[1]程桂花 王杨 赵传信 邓琨.应用模逆运算的移动互联网可信终端设计方法[J].计算机技术与发展,2012,(11):243-245.
 CHENG Gui-hua,WANG Yang,ZHAO Chuan-xin,et al.Design Method on Trusted Terminal Access Device by Modular Inversion in Mobile Internet[J].,2012,(11):243-245.
点击复制

应用模逆运算的移动互联网可信终端设计方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年11期
页码:
243-245
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Design Method on Trusted Terminal Access Device by Modular Inversion in Mobile Internet
文章编号:
1673-629X(2012)11-0243-03
作者:
程桂花1 王杨12 赵传信1 邓琨1
[1]安徽师范大学数学计算机科学学院[2]中国科学技术大学计算机科学与技术学院
Author(s):
CHENG Gui-hua WANG YangZHAO Chuan-xin DENG Kun
[1]College of Mathematics and Computer Science, Anhui Normal University[2]School of Computer Science &Technology, University of Science and Technology of China
关键词:
移动互联网可信终端模逆运算有限状态机Verilog语言
Keywords:
mobile Interact trusted terminal modular inversion finite state machine Veriiog language
分类号:
TP309
文献标志码:
A
摘要:
针对移动互联网海量移动终端用户的可信接人问题提出了一种芯片加密的可信接人系统的设计方案。首先将移动终端的可信接人过程划分为硬件预处理和可信接入两个子系统;在硬件预处理部分将有限状态机的思想用于模逆运算电路控制子系统的状态描述;而在可信接入部分基于Verilog语言将模拟运算电路抽象为控制系统状态转移图,再运用Verilog语言中的always模块将其转换为Moore型有限状态机,同时采用寄存器同步稳定输出控制信号,有效地实现了移动互联网终端设备的可信接入问题。仿真实验表明文中方法不仅能实现控制信号的输出与状态同步,还能避免组合输出产生的延迟及竞争与冒险现象,使终端设备的接入过程更加高效、稳定和可靠
Abstract:
Aimed at how to access about mobile terminal device in the mobile Intemet environment, a novel design scheme based on modular inversion circuits is presented. The trusted terminal control system includes hardware preprocessing sub-system and trusted access sub-system. FSM (finite state machine) is used in control sub-system design of modular inversion circuits. State transition diagram is created according to the function of modular inversion circuit, and it is converted into Moore FSM by three-always in Verilog language, control signals are steadily output by SYN register, accomPlish control sequencing and state transition of modular inversion circuit. The simulation experiment shows that the method not only can realize the control signal output and state synchronization, still can avoid the delay and the phenomenon of competition and adventure produced by combination output, make terminal access process is more highly efficient, stable and reliable

相似文献/References:

[1]陈建勋 侯方勇 李磊.可信计算研究[J].计算机技术与发展,2010,(09):1.
 CHEN Jian-xun,HOU Fang-yong,LI Lei.A Review of Trusted Computing[J].,2010,(11):1.
[2]陈亚东,张涛,曾荣,等.输电线路在线监测可信接入系统设计[J].计算机技术与发展,2013,(05):113.
 CHEN Ya-dong,ZHANG Tao,ZENG Rong,et al.Design of Trusted Access System for Transmission Line Monitoring[J].,2013,(11):113.
[3]于海平[],林晓丽[],刘会超[]. 基于数据挖掘的移动广告个性化推荐研究[J].计算机技术与发展,2014,24(08):234.
 YU Hai-ping[],LIN Xiao-li[],LIU Hui-chao[]. Research of Mobile Internet Advertising Personalized Recommendation Based on Data Mining[J].,2014,24(11):234.
[4]王立俊[],杨磊[],杨颖[]. 粮食保障决策指挥系统的设计与实现[J].计算机技术与发展,2015,25(07):158.
 WANG Li-jun[],YANG Lei[],YANG Ying[]. Design and Implementation of Decision and Command System for Food Guarantee[J].,2015,25(11):158.
[5]王杉,孙滔. 移动互联网下科技查新服务平台的研究与设计[J].计算机技术与发展,2015,25(12):182.
 WANG Shan,SUN Tao. Research and Design of Sci-tech Novelty Search Service Platform Based on Mobile Internet[J].,2015,25(11):182.
[6]赵雷[],程瑶[]. 智能终端中正确高效地使用Flash的研究[J].计算机技术与发展,2016,26(05):128.
 ZHAO Lei[],CHENG Yao[]. Research on Correct and Efficient Application of Flash in Intelligent Terminal[J].,2016,26(11):128.
[7]吴明礼,陈斌. 移动互联环境下数据通信安全技术的应用研究[J].计算机技术与发展,2016,26(11):106.
 WU Ming-li,CHEN Bin. Research on Application of Data Communication Security Technology in Mobile Internet Environment[J].,2016,26(11):106.
[8]曹小鹏,唐 煜,张 莹.电力交易信息发布平台研究与设计[J].计算机技术与发展,2018,28(07):192.[doi:10.3969/ j. issn.1673-629X.2018.07.041]
 CAO Xiao-peng,TANG Yu,ZHANG Ying.Research and Design on Power Information Publishing Platform[J].,2018,28(11):192.[doi:10.3969/ j. issn.1673-629X.2018.07.041]

备注/Memo

备注/Memo:
中国博士后基金项目(20100480701);教育部人文社科青年基金项目(11YJC880119);安徽师范大学大学生创新性实验项目(AHNUSC46)程桂花(1966-),女,讲师,主要研究方向为可信计算与移动网络;王杨,教授,博士后,硕士生导师,主要研究方向为移动计算、信息安全与数据挖掘
更新日期/Last Update: 1900-01-01