US 11,856,002 B2
Security broker with consumer proxying for tee-protected services
Michael Hingston McLaughlin Bursell, Farnborough (GB); and Lilian Sturmann, Cambridge, MA (US)
Assigned to Red Hat, Inc., Raleigh, NC (US)
Filed by Red Hat, Inc., Raleigh, NC (US)
Filed on Jul. 30, 2021, as Appl. No. 17/390,001.
Prior Publication US 2023/0034725 A1, Feb. 2, 2023
Int. Cl. H04L 67/562 (2022.01); H04L 9/40 (2022.01)
CPC H04L 63/126 (2013.01) [H04L 67/562 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, by a broker device and from a first computing device, a request to verify that a service provided by a second computing device is executing in a trusted execution environment, wherein the request comprises data identifying the service;
initiating, by the broker device, a remote integrity check of the second computing device executing the service;
receiving, by the broker device, integrity data of the trusted execution environment of the second computing device;
verifying, by the broker device, the integrity data received from the second computing device by performing one or more operations to correlate the integrity data to the service provided by the second computing device;
generating combined integrity data by combining the integrity data received from the second computing device with integrity data associated with the broker device; and
providing, by the broker device, the combined integrity data to the first computing device associated with the service.