Font Size: a A A

Research And Implementation Of Trusted Computing Identity Authentication Techniques Based On Java Smart Card

Posted on:2010-09-02Degree:MasterType:Thesis
Country:ChinaCandidate:T L XuFull Text:PDF
GTID:2178360272482439Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology and the continuous progress of information construction, Java smart card and trusted computing technology are two important research directions in the field of information security. On the one hand, Java smart card has been widely applied in the fields of identification, electronic payment and so on. Unfortunately, it alse brings more and more attacks which definitely hamper its further prevalence and applications. On the other hand, the Trusted Computing Platform Alliance tries to build a trusted computing environment in the existing untrusted PC terminal by setting up the trust chain firstly and adopting a variety of identity authentication techniques.In this paper, based on the analysis of two technologies, a scheme and related design of the trusted Java smart card are presented to enhance the security of Java card by introducing trusted computing technology into Java smart card. In the scheme a trust chain is set up by transferring the trust from the root of trust for measurement, storage and reporting (which is stored in the ROM) to runtime environment and applet. The trusted Java smart card is produced according to the resume, then two identity authentication techniques (Trusted Third Party and Direct Anonymous Attestation) are implemented and tested by the remote attestation.
Keywords/Search Tags:Java smart card, Trusted computing technology, Identity authentication, Trust chain
PDF Full Text Request
Related items