Trust Technology

It is a technology to prove the integrity and reliability of information.

  • Tamper Proof: Prevents tampering with hardware at startup, such as secure boot.
  • Data Encryption: Encrypt communication data.
  • Digital Signature: Digital signature ensures authenticity of data.
  • PKI public key authentication infrastructure: Use a strong public key authentication technology to authenticate.

With Connected World, conventional encryption and authentication technologies can not ensure reliable reliability, and AppGuard uses Attestation technology to verify the integrity of information And provide the foundation to prove reliability. Attestation technology has the following three. In the Trusted Computing Group, Remote Attestation technology has already been standardized, but Dynamic and Continuous Attestation are new technologies that have not yet been standardized.

  • Remote Attestation: We will conduct static verification from a trusted third party.
  • Dynamic Attestation: Dynamically prove between devices or systems.
  • Continuous Attestation: Continually verify between devices or systems.

(Image of Trust Technology)

Trust Technology first generates reliable unique IDs of devices or systems. As a method of generating the ID, if a TPM 2.0 chip is installed, a unique ID is generated based on the strongly protected secret key installed in this chip. In addition to the TPM 2.0 chip, AppGuard independently generates a unique ID in software (Virtual TPM) on a private key installed in the Trust Zone on the ARM processor or on a platform that does not have a secret key in the hardware. Based on this reliable strong and unique ID, various keys necessary for Attestation are generated, and by verifying the tampering of hardware and the reliability of the application, the reliability between the systems is proved to be attestated.