摘要 |
<p>Authenticating a remote process (12) operating in an address space different than that of a local process (10) includes the steps of: creating, by the local process, a tamper resistant module (14) containing a temporary secret (16), sending the tamper resistant module and a challenge (18) from the local process to the remote process; executing the tamper resistant module by the remote process and recovering the secret when the integrity of the remote process is verified by the tamper resistant module; encoding the challenge using the secret to produce a response (20); sending the response to the local process; and decoding the response by the local process. Optionally, the tamper resistant module includes a request for information from the second process and the response includes the answer to the request for information.</p> |