Font Size: a A A

Trusted Computing-Based Access Control For Mobile Terminal

Posted on:2007-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:L X XuFull Text:PDF
GTID:2178360182995626Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Recent developments in the mobile communication network and the B3G/4G technology, as well as the miniaturization of the mobile phone foster the widespread deployment of personal mobile equipment. Mobile phones are becoming ever more capable and are able to open up a broader range of applications in professional environments due to their increasing functionalities. The openness and the flexibility of the mobile platform have been important factors supporting their widespread adoption. However, that very same openness and flexibility is proved to be a double edged sword, since it reduces trustworthiness because of the hacker and virus. It has thus a pivotal importance to ensure the integrity and security of sensitive data stored in mobile phone, and a more secure access control policy is needed.Trusted computing technology has become a hot topic in the field of information security, which advances the ability of businesses, government agencies and consumers to conduct trustworthy electronic transactions. In October, 2004, the Trusted Computing Group has released a new security specification called "trusted mobile platform specification v1.00", upon which trusted mobile platform can be developed further.This paper focus on the access control policy for mobile terminal and explains the principles of the trusted computing, current mobile operating system as well as the hardware architecture. The author presents a trusted computing-based access control model. In this model illegal copying, executing and tampering of software could be resisted from different aspects and levels with the help of technology of dynamic passwords, role based access control (RBAC) and channel encryption etc. W77E58 was employed as the control center, combining with the ESAM and GPRS module to simulate the efficiency of prototype. Based on the results of the test, to sign a piece of short message only exhausts 416.4ms, therefore, the whole access control process will be completed within 673ms. It could be concluded that the module is highly efficient. At the end of paper, the author illustrates how reliable, secure and efficient of the access...
Keywords/Search Tags:Trusted computing, Access control model for mobile phone, Trusted platform module, Digital right management
PDF Full Text Request
Related items