摘要 |
Techniques (400, 600, 700) and apparatuses (102, 106, 108, 800) are described that enable a policy for secure packet transmission using required node paths and cryptographic signatures. These techniques and apparatuses enable a secure execution environment (SEE) of a target device to receive trustworthy sensitive data.
|