_3. Network user transfers UA and TA to confidential computing
resource via TAM. TAM then deploys these two applications in REE
and TEE respectively. (In SGX, UA must be deployed first, then
let the UA to deploy TA in SGX.)
TAM requests remote attestation to the TEEP Agent, TEEP Agent
then sends the evidence to TAM. The TAM works as the relying
party and forward the attestation result to network user_
Clarify "deploy" and "load" in this case.
Is attestation result needs to be clarified in provision steps?
Network user transfers UA and TA to confidential computing device via TAM. TAM then deploys these two applications in REE and TEE respectively. (In SGX, UA must be deployed first, then let the UA to load TA in SGX.)
TAM requests remote attestation to the TEEP Agent, TEEP Agent then sends the evidence to TAM. The TAM works as Verifier in RATs architecture.
After verification,Network User works as Relying Party receives the attestation result. If positive, Network User establishes secure channel with TA, and deploys personalization data to the TA.
_3. Network user transfers UA and TA to confidential computing resource via TAM. TAM then deploys these two applications in REE and TEE respectively. (In SGX, UA must be deployed first, then let the UA to deploy TA in SGX.)
Clarify "deploy" and "load" in this case. Is attestation result needs to be clarified in provision steps?