期刊文献+

一种新的可信平台控制模块设计方案 被引量:17

A Novel Design of Trusted Platform Control Module
原文传递
导出
摘要 针对TCG提出的可信平台模块度量起始点和信任链构建问题,提出了可信平台控制模块(TPCM)方案,将可信度量根均设计在芯片内部,解决了可信度量根的保护问题和核心度量根的起始度量点问题,同时改进启动模式,使得该模块作为主动设备,先于CPU启动,并构建以该模块为信任根的信任链。该方案通过主动度量模式的信任链体现了可信平台控制模块(TPCM)作为整个平台信任根的控制特性。 Trusted platform module (TPM) proposed by TCG was a subordinate device and the root of trusted measurement was put into BIOS, which faces the threat to be tampered. In order to solve the problem, a novel design of Trusted platform control module (TPCM), in which the root of trusted measurement has been incorporated into the module. Therefore it is helpful to solve problems of protecting the root and the original point of measurement; meanwhile, a new kind of scheme is proposed based on the module, which establishes an active trust transitive architecture. Based on above implementation, the module shows a critical feature of controlling effect on whole platform.
作者 张兴 沈昌祥
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2008年第10期1011-1014,共4页 Geomatics and Information Science of Wuhan University
基金 国家重点基础研究发展计划资助项目(2007CB311100) 国家863计划资助项目(2006AA01Z440) 北京市科技计划资助项目(Z07000100720706)
关键词 可信计算 可信平台控制模块 可信度量根 信任链 trusted computing trusted platform control module root of trust for measurement trusted chain
  • 相关文献

参考文献6

  • 1Trusted Computing Group. TCG Specification Architecture Overview[ EB/OL]. http ://www. trust edcomputinggroup, org/groups/TCG 1 2 Architec ture Overview. pdf, 2007
  • 2Trusted Computing Group. TPM Specification Version 1. 2. Part 1 Design Principles[EB/OL].http ://www. trustedcomputinggroup.org/specs/ TPM/Main_Part1_rev94. zip, 2007
  • 3Trusted Computing Group. TPM Specification Version 1.2. Part 2 TPM Structures[EB/OL]. http:// www. trustedcomputinggreup. org/specs/TPM/ Main_Part2_rev94. zip, 2007
  • 4Trusted Computing Group. TPM Specification Version 1. 2. Part 3 TPM Commands[EB/OL]. http ://www. trustedcomputinggroup.org/spees/ TPM/Main Part3_rev94. zip,2007
  • 5Danilo B, Lorenzo C, Andrea L. Replay Attack in TCG Specification and Solution. The 21 st Annual Computer Security Application Conference [C].Tucson, AZ, USA, 2005
  • 6Catherine Flick,Controversy over Trusted Computing[OL], http://luddite. est. usyd. edu. au/- liedra/misc/Controversy_ Over_ Trusted _ Computing. pdf, 2004

同被引文献98

引证文献17

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部