期刊文献+

A New Approach of TPM Construction Based on J2810 被引量:1

A New Approach of TPM Construction Based on J2810
下载PDF
导出
摘要 Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. Existing TPM products have some limitations. This paper adopts J2810TPM Single Chip cryptogram MCU produced by Jetway Company to construct typical TPM after comparing existing TPM products. Finally, an improved construction approach of TPM based on J2810 is proposed. Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. Existing TPM products have some limitations. This paper adopts J2810TPM Single Chip cryptogram MCU produced by Jetway Company to construct typical TPM after comparing existing TPM products. Finally, an improved construction approach of TPM based on J2810 is proposed.
机构地区 School of Computer
出处 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期21-24,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (90104005,60373087,60473023) and Key Laboratory of Geo-Informatics of State Bureau of Surveying and Mapping(200626)
关键词 trusted platform model(TPM) trusted computing J2810 trusted platform model(TPM) trusted computing J2810
  • 相关文献

参考文献9

  • 1Trusted Computing Group.TPM Main Part 1 Design Principles Specification Version 1.2, Revision 94. http://www.trustedcomputing.org . 2006
  • 2Kagal L,Cost S,Finin T, et al.A Framework for Distributed Trust Management. http://www.cs. umbc.edu/~finin/papers/nimas01/nimas01.pdf,2001 . 2006
  • 3Marchesini J,,Smith S W.Open-Source Applications of TCPA Hardware[].Computer Security Applications Conference th Annual.2004
  • 4Trusted Computing Group.TPM Main Part 2 TPM Structures Specification version 1.2, Level 2 Revision 94.. http://www.trustedcomputing.org . 2006
  • 5Manferdelli J.An Open and Interoperable Foundation for Secure Computing[].Windows Trusted Platform Technologies Information Newsletter.2003
  • 6Trusted Computing Group.Trusted Computing Platform Alliance. (TCPA) Main Specification Version 1.1b. http://www.trustedcomputing.org . 2005
  • 7Zhao Bo,,Zhang Huanguo.Implementation of the Trusted Computing in Commercial Cryptogram Based on Embedded System[].Proceedings International Conference on Wireless Communications Networking and Mobile Computing.2005
  • 8Pearson S.Trusted Computing Platforms, the Next Security Solution[]..2002
  • 9Trusted Computing Group.Reference Architecture for Interoperability (Part I) TCG Copyright Specification. http://www. trustedcomputing. org . 2005

同被引文献4

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部