Font Size: a A A

Design And Implementation Of Software Secure Download Based On Trusted Computing

Posted on:2011-05-19Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2178360305964095Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of broadband network technology, people increasingly rely on the information from the Internet. Software downloading ,as an important way to access information in the fields of e-commerce and e-goverment and digital rights management, has a wide range of applications. However, before and during the downloading, software are often faced with malicious code threats such as viruses, Trojan horses, worms, malicious software. It's of great importance to ensure the software security before and during the downloading. Trusted computing-related technology, which is focusing on the information security and becoming the main research directions, provides the basis. This paper is based on it to carry out relevant research. about software secure downloading.In this paper, on the basis of the analysis and research of current software downloading scheme, a new software downloading scheme based on Trusted computing is proposed, which uses technologies for integrity measurement, platform authentication and encryption servers. Then the framework and details of software downloading are described, of which includes the design of software authentication and software downloading protocol in details. This scheme improves security, integrity and reliability of downloading software, thus providing higher security for software downloading. Secondly, according to the proposed scheme based on trusted computing , key parts -- the software authentication before downloading and the software download protocol during downloading are specifically implemented. By experimental analysis, it can reduce malicious code threats such as viruses, Trojan horses, worms, malicious software, which improves the safety before and during software downloading.
Keywords/Search Tags:Software download, Trusted computing, Integrity measurement
PDF Full Text Request
Related items