期刊文献+

嵌入式可信终端认证原型的研究与实现 被引量:1

Key Technology Research on Attestation Prototype of Embedded Trusted Terminal
在线阅读 下载PDF
导出
摘要 针对目前终端面临的安全隐患,利用可信计算思想,提出了嵌入式可信终端认证原型的设计方案。该方案将口令、生物特征、证书机制和可信认证机制相互融合,构建出用户、终端和应用三层次嵌入式可信终端认证原型,并对可信终端的硬件环境构成、可信引导和可信认证等问题进行了深入分析。该原型对TCG定义的TPM功能进行了扩展和应用,可为嵌入式终端平台提供可信的计算环境。 In this paper, according to the nowadays severe security situation faced by terminal platforms an example of design attestation prototype of embedded trusted terminal is presented based on trusted computing. In this scheme, through combining password, biometric, certificate scheme and trusted attestation scheme, an attestation prototype of embedded trusted terminal is built on three arrangements o.f user and terminal with application, and research on building environment of trusted terminal, the trusted boot and trusted attestation in the paper. Conceptually and functionally extended the TPM defined by TCG in the proposed prototype on embedded platform, and a trusted computing environment is provided for embedded platform.
出处 《信息工程大学学报》 2008年第3期348-351,共4页 Journal of Information Engineering University
基金 国家863计划资助项目(2007AA01Z483)
关键词 嵌入式终端 可信引导 认证 直接匿名认证 embedded terminal trusted boot attestation direct anonymous attestation (DAA)
  • 相关文献

参考文献9

  • 1Jain A K ,Lin Hong,Pankanti S B. An identity authentication system using fingerprints [ C ] // Proceedings of the IEEE. 1997, 85(9) :1365 -1388.
  • 2Lin C H,Lai Y Y. A flexible biometrics remote user authentication scheme [ J ]. Computer Standards&Interfaces, 2004,27(1) :19 -23.
  • 3刘威鹏,胡俊,方艳湘,沈昌祥.基于可信计算的终端安全体系结构研究与进展[J].计算机科学,2007,34(10):257-263. 被引量:18
  • 4George P. User authentication with smart cards in trusted computing architecture [ C ]//Proceedings of the International Conference on Security and Management. 2004:25 -31.
  • 5Balaeheff B, Chan D, Chen L. Securing smart card intelligent adjuncts using trusted computing platform technology[ C] // Proceedings of the International Conference on IEIF Fourth Smartcard Research and Advanced Application. 2000 : 177 - 195.
  • 6彭双河.信息系统认证体系结构及相关技术研究[D].北京:北京交通大学,2007:10-11.
  • 7Arbaugh W, Farber D, Smith J. A Secure and Reliable Bootstrap Architecture [ C ] // IEEE Symposium on Security and Privacy. 1997:65 -71.
  • 8黄涛,沈昌祥.一种基于可信服务器的可信引导方案[J].武汉大学学报(理学版),2004,50(A01):12-14. 被引量:19
  • 9Brickell E, Camenisch J, CHEN L. Direct anonymous attestation [ C ] // Proc of the 11th ACM Conference on Computer and Communications Security. New York: 2004 : 132 - 145.

二级参考文献37

  • 1沈昌祥.可信计算平台与安全操作系统[J].网络安全技术与应用,2005(4):8-9. 被引量:15
  • 2林宣雄,李怀祖,张文修.安全内核方法与实现考虑[J].计算机科学,1996,23(1):36-39. 被引量:1
  • 3Jaeger T, Sailer R, Zhang X. Analyzing integrity protection in the SELinux example policy. In:Proceedings of the 12^th USENIX Security Symposium, USENIX, August 2003. 59-74
  • 4Jaeger T, Sailer R, Zhang X. Resolving constraint conficts. In: SACMAT '04: Proceedings of the ninth ACM symposiumon Access control models and technologies, New York, NY, USA, ACM Press,2004. 105-114
  • 5Jaeger T, Sailer R. Umesh Shankar PRIMA: Policy-Reduced Integrity Measure Architecture
  • 6Yoshihama S, Ebringer T, Nakamura M, Munetoh S. Hiroshi Maruyama WS-Attestation: Efficient and Fine-Grained Remote Attestation on Web Services. In: Proceedings of the IEEE International Conference on Web Services (ICWS'05)
  • 7Safford D,Zohar M. A trusted Linux Client. IBM T. J. Watson Research Center, 2004
  • 8陈幼雷 等.操作系统可信增强框架研究与实现[J].计算机应用与研究,.
  • 9Reid J F, Caelli W J. DRM, Trusted Computing and Operating System Architecture. In: Australasian Information Security Workshop.(AISW2005),Newcastle,Australia
  • 10http://www. trustedcomputinggroup. org

共引文献35

同被引文献6

引证文献1

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部