Intel corporation (20240214390). SUPPLY CHAIN ATTESTATION TRANSPARENCY AND AUTHORIZATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

SUPPLY CHAIN ATTESTATION TRANSPARENCY AND AUTHORIZATION

Organization Name

intel corporation

Inventor(s)

Ned M. Smith of Beaverton OR (US)

Rajesh Poornachandran of Portland OR (US)

Sunil K. Cheruvu of Tempe AZ (US)

SUPPLY CHAIN ATTESTATION TRANSPARENCY AND AUTHORIZATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240214390 titled 'SUPPLY CHAIN ATTESTATION TRANSPARENCY AND AUTHORIZATION

The technology described in this patent application involves receiving a first reference integrity manifest (RIM) and a first proto-RIM from a first endorser, who asserts authority to supply attestation reference values for a computing device. The first proto-RIM is stored in a RIM transparency database, notarized, and provided to a verifier of the computing device.

  • Receiving a first reference integrity manifest (RIM) and a first proto-RIM from a first endorser
  • Storing the first proto-RIM in a RIM transparency database
  • Notarizing the first proto-RIM
  • Providing the first RIM and the notarized first proto-RIM to a verifier of the computing device

Potential Applications: - Secure authentication processes - Ensuring the integrity and authenticity of computing devices - Enhancing trust in digital transactions and communications

Problems Solved: - Mitigating the risk of unauthorized access to computing devices - Preventing tampering with attestation reference values - Strengthening the security of digital systems and networks

Benefits: - Improved security and trust in digital interactions - Enhanced protection against cyber threats - Streamlined verification processes for computing devices

Commercial Applications: Title: Secure Authentication Technology for Computing Devices This technology can be utilized in industries such as cybersecurity, financial services, healthcare, and government agencies to enhance the security and integrity of digital systems.

Questions about Secure Authentication Technology for Computing Devices: 1. How does this technology improve the security of computing devices? 2. What are the potential implications of this technology for cybersecurity measures?

Frequently Updated Research: Stay informed about the latest advancements in secure authentication technology for computing devices by following research publications and industry reports in the cybersecurity and digital security fields.


Original Abstract Submitted

the technology described herein includes receiving a first reference integrity manifest (rim) and a first proto-rim from a first endorser, the first endorser asserting authority, by the first rim and the first proto-rim, to supply first attestation reference values for a computing device; storing the first proto-rim in a rim transparency database; notarizing the first proto-rim; and providing the first rim and the notarized first proto-rim to a verifier of the computing device.