[1]路士兵,朱麟,夏鑫.一种基于TPM的数据链系统密钥管理方案[J].计算机技术与发展,2019,29(04):87-90.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 018]
 LU Shi-bing,ZHU Lin,XIA Xin.A Key Management Scheme of Data Chain System Based on TPM[J].,2019,29(04):87-90.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 018]
点击复制

一种基于TPM的数据链系统密钥管理方案()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
29
期数:
2019年04期
页码:
87-90
栏目:
安全与防范
出版日期:
2019-04-10

文章信息/Info

Title:
A Key Management Scheme of Data Chain System Based on TPM
文章编号:
1673-629X(2019)04-0087-04
作者:
路士兵朱麟夏鑫
公安海警学院,浙江 宁波 315801
Author(s):
LU Shi-bingZHU LinXIA Xin
China Maritime Police Academy,Ningbo 315801,China
关键词:
可信计算可信平台模块密钥管理信息安全数据链系统
Keywords:
trusted computingtrusted platform modulekey managementinformation securitydata chain system
分类号:
TP302
DOI:
10. 3969 / j. issn. 1673-629X. 2019. 04. 018
摘要:
深入研究密钥管理机制的安全性、合理性和实用性,设计和实现适应于TPM芯片的密钥管理机制和证书管理机制,提高可信计算平台的安全性、可维护性和易用性,是可信计算平台有效应用的基础,关系到电子政务、电子商务等网络虚拟业务的普及和发展。密钥安全是密码系统安全运行的关键,密钥管理方案是信息安全管理的重要内容,支撑着密码保障的全过程。然而,密钥管理方案的设计却容易被人们忽视。鉴于可信计算的信任链传递机制有效保护了计算机中存储数据的机密性和安全性,并能够防止恶意软件对计算机的攻击。提出了数据链系统的安全管理模型,设计并实现了一种基于TPM(可信平台模块)的数据链系统密钥管理方案。通过认证,表明该方案能够很好地保证数据链系统密钥管理的真实性、完整性和机密性。
Abstract:
Further study of safety,rationality and practicability of the key management mechanism,design and implementation of key management mechanism and certificate management mechanism adapted to the TPM chip,improvement of the security the trusted computing platform and its maintainability and ease of use,is the foundation of effective application of trusted computing platform,which is related to e-government,e-commerce and other network popularization and development of virtual business. The key safety is the key to the operation of the cryptographic system. The key management scheme is an important content of information security management, which supports the whole process of the cryptographic protection. However,the design of the key management scheme is easily ignored. The trust chain transmission mechanism of trusted computing can effectively protect the confidentiality and security of the data,and prevent the computer being attacked by the malicious software. So we propose a model of safety management of data chain system,and design and implement a scheme of data chain system key management based on TPM (trusted platform module). The authentication shows that this scheme can effectively ensure the authenticity,integrity and confidentiality of the key management of data chain system.

相似文献/References:

[1]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(04):165.
[2]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(04):1.
[3]张珂.新型可信计算平台体系结构研究[J].计算机技术与发展,2011,(07):153.
 ZHANG Ke.New Trusted Computing Platform Architecture[J].,2011,(04):153.
[4]费稼轩 张涛 林为民 陈亚东 曾荣.基于动态可信度量的敏感信息安全控制模型[J].计算机技术与发展,2012,(05):237.
 FEI Jia-xuan,ZHANG Tao,LIN Wei-min,et al.Secure Control Model of Sensitive Information Based on Dynamic Trust Measurement[J].,2012,(04):237.
[5]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(04):113.
[6]张丽娟,吴振强.一种可控可信匿名的物联网查询机制[J].计算机技术与发展,2013,(06):122.
 ZHANG Li-juan,WU Zhen-qiang.A Controllable Trusted and Anonymous Query Mechanism of Internet of Things[J].,2013,(04):122.
[7]张弢,任帅,张德刚[].基于可信计算的Ad Hoc网络直接匿名证明[J].计算机技术与发展,2014,24(04):147.
 ZHANG Tao[],REN Shuai[],ZHANG De-gang[].Direct Anonymous Attestation to Ad Hoc Networks Based on Trusted Computing[J].,2014,24(04):147.
[8]周毅[],贾佳[],廖军[],等. 基于进化理论的可信计算环境实现[J].计算机技术与发展,2014,24(07):99.
 ZHOU Yi[],JIA Jia[],LIAO Jun[],et al. Implementation of Trusted Computing Environment Based on Evolutionary Theory[J].,2014,24(04):99.
[9]赵斌[],杨明华[],柳伟[],等. 基于龙芯处理器的自主可信计算机研究[J].计算机技术与发展,2015,25(03):126.
 ZHAO Bin[],YANG Ming-hua[],LIU Wei[],et al. Research on Security & Trust Computer Based on Loongson CPU[J].,2015,25(04):126.
[10]易平,庄毅.基于龙芯处理器的嵌入式可信解决方案[J].计算机技术与发展,2018,28(05):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
 YI Ping,ZHUANG Yi.Design and Implementation of Embedded Trusted Platform Based on LOONGSON Processor[J].,2018,28(04):112.[doi:10.3969/ j. issn.1673-629X.2018.05.026]
[11]禹蒲阳 康国胜.可信计算的研究与发展[J].计算机技术与发展,2011,(08):233.
 YU Pu-yang,KANG Guo-sheng.Research and Development of Trusted Computing[J].,2011,(04):233.

更新日期/Last Update: 2019-04-10