作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2012, Vol. 38 ›› Issue (20): 89-92. doi: 10.3969/j.issn.1000-3428.2012.20.023

• 安全技术 • 上一篇    下一篇

基于可信计算的结构性安全模型设计与实现

宗 涛   

  1. (瑞达信息安全产业股份有限公司,上海 200235)
  • 收稿日期:2011-12-09 修回日期:2012-02-22 出版日期:2012-10-20 发布日期:2012-10-17
  • 作者简介:宗 涛(1974-),男,硕士、CCF会员,主研方向:信息安全,可信计算
  • 基金资助:

    国家“863”计划基金资助项目(2009AA012437)

Design and Realization of Structural Security Model Based on Trusted Computing

ZONG Tao   

  1. (Jetway Information Security Industry Inc., Ltd., Shanghai 200235, China)
  • Received:2011-12-09 Revised:2012-02-22 Online:2012-10-20 Published:2012-10-17

摘要: 鉴于可信计算可以弥补传统安全防护技术在构架设计和防护强度上存在的安全风险,提出一种可信计算安全模型,从信任链着手,将嵌入式可信安全模块、智能卡等模块引入可信计算平台,对关键技术的实现进行介绍,包括以J3210为核心的可信硬件平台、嵌入式操作系统 JetOS、BIOS安全增强、操作系统的安全增强以及基于智能卡的用户身份认证。

关键词: 可信计算, 结构性安全模型, 可信密码模块, 安全增强, 信任链

Abstract: In view of the trusted computing can make up for the traditional security protection technology in architecture design and protection on the strength of security risks exist, this paper puts forward a kind of structural security model. From trust chain, it introduces the embedded trusted security module and one smart card module into trusted computing platform. The realization methods of the key technologies of J3210, JetOS, BIOS enhancement, OS security enhancement and user identity authentication based on smart card are given.

Key words: trusted computing, structural security model, trusted cryptography module, security enhancement, trust chain

中图分类号: