作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2007, Vol. 33 ›› Issue (15): 152-154. doi: 10.3969/j.issn.1000-3428.2007.15.053

• 安全技术 • 上一篇    下一篇

一种基于TPM芯片的计算机安全体系结构

邢启江1,2,肖 政3,4,侯紫峰3,姜永华2   

  1. (1. 山东工商学院计算中心,烟台 264005;2. 海军航空工程学院电子信息工程系,烟台 264001;3. 中国科学院计算所,北京 100080;4. 中国科学院研究生院,北京 100039)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-08-05 发布日期:2007-08-05

Computer Security Architecture Based on TPM Chip

XING Qi-jiang1,2, XIAO Zheng3,4, HOU Zi-feng3, JIANG Yong-hua2   

  1. (1. Computer Center, Shandong Institute of Business and Technology, Yantai 264005; 2. Department of Electronic and Information Engineering, Naval Aeronautical Engineering Institutes, Yantai 264001; 3. Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080; 4. Graduate School, Chinese Academy of Science, Beijing 100039)
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-08-05 Published:2007-08-05

摘要: 针对现行通用个人计算机基于开放架构、存在诸多攻击点等安全问题,提出了一种基于TPM安全芯片的新型计算机体系结构。设计并实现了基于安全芯片的软件协议栈TSS,在安全芯片中使用软件协议栈,通过核心服务API来调用核心服务模块,解决远程通信的平台信任问题。设计并实现了基于多协议的授权和认证管理,实现上层应用和TPM之间的授权会话及授权认证,从而保证计算机能够完成安全计算和安全存储的工作,使计算平台达到更高的安全性。

关键词: TPM安全芯片, 软件协议栈, 可信计算, 安全体系结构

Abstract: To solve the problem of computer security, this paper puts forward a new computer architecture based on TPM chip by designing a software protocol stack TSS based on security chip. By using this protocol stack to call kernel service modules through API, the problem of trusted platforms in distance communication can be solved. In the security chip based on TPM, authorization and authentication management based on multi-protocol are designed and implemented to realize authorized communication and authentication between upper application and TPM, ensuring that the computer is able to accomplish the task of safe computation and safe store to enhance the security level of the computing platforms.

Key words: TPM security chip, software protocol stack, trusted computation, security architecture

中图分类号: