首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于可信计算的移动平台设计方案
引用本文:陈书义,闻英友,赵宏.基于可信计算的移动平台设计方案[J].东北大学学报(自然科学版),2008,29(8):1096-1099.
作者姓名:陈书义  闻英友  赵宏
作者单位:东北大学,信息科学与工程学院,辽宁沈阳,110004
基金项目:国家自然科学基金,国家高技术研究发展计划(863计划)
摘    要:在深入研究现有可信移动平台设计方案和TCG移动可信模块相关技术的基础上,提出了带有移动可信模块的可信移动平台设计方案.平台采用基带处理器和应用处理器分离的结构,利用移动可信模块构建了以应用处理器为中心的可信区域,为移动平台提供受保护的计算和存储空间,提高了移动平台的安全性、灵活性和可靠性.分析了现有可信移动平台安全引导过程安全漏洞,提出了改进的安全引导过程,并通过谓词逻辑对改进的引导过程进行了正确性验证.

关 键 词:可信计算  可信计算模块  移动可信模块  安全引导  谓词逻辑  

Conceptual Design of Trusted Mobile Platform
CHEN Shu-yi,WEN Ying-you,ZHAO Hong.Conceptual Design of Trusted Mobile Platform[J].Journal of Northeastern University(Natural Science),2008,29(8):1096-1099.
Authors:CHEN Shu-yi  WEN Ying-you  ZHAO Hong
Institution:(1) School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
Abstract:Investigating in depth the existing conceptual designs of trusted mobile platforms and technology of the TCG mobile trusted module,a new conceptual design of trusted mobile platform based on the module is proposed,of which the base-band processor is separated from application processor.The trusted region with the application processor as a center is constructed in the design to provide a protected space for computing and storage,thus improving the security,flexibility and reliability of the platform.Analyzing the vulnerabilities of security bootstrapping procedures in existing trusted mobile platforms,an improved procedure is proposed and it is verified according to predicate logic.
Keywords:trusted computing  trusted computing module  mobile trusted module  security bootstrapping  predicate logic
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《东北大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《东北大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号