期刊文献+

可信技术在国产化嵌入式平台的应用研究 被引量:3

Research on application of trusted technology in localized embedded platform
下载PDF
导出
摘要 国产化嵌入式平台的安全威胁依旧严峻,为了提高国产化平台的安全性与可控性,可信技术的应用十分关键。在基于龙芯2K-1000CPU的国产化嵌入式平台上,采用可信平台控制模块(Trusted Platform Control Module,TPCM),应用可信启动、可信软件基、可信文件存储和I/O口的可信访问等技术,实现了国产化嵌入式平台的可信运行。TPCM可信模块基于CCP903T密码芯片实现。此平台已在某安全项目中通过测试投入使用,对可信技术在国产化平台的应用以及标准化形成留下参考性意义。 The security threats of localized embedded platforms are still severe.In order to improve the security and controllability of localized platforms,the application of trusted technology is critical.This article uses a trusted platform control module(TPCM)on a localized embedded platform based on the Godson 2K-1000CPU,using trusted boot,trusted software base,trusted file storage and I/O ports.Technology such as trusted access realizes the trusted operation of the localized embedded platform.The TPCM trusted module is implemented based on the CCP903T cryptographic chip.This platform has been tested and put into use in a security project,leaving a reference for the application of trusted technology in the localization platform and the formation of standardization.
作者 孟祥斌 刘笑凯 郝克林 Meng Xiangbin;Liu Xiaokai;Hao Kelin(National Computer System Engineering Research Institute of China,Beijing 100083,China)
出处 《电子技术应用》 2021年第12期94-99,共6页 Application of Electronic Technique
关键词 可信启动 可信平台控制模块 国产化平台 I/O口可信访问 trusted boot trusted platform control module(TPCM) localization platform I/O port trusted access
  • 相关文献

参考文献8

二级参考文献26

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:248
  • 2沈昌祥.可信计算平台与安全操作系统[J].网络安全技术与应用,2005(4):8-9. 被引量:13
  • 3邱慧敏,杨义先,胡正名.一种新的基于智能卡的双向身份认证方案设计[J].计算机应用研究,2005,22(12):103-105. 被引量:9
  • 4刘淳,张凤元,张其善.基于智能卡的RSA与ECC算法的比较与实现[J].计算机工程与应用,2007,43(4):96-98. 被引量:10
  • 5Trusted Computing Group. TPM main specification: design principles v1.2. https://www.trustedcomputinggroup.org, 2003.
  • 6SPENCER R. SMALLEY S, LOSCOCCO P. The flask security architectrue: system support for diverse security policies, https ://www. cs. utah. edu/flux/flask.
  • 7Design and implementation of a TCG-based integrity measurement architecture. 13th Usenix Security Symposium, San Diego, California, 2004.
  • 8SMITH S W. Trusted computing platforms: design and applications(book). Springer, USA, 2005.
  • 9Chen C K,Chenf L M.Cryptanalysis of a Remote User Authentication Scheme Using Smart Cards[J].IEEE Trans.on Consumer Electron,2003,49(4):1243-1245.
  • 10Shan JJ,Lin C W,Hwang M S.A Modified Remote User Authentication Scheme Using Smart cards[J].IEEE Trans.On consumer Elec2tron,2003,49(2):414-416.

共引文献60

同被引文献33

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部