Network security is based on the end-point security. When we are enjoying the in-connection and sharing, we also expect that the information is protected from leaking. If the system's behavior and its running environment can be known ahead of time, we think the system's behavior is predicable. If the system is running predicable under almost any operating condition, we consider the system's behavior as controllable. Working in this way, the system can be highly decrease the chance to be attack and is always running in secure mode. We call this kind of system as trusted platform. Trusted computing conbines the hard and software technology, and functions identity attestation, data protection, and integrity protection by add a security chip to the platform. How to implement the three security mechanisms is this paper's goal.For this objective, the research is supported by the trusted computing technology. This thesis implements and verifies the security chip according to the TCG group's creterias.The thesis includes as follows:1. It analyzed the current security technology and requirements for its development, and points out the direction for its development.2. It introduced the concept of trusted computing, and three main directions. It analyzed the trusted computing architecture based on the TCG group's specification.3. It focused on the TPM chip based on the TCG's specification and introduced TPM's tree functions.4. It brought forward to a way of implementing the TPM, and emphesised on implementing the AIK management module and data security storage module.5. It tested the security chip in the practical environment and verified its functions.The results proved that the hardware is useful and available. |