期刊文献+

移动终端软件更新安全机制研究

Mobile Terminal Software Update Security Mechanism
在线阅读 下载PDF
导出
摘要 随着计算机和网络的普及应用,计算机终端自身的安全引起人们的关注,可信计算技术从一个新的视点解决终端的安全问题,已经成为信息安全领域研究的热点。针对目前移动终端软件更新身份认证存在的安全问题,提出基于可信计算技术的解决方案。方案中应用TPM的封存,PCR签名等安全功能实现移动终端的身份认证机制,提出基于DH密钥交换协议和IBE协议的下载方案,解决移动终端平台的身份认证和可信性问题。 PC and network are used so widely that the security of them attracts much attention.Trusted computing technology that is a hot topic in the field of information security provides a solution from a fresh viewpoint.The existing software update of mobile terminal has security weaknesses for identity authentication.Hence new solutions using trusted computing technology are proposed.The seal and sign features are applied in the schemes to ensure the safety of identity authentication.One scheme is based on DH algorithm and the other is based on IBE algorithm.
作者 刘国彩
出处 《微计算机信息》 2011年第1期195-196,177,共3页 Control & Automation
关键词 BIOS 可信计算 信任区 DAA BIOS Trusted Computing TrustZone Direct Anonymous Attestation
  • 相关文献

参考文献5

  • 1Eimear GaUery,"Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers" [EB/OL],http://www.rhul.ac. uk/mathematics/techreports,June 2005.
  • 2TrustZone Software API Specification,http://www.arm.com/pdfs, 2005.
  • 3徐学洲,任声骏.软件更新安全解决方案研究[J].大连理工大学学报,2005,45(z1):161-165. 被引量:3
  • 4D. Boneh, B. Lynn, H. Shacham. Short Signatures from the Weil Pairing[J], Proc. Of Asiacrypt'01, Lecture Notes in Computer Sci- ences, Vol. 2248, Springer-Verlag, 2001,514-532.
  • 5朱婷婷,赵林.一种应用移动代理的Ad-hoc网络IDS模型[J].微计算机信息,2009,25(3):144-145. 被引量:2

二级参考文献14

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2Yongguang Zhang,Wenke Lee.Intrusion detection in wireless Ad-Hoc networks[A].Proc of The Sixth International Conference on Mobile Computing and Networking (MobiCom 2000)[C].Boston,MA, 2000.275-283
  • 3Hohl F. Time limited blackbox security: protecting mobile agents from malicious hosts, in:G. Vigna (Ed.),4 Mobile Agents and Security, Lecture Notes in Computer Science 1419. Springer, Berlin, 1998.92-113
  • 4Venktraman L.Secured muting protocol for ad-hoc networks[A]. Master' s Thesis [C].University of Cincinnati Houston; Thames& Hudson, 2000.
  • 5[1]JANSEN S, BALLINTIJN G, BRINKKEMPER S. A process model and typology for software product updaters[A]. CSMR 2005 Proceedings[C]. Manchester: IEEE Computer Society Press, 2005:265-274.
  • 6[2]DEVANBU P, GERTZ M, STUBBLEBINE S. Security for automated, distributed configuration management[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999.
  • 7[3]ADI W, AL-QAYEDI A, NEGM K. Secured mobile device software update over IP networks[A]. IEEE SoutheastCon 2004 [C] Greensboro:IEEE, 2004:271-274.
  • 8[4]HILLENBRAND M, MLLER P, MIHAJLOSKI K. A software deployment service for autonomous computing environments[A]. International Conference on Intelligent Commerce - IAWTIC 2004[C]. Australia: University of Canberra, 2004.
  • 9[5]HALL R, HEIMBIGNER D, WOLF A. A cooperative approach to support software deployment using the software dock[A]. Proceedings of the 1999 International Conference on Software Engineering[C]. Los Angeles: ACM, 1999:174-183.
  • 10[6]SCHNEINER B. 应用密码学[M]. 北京:机械工业出版社, 2000.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部