作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2008, Vol. 34 ›› Issue (22): 239-241. doi: 10.3969/j.issn.1000-3428.2008.22.084

• 工程应用技术与实现 • 上一篇    下一篇

嵌入式终端可信计算环境的关键技术

王震宇1,刘鑫杰1,任 杰1,刘海雷1,吴 杰2   

  1. (1. 解放军信息工程大学信息工程学院,郑州 450002;2. 中国人民解放军九五八七九部队,成都 610081)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2008-11-20 发布日期:2008-11-20

Key Technologies for Trusted Computing Environment on Embedded Terminal

WANG Zhen-yu1, LIU Xin-jie1, REN Jie1, LIU Hai-lei1, WU Jie2   

  1. (1. Information Engineering Institute, PLA Information Engineering University, Zhengzhou 450002; 2. PLA 95879 Army, Chengdu 610081)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-11-20 Published:2008-11-20

摘要: 阐述了在嵌入式终端上构建可信计算环境相关的嵌入式可信引导、TPM的扩展和驱动设计、嵌入式可信软件栈和嵌入式可信安全组件等关键问题。嵌入式可信引导可结合BR, USBKey和TPM等技术,保证用户、终端和应用三者间的可信认证。给出的嵌入式终端可信计算环境的方案保证了嵌入式可信平台的可重用性,同时也使平台具有更高的安全性和实用性。

关键词: 嵌入式终端, 可信引导, 可信软件栈, 可信安全组件

Abstract: The paper discusses the key problems to build embedded trusted computing environment, such as embedded trusted boot process, the extension and driver design of TPM, embedded TSS and trusted security component. The embedded trusted boot process is able to ensure the trusted attestation among users, terminals and application by making a combination of BR, USBKey and TPM. The scheme is able to make embedded platform more secure, practical and reusable.

Key words: embedded terminal, trusted boot, trusted software stack, trusted security component

中图分类号: