期刊文献+

一种基于TPM芯片的计算机安全体系结构 被引量:5

Computer Security Architecture Based on TPM Chip
下载PDF
导出
摘要 针对现行通用个人计算机基于开放架构、存在诸多攻击点等安全问题,提出了一种基于TPM安全芯片的新型计算机体系结构。设计并实现了基于安全芯片的软件协议栈TSS,在安全芯片中使用软件协议栈,通过核心服务API来调用核心服务模块,解决远程通信的平台信任问题。设计并实现了基于多协议的授权和认证管理,实现上层应用和TPM之间的授权会话及授权认证,从而保证计算机能够完成安全计算和安全存储的工作,使计算平台达到更高的安全性。 To solve the problem of computer security, this paper puts forward a new computer architecture based on TPM chip by designing a software protocol stack TSS based on security chip. By using this protocol stack to call kernel service modules through API, the problem of trusted platforms in distance communication can be solved. In the security chip based on TPM, authorization and authentication management based on multi-protocol are designed and implemented to realize authorized communication and authentication between upper application and TPM, ensuring that the computer is able to accomplish the task of safe computation and safe store to enhance the security level of the computing platforms.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第15期152-154,共3页 Computer Engineering
基金 国家"863"计划基金资助项目"数字证书SoC芯片"(2004AA1Z1090) 国家"863"计划基金资助项目"可信计算系统平台"(2005AA142030)
关键词 TPM安全芯片 软件协议栈 可信计算 安全体系结构 TPM security chip software protocol stack trusted computation security architecture
  • 相关文献

参考文献9

  • 1陈钟,刘鹏,刘欣.可信计算概论[J].信息安全与通信保密,2003,25(11):17-19. 被引量:21
  • 2侯方勇,周进,王志英,刘真,刘芸.可信计算研究[J].计算机应用研究,2004,21(12):1-4. 被引量:28
  • 3Arbaugh W A,Farber D J,Smith J M.A Secure and Reliable Bootstrap Architecture[C]//Proc.of 1997 IEEE Symposium on Security and Privacy.1997-05.
  • 4Carpinelli J D.Computer Systems Organization&Architecture[M].Pearson Education,Inc.,2002.
  • 5王新成.可信计算与系统安全芯片[J].计算机安全,2005(10):2-6. 被引量:5
  • 6曹来成.PKI安全的关键:CA的私钥保护[J].微计算机信息,2005,21(12X):75-77. 被引量:10
  • 7Trusted Computing Group.Main Specification (Version 1.2)[Z].2004.
  • 8Trusted Computing Group.Trusted Platform Module Protection Profile[Z].2004-07.
  • 9Saltier J H,Schroeder M D.The Protection of Information in Computer Systems[J].Proceedings of the IEEE,1975,63(9):1278.

二级参考文献23

  • 1毕文军,高健.关键词语音标引系统的实现[J].微计算机信息,2005,21(3):220-221. 被引量:6
  • 2Microsoft. NGSCB: Trusted Computing Base and Software Authentication [EB/OL]. http://www.microsoft.com/resources/ngscb/documents/ngscb_tcb.doc, 2003.
  • 3Birgit Pfitzmann, et al. PERSEUS [EB/OL]. http://www.perseu-sos.org/, 2003.
  • 4Microsoft. Microsoft Next-Generation Secure Computing Base-Technical FAQ [EB/OL]. http://www.microsoft.com/technet/security/news/ngscb.asp,2003.
  • 5Havicaz. An Overview of the New Palladium Initiative and How it Affects You [EB/OL]. http://www.epimetrics.com/topics/one-to-pic?page_to-pic_id=59, 2002.
  • 6William A Arbaugh. Security: Technical, Social, and Legal Challenges [J]. IEEE Computer, 2002, 35(2): 109-111.
  • 7William A Arbaugh. The TCPA; What's wrong; What's right and What to do about [EB/OL]. www.cs.umd.edu/-waa/TCPA/TCPA-goodnbad.pdf, 2002.
  • 8AgainstTCPA.com. Against-TCPA [EB/OL]. http://www.againsttcpa.com/, 2003.
  • 9STOPPALLADIUM.org. STOPPalladium [EB/OL]. http://www.stoppalladium.org/html/, 2003.
  • 10Lawrence Lessig. Anti-trusting Microsoft [EB/OL]. www.lessig.org/content/columns/red1.pdf, 2002.

共引文献44

同被引文献21

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部