Font Size: a A A

Research Of TCM Applied On Native Platform

Posted on:2018-11-03Degree:MasterType:Thesis
Country:ChinaCandidate:B SunFull Text:PDF
GTID:2348330515983695Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Since the PRISM incident was PRISM was publicly revealed,the cyber information security has attracted more and more attention from the public,on the one hand it makes us see the independent control of information devices is the basis for the realization of information security,on the other hand also exposed large of loopholes existing in today's communications devices.As a new type of hardware-based information protection technology,trusted computing moves gradually into the public's sight.Trusted Computing Group guides the direction of the development of trusted computing around the world.However,due to the specificity of the trusted computing,we need to master the technology of trusted module and the related craft.China has also set up a Trustworthy Computing Development Alliance and other organizations to lead the development of China's trusted computing industry.TCM means Trusted Cryptography Module,is a cryptography chip according with native standard "Specification of Trusted Cryptography Support Platform Function and Interface".Compared to the TPM module introduced by Trusted Computing Group,TCM supports our commercial cryptography engine and is more in line with the needs of native market and the requirements of our country.This paper introduces the development of independent control in the information field and studies trusted communication.We set up a independent controllable trusted platform containing SSX-44 B TCM and the Loongson 3A series CPU and test its performance;port an open-source closed-circuit television monitoring software to this platform;use of TCM module to protect the monitor system.We verifies the feasibility of applying trusted computing technology to independent controllable platform.
Keywords/Search Tags:TCM, native and controllable, Loongson, trusted computing
PDF Full Text Request
Related items