Font Size: a A A

The Research Of The Trusted Computing System Based On The Lenovo's Security Chip

Posted on:2008-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:R M DongFull Text:PDF
GTID:2178360212998418Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Network security is based on the end-point security. When we are enjoying the in-connection and sharing, we also expect that the information is protected from leaking. If the system's behavior and its running environment can be known ahead of time, we think the system's behavior is predicable. If the system is running predicable under almost any operating condition, we consider the system's behavior as controllable. Working in this way, the system can be highly decrease the chance to be attack and is always running in secure mode. We call this kind of system as trusted platform. Trusted computing conbines the hard and software technology, and functions identity attestation, data protection, and integrity protection by add a security chip to the platform. How to implement the three security mechanisms is this paper's goal.For this objective, the research is supported by the trusted computing technology. This thesis implements and verifies the security chip according to the TCG group's creterias.The thesis includes as follows:1. It analyzed the current security technology and requirements for its development, and points out the direction for its development.2. It introduced the concept of trusted computing, and three main directions. It analyzed the trusted computing architecture based on the TCG group's specification.3. It focused on the TPM chip based on the TCG's specification and introduced TPM's tree functions.4. It brought forward to a way of implementing the TPM, and emphesised on implementing the AIK management module and data security storage module.5. It tested the security chip in the practical environment and verified its functions.The results proved that the hardware is useful and available.
Keywords/Search Tags:Trusted Platform, Trusted Platform Module, Trusted Software Stack, Direct Anonymous Attestation
PDF Full Text Request
Related items