告)日:2022-06-02

    申请号:US17547711

    申请日:2021-12-10

    Abstract: Various embodiments are generally directed to an apparatus, system, and other techniques for shared, trusted token generation for a token-bucket flow control policy implemented in a distributed ledger. Tokens may be generated by blocks in the distributed ledger, which may be a blockchain system. Trusted execution hardware may be used as a proof algorithm to ensure that a token exists, and that client has legitimately acquired or accumulated the token prior to using it to submit a transaction.

    SGX BASED FLOW CONTROL FOR DISTRIBUTED LEDGERS

    公开(公告)号:US20200278982A1

    公开(公告)日:2020-09-03

    申请号:US16290780

    申请日:2019-03-01

    Abstract: Various embodiments are generally directed to an apparatus, system, and other techniques for shared, trusted token generation for a token-bucket flow control policy implemented in a distributed ledger. Tokens may be generated by blocks in the distributed ledger, which may be a blockchain system. Trusted execution hardware may be used as a proof algorithm to ensure that a token exists, and that client has legitimately acquired or accumulated the token prior to using it to submit a transaction.

Patent Agency Ranking