Attestation Data Reference
Technical reference for the attestation receipt structure returned with every OLLM inference request.
Every inference request through OLLM produces a cryptographic attestation receipt. This receipt contains hardware-generated evidence proving the request was processed inside a unified Trusted Execution Environment; Intel TDX provides the secure VM, and NVIDIA H100 GPUs run confidential GPU compute within that VM. Both layers attest together, the TDX quote and GPU evidence are cryptographically bound by a shared session nonce. The receipt is self-contained and independently verifiable against Intel's and NVIDIA's public PKI.
No trust in OLLM is required to verify these receipts.
Hardware Environment
| Component | Technology | Role |
|---|---|---|
| CPU | Intel TDX (Trust Domain Extensions) | Encrypted virtual machine, the hypervisor cannot read memory |
| GPU | NVIDIA H100 (Hopper architecture), current deployment uses 8x H100 | Confidential compute extends the trust boundary to GPU memory |
Model weights and user prompts remain encrypted and are never exposed to the host.
Attestation Flow
The following diagram shows how an inference request flows through the TEE, how attestation evidence is generated, and how it can be independently verified.
Receipt Structure
An attestation receipt contains three components:
- Intel TDX Quote: CPU-side attestation proving the TEE environment
- NVIDIA GPU Evidence: per-GPU attestation proving firmware integrity
- Message Signature: cryptographic binding of the model identity to the request and response
1. Intel TDX Quote
A DCAP (Data Center Attestation Primitives) Quote v4 binary, hex-encoded, signed by Intel's Quoting Enclave.
Contents:
- ECDSA-P256 signature over the quote body
- PCK certificate chain: Platform Certification Key chain rooted in Intel's Root CA
- TD measurements:
MRTD— code identity of the Trust DomainRTMRs— runtime measurementsMRCONFIGID— configuration identity
- REPORT_DATA (64 bytes):
- Bytes
[0:32]:model_signing_address— identifies the model signing authority - Bytes
[32:64]: GPU session nonce, binds this quote to the GPU attestations
- Bytes
- TEE TCB SVN: firmware security version number, verifiable against Intel's Provisioning Certification Service
Verification: The quote's ECDSA signature and PCK certificate chain can be validated against Intel's Root CA. TCB status can be checked via Intel's PCS API.
2. NVIDIA GPU Evidence
Per-GPU attestation data for each H100 in the cluster.
Contents:
- X.509 certificate chain: device certificate rooted in NVIDIA's Root CA, revocation status verifiable via NVIDIA's OCSP service
- SPDM measurement report: signed by the GPU's device attestation key, containing measurement blocks per GPU
- Firmware measurements verified against NVIDIA's signed Reference Integrity Manifests (RIMs):
- Driver firmware measurements
- VBIOS firmware measurements
- OpaqueData fields (2-byte little-endian TLV format):
- Driver version
- VBIOS version
- Chip SKU
- Project and project SKU
The OpaqueData fields are used to identify the correct RIM for verification.
Verification: The GPU certificate chain can be validated against NVIDIA's Root CA. Firmware measurements are compared against the signed RIMs fetched from NVIDIA's RIM service.
3. Message Signature (Model Identity)
An ECDSA signature proving which model signed the response and binding the signature to the exact request and response content.
Signed message format:
EIP-191(text: "{model}:{sha256(request_body)}:{sha256(response_body)}")Fields:
| Field | Description |
|---|---|
model | The model identifier (e.g. zai-org/GLM-5-FP8) |
sha256(request_body) | SHA-256 hex hash of the inference request |
sha256(response_body) | SHA-256 hex hash of the inference response |
ecdsa_signature | 65-byte recoverable ECDSA signature (0x-prefixed hex) |
message_signer | Ethereum address of the signing authority (0x-prefixed) |
model_signing_address | Model identity hash, matches TDX REPORT_DATA[0:32] |
request_hash | SHA-256 hash of the request body |
response_hash | SHA-256 hash of the response body |
Verification: Recover the Ethereum address from the signature using EIP-191 and confirm it matches message_signer.
Session Binding
The TDX quote and GPU evidence are cryptographically bound by a shared nonce:
- The GPU attestation nonce appears in the TDX quote's
REPORT_DATA[32:64] - The same nonce appears in each GPU's SPDM evidence header
- A match across all GPUs proves every attestation was generated in the same session
This binding ensures that the CPU and GPU attestations are not from separate, unrelated sessions.
External Trust Anchors
All verification is against hardware vendors' public infrastructure, not OLLM's.
| Service | URL | Purpose |
|---|---|---|
| Intel PCS | api.trustedservices.intel.com | TCB status and platform verification |
| Intel Root CA | Embedded in TDX quote cert chain | Signature chain of trust |
| NVIDIA OCSP | ocsp.ndis.nvidia.com | GPU certificate revocation checks |
| NVIDIA RIM | rim.attestation.nvidia.com | Signed firmware reference hashes |
| NVIDIA Root CA | Embedded in GPU cert chain | Signature chain of trust |
Because all trust anchors are external and publicly auditable, verification does not depend on OLLM infrastructure at any point.