期刊文献+

一种新的用户登录可信认证方案的设计与实现 被引量:6

Design and implementation of a trusted login authentication project based on the trusted platform module
下载PDF
导出
摘要 用户登录身份认证是建立操作系统可信性中一个非常重要的环节。操作系统采用口令、智能卡、USBKEY,甚至还采用了指纹、虹膜等认证方式来确认用户的身份,除了存在密码容易被遗忘、猜测、截获等一系列安全隐患外,还存在身份信息的存储安全和单向认证问题。基于可信计算联盟的规范,分析了操作系统用户登录传统认证方式的缺陷,提出了一种新的用户登录认证方式:基于可信平台模块(TPM)的用户登录可信认证。该认证方式是利用PC机USB接口外接TPM,将用户的身份信息、相关的密钥信息等存储在TPM中,并利用USBKEY技术、动态的口令技术来确保用户身份的真实可信。该认证方式克服了操作系统用户登录传统认证方式的缺陷,支持双向认证,为计算机获得更高的安全保障,进一步建立可信计算环境提供了基础。 Identity authentication for user login is very important to the Operation System. The authentication modes in the Operation System, such as password, Smart Card, USBKEY, moreover Fingerprint and Iris, have a series of secure problems. For example, the password is easily forgotten, guessed out or intercepted, moreover, the store for identity is insecure and the authentication is one directional. In this paper, according to the standards of the trusted computing group, based on the analysis for the traditional identity authentication, a new identity authentication, called the Trusted Login Authentication Based on TPM ( TLABT), has been put forward, which can be realized by the Trusted Platform Module (TPM) which stores the users identities and the key, and guarantee the authenticity of the user identity. The TLABT can overcome the traditional deficiencies and support the bidirectional authentication technology for high assurance of system security, thus the basis for building the trusted computing environment has been provided.
作者 谭良 周明天
出处 《计算机应用》 CSCD 北大核心 2007年第5期1070-1072,1102,共4页 journal of Computer Applications
基金 国家863计划资助项目(863-104-03-01) 四川省教育厅资助项目(2006ZD022)
关键词 可信计算 可信平台模块 用户认证 可信登录 trusted computing Trusted Platform Module (TPM) trusted login
  • 相关文献

参考文献15

  • 1OPPLIGER R,RYTZ R.Docs trusted computing remedy computer security problems[J].Security & Privacy Magazine(IEEE),2005,3(2):16-19.
  • 2REID J,NIETO JMG,DAWSON E,et al.Privacy and trusted computing[A].Proceedings of the 14th International Workshop on Database and Expert System Application[C].2003.
  • 3FELTEN EW.Understanding trusted computing:will its benefits outweigh its drawbacks[J].Security & Privacy Magazine(IEEE),2003,1(3):60 -62.
  • 4ILIEV A,SMITH SW.Protecting client privacy with trusted computing at the server[J].Security & Privacy Magazine(IEEE),2005,3(2):20-28.
  • 5ARBAUGH B.Improving the TCPA specification[J].Computer,2002,35(8):77-79.
  • 6屈延文.软件行为学[M].北京:电子工业出版社,2005.
  • 7周明天,谭良.可信计算及其进展[J].电子科技大学学报,2006,35(S1):686-697. 被引量:27
  • 8南相浩.2005信息安全步入"信任"时代[EB\OL].http://www.venustech.com.cn/tech/aqwz/20050111 /2924.htm,2006-06 -08.
  • 9侯方勇,周进,王志英,刘真,刘芸.可信计算研究[J].计算机应用研究,2004,21(12):1-4. 被引量:27
  • 10周明辉,梅宏.可信计算研究的初步探疑[J].计算机科学,2004,31(7):5-8. 被引量:14

二级参考文献127

共引文献244

同被引文献26

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部