Font Size: a A A

Research And Implementation Of Key Technology On Portable TPM

Posted on:2011-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:X W WuFull Text:PDF
GTID:2178360305460546Subject:Information security
Abstract/Summary:PDF Full Text Request
In researching and practicing of information security, people come to realize that most of the hidden security danger came from terminal hosts. Trusted computing technology takes comprehensive measures in aspects involving chips, hardware structures, operating systems etc. to setup trusted computing environment by establishing a trusted chain.Currently, the trusted computing research at home and abroad are mainly based on fixing Trusted Platform Module (TPM) or Trusted Cryptography Modules (TCM) on main board. For platform without integrated hardware of trusted computing module, the establishing of trusted chain is still in research. USB-key is used to complete part of the certification in guidance after power on in some applications, but it is not compatible enough with TPM/TCM.We will take smart card equipment based on the USB interface into the trusted computing platform structure, and design a kind of portable TPM module (PTPM). By transplanting the main measure function and storage function to secure smart card and connecting with the platform though USB interface, we can implement trusted measurement, trusted storage and trusted reporting. Compared with the traditional TPM, PTPM is removable, which makes its trusted connection with host platform become a key problem. The paper introduces the hardware and software structure of the PTPM and it's mechanism of trusted computing, explains the rationality of the design of PTPM. This paper also put forward the concept of "User Identity Binding" based on PTPM, and establish an applicable mode with single user access multiple platforms in PTPM. The key management and the user/platform management solution are recommended, too.This paper introduces the design and implementation of smart-card-based PTPM, including interface design, trusted function implementation, development processing orders. It implements important function of TPM involving trusted measure, key loading, signature etc. in PTPM. It also introduces setup of test environment and detail of test.
Keywords/Search Tags:Trusted Computing, TPM, Smart Card, Portable, User Identity Bonding
PDF Full Text Request
Related items