-
公开(公告)号:US11792190B2
公开(公告)日:2023-10-17
申请号:US17528101
申请日:2021-11-16
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
CPC classification number: H04L63/0869 , H04L9/085
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-
公开(公告)号:US11196741B2
公开(公告)日:2021-12-07
申请号:US17161359
申请日:2021-01-28
Applicant: Advanced New Technologies Co., Ltd.
Inventor: Qunshan Huang , Xingyu Chen , Ling Xie , Lei Wang
Abstract: The implementations provide a method and an apparatus for establishing a trusted cluster. The method is used to form a trusted computing cluster by using N trusted computing units, the method including: grouping the N trusted computing units into a plurality of groups; identifying a first trusted computing unit in each group, and causing first trusted computing units in the plurality of groups to each respectively perform inter-unit trust authentication with other trusted computing units in a same group in parallel; performing inter-group trust authentication between/among the plurality of groups in parallel to obtain the N trusted computing units on which trust authentication succeeds; and propagating secret information in the N trusted computing units on which trust authentication succeeds, so that the N trusted computing units obtain the same secret information to form the trusted computing cluster.
-