[1]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153-157.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(07):153-157.
点击复制

新型可信计算平台体系结构研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年07期
页码:
153-157
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
New Trusted Computing Platform Architecture
文章编号:
1673-629X(2011)07-0153-05
作者:
张珂
陕西师范大学网络信息中心
Author(s):
ZHANG Ke
Network Information Centre,Shaanxi Normal University
关键词:
可信密码模块可信计算可信引导系统恢复
Keywords:
trusted cryptography module trusted computing trusted bootstarp system rejuvenation
分类号:
TP393.08
文献标志码:
A
摘要:
现行通用个人计算机基于开放架构,存在诸多攻击点,然而传统可信计算平台在解决个人PC安全问题的同时暴露出可信引导过程存在不可恢复的不足。针对这些安全问题,基于可信密码模块(TCM)提出一种新型可信计算平台体系结构。该结构具有可信引导失败时的自恢复机制,同时提供低于操作系统层的用户身份验证功能,通过基于TCM芯片的完整性度量、信任链的传递以及可信引导等技术,进而保证可信计算平台能够完成更安全的计算和存储工作,使可信计算平台达到更高的安全性、可信性和可靠性,同时该体系结构具有可信引导失败时的自恢复机制,可解决现有可信计算平台引导失败时无法正常启动的不足
Abstract:
For the open architecture of personal computer and security issue of attacks,the traditional personal computing can solve the security issues,but it had lack of recovery mechanism in trusted boot process,a new trusted computer architecture based on trusted cryptography module(TCM) is proposed,the new architecture can achieve self-recovery while the trusted bootstarp failed and provide the identity authentication below operation system level.Through integrality measurement of TCM,trusted chain pass,trusted bootstarp and the identity authentication below operation system level,the reliable security computing and storage circumstance can be achieved.By this mechanism the higher security and dependability is given to the personal computer.The new architecture has the recovery mechanism in trusted boot process,it can also start the trusted computing platform when you trusted boot process failure

相似文献/References:

[1]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(07):165.
[2]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(07):1.
[3]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(07):233.
[4]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(07):237.
[5]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(07):113.
[6]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(07):122.
[7]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(07):147.
[8]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(07):99.
[9]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(07):126.
[10]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
 YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(07):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]

备注/Memo

备注/Memo:
国家自然科学基金项目(60503008)张珂(1982-),男,研究方向为网络安全
更新日期/Last Update: 1900-01-01