With the rapid widespread of portable facilities,it should pay more attention to the various security issues.The terminal security is an indispensable part of information security.How to create a trusted environment for terminal has always been the hotspot in this field.Trusted Computing is to build a security system for the purpose of the terminal.Through the analysis of the key issues of the credibility of the certification,a portable authentication based on Trusted Computing was designed and implemented.First of all,the thesis related to the China's Trusted Computing specification, including the analysis of Functionality and Interface Specification of Cryptographic Support Platform for Trusted Computing;according to the existing inadequacies in the program propose a user-oriented portable credible certification Mechanism.And then given the relevant principles of design and architecture,as well as the credibility associated with the root of the trust establishment and of a trust chain,it elaborates portable authentication mechanism in accordance with the relevant processes to elaborate on the various Components of the Design and Implementation.Portable credible identity of the application and research is of great practical significance and application prospects of large and medium-sized enterprises in network industries and government departments,such as e-government network for higher security environment to provide users with an effective end-based security Trusted Computing Environment. |