期刊文献+

两种可信计算芯片的研究与分析 被引量:2

Research and Analysis on Trusted Computing Chips
原文传递
导出
摘要 可信计算芯片是可信计算的核心部件,承担着对可信计算平台软硬件系统的完整性度量、完整性报告和可信存储等任务。目前,国外可信计算芯片大多采用国际可信计算组织的可信平台模块TPM规范,而国内可信计算芯片依据的是可信平台控制模块规范。文中从芯片的主要功能、组成结构、接入方式和工作模式等方面,研究和分析了两类常见可信计算芯片,最后讨论了可信计算芯片面临的各种挑战。 Trusted computing chip, as the core component of trusted computer, bears the responsibilities of completeness measurement, completeness reporting, and trusted memory. Nowadays, most of the trusted computing chips abroad adopt trusted platform module TPM from international trusted computing organization, while the trusted computing chips at home are based on TPCM. From main functions, constitutions, access mode and working mode, this paper treats of and analyzes similarities and dissimilarities of these two kinds of trusted computing chips. Finally, various challenges confronted with by trusted computing chips are also discussed in this pape r
出处 《信息安全与通信保密》 2012年第12期88-91,94,共5页 Information Security and Communications Privacy
关键词 可信平台控制模块 可信平台模块 可信计算芯片 trusted platform control module trusted platform modules trusted computing chip
  • 相关文献

参考文献14

  • 1Trusted Computing Group. TPM Specification Versionl.2.Partl Design Principles[EB/OL]. (2007-7-9) [2011-12-10]. https : //www.trustedcomputinggroup.org/specs/TPM/Main_ Partl_rev94.zip.
  • 2Trusted Computing Group. TPM Specification Versionl.2.Part2 TPM Structures[EB/OL]. (2007-7-9) [2011-12-10]. https : //www.trustedcomputinggroup.org/specs/TPM/ Main_Part2_rev94.zip.
  • 3Trusted Computing Group. TPM Specification Versionl.2.Part3 TPM Commands[EB/OL]. (2007-7-9) [2011-12-10]. https : //www.trustedcomputiuggroup.org/specs/TPM/Main_ Part3_rev94 .zip.
  • 4Infineon. Trusted Platform Module(SLB9635TT1.2)[EB/OL]. [2011-12-15]. http: //www. infineon.com/cms/en/product/ channel.html ?channel=if80808112ab681 dO 112ab6921 ae01 1 f&pt=db3a304329a0f6ee0129acO94b 1 e5603.
  • 5徐娜,韦卫.基于安全芯片的可信平台设计与实现[J].计算机应用研究,2006,23(8):117-119. 被引量:9
  • 6赵佳,沈昌祥,刘吉强,韩臻.基于无干扰理论的可信链模型[J].计算机研究与发展,2008,45(6):974-980. 被引量:29
  • 7SHEN ChangXiang,ZHANG HuanGuo,WANG HuaiMin,WANG Ji,ZHAO Bo,YAN Fei,YU FaJiang,ZHANG LiQiang,XU MingDi.Research on trusted computing and its development[J].Science China(Information Sciences),2010,53(3):405-433. 被引量:38
  • 8张兴,毛军捷,刘贤刚,等.一种对BIOS进行保护的可信计算系统及其应用方法:中国专利,ZL200810111682.8[P].2010-06-23.
  • 9常晓林,刘吉强,韩臻,等.一种针对TPM可信计算的TOCTOU攻击响应方法:中国专利,200910078201[P].2010-06-02.
  • 10张谦,贺也平,孟策.解决度量-验证时间差的一种差值证明方法[J].通信学报,2009,30(S1):43-50. 被引量:2

二级参考文献55

共引文献73

同被引文献36

引证文献2

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部