![]() ![]() It is a stable document and may be used as reference material or cited from anotherĭocument. This document has been reviewed by FIDO Aliance Members WARRANTY OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY EXPRESS OR IMPLIED ![]() ![]() THIS FIDO ALLIANCE SPECIFICATION IS PROVIDED “AS IS” AND WITHOUT ANY and its MembersĪnd any other contributors to the Specification are not, and shall not be held, responsible in any mannerįor identifying or failing to identify any or all such third party intellectual property rights. Property rights, including without limitation, patent rights. Implementation of certain elements of this Specification may require licenses under third party intellectual If you wish to make comments regarding this document, please This document was published by the FIDO Alliance as a Proposed Standard. Latest revision of this technical report can be found in the FIDO Alliance specifications index at A list of current FIDO Alliance publications and the Other documents may supersede this document. This section describes the status of this document at the time of its publication. More profiles are expected to be added as the documentĪttestation refers to the capability of a FIDO Authenticator to provide aĬryptographic proof about its model to a remote relying Provides a profile of these structures when a TPM acts as a crypto kernel. Semantics of FIDO Authenticator attestation. The document defines generic data structures that cover the The English version of this specification is the only normative version. FIDO 2.0: Key Attestation Format FIDO Alliance Proposed Standard 04 September 2015 This version: Editor: Rolf Lindemann, Nok Nok Labs Contributor: Michael B. ![]()
0 Comments
Leave a Reply. |