首页 | 本学科首页   官方微博 | 高级检索  
     

基于可信计算的结构性安全模型设计与实现
引用本文:宗涛.基于可信计算的结构性安全模型设计与实现[J].计算机工程,2012,38(20):89-92.
作者姓名:宗涛
作者单位:瑞达信息安全产业股份有限公司,上海,200235
基金项目:国家“863”计划基金资助项目(2009AA012437)
摘    要:鉴于可信计算可以弥补传统安全防护技术在构架设计和防护强度上存在的安全风险,提出一种可信计算安全模型,从信任链着手,将嵌入式可信安全模块、智能卡等模块引入可信计算平台,对关键技术的实现进行介绍,包括以J3210为核心的可信硬件平台、嵌入式操作系统JetOS、BIOS安全增强、操作系统的安全增强以及基于智能卡的用户身份认证.

关 键 词:可信计算  结构性安全模型  可信密码模块  安全增强  信任链
收稿时间:2011-12-09
修稿时间:2012-02-22

Design and Realization of Structural Security Model Based on Trusted Computing
ZONG Tao.Design and Realization of Structural Security Model Based on Trusted Computing[J].Computer Engineering,2012,38(20):89-92.
Authors:ZONG Tao
Affiliation:ZONG Tao(Jetway Information Security Industry Inc.,Ltd.,Shanghai 200235,China)
Abstract:In view of the trusted computing can make up for the traditional security protection technology in architecture design and protection on the strength of security risks exist,this paper puts forward a kind of structural security model.From trust chain,it introduces the embedded trusted security module and one smart card module into trusted computing platform.The realization methods of the key technologies of J3210,JetOS,BIOS enhancement,OS security enhancement and user identity authentication based on smart card are given.
Keywords:trusted computing  structural security model  trusted cryptography module  security enhancement  trust chain
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号