Font Size: a A A

Udisk Chain Of Trust Dynamic Tracing Technology And Implementation

Posted on:2012-04-26Degree:MasterType:Thesis
Country:ChinaCandidate:C Y ShenFull Text:PDF
GTID:2208330335486291Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The times of information technology is coming, The traditional paper documents in every areas now have been replaced by electronic documents, In tradition, protecting paper documents is the core. the former safety management theory is not applicable to the safety management of electronic documents. it will produce a series of safety concerns.As mobile storage equipment available.Because of easy carrying, suit, it is received by users gradually.In addition to, memory capacity increasing, production technology is more and more developed and prices are down, the users perfer to choice bigger capacity mobile equipment storage. My paper is in recognition of the national natural science foundation"I/O resources' trusted access policy base on muti-core"(No:60850002),by dependent heterogeneous double processing system, based on embedded technology and trusted computing ideas to program mobile storage device driver to control chip design and function modules of mobile storage equipment,By studing measurement of trusting,model of trusted trace,require of trusted root,application of trusted computing and so on.designing trusted chain tracking measurement method base on Udisk, presenting credible scheme, the audit information recorded, unbelievable mobile storage equipment classification management, reliable boundary conditions, etc.combining the standard of norm of TCG,Reseaching and designing the autonomous model of trace of Udisk trusted chain. Trusted root and trusted chain is the foundation of trusted computing, In the premise that trusted root is trusted, completing the accessing to the whole process of Udisk,achieving securitor module,auditor module,user module.Making the common Udisk to the trusted Udisk. experimental result show that the scheme is an effective and reasonable, it can make true to manage documents security and dependably.
Keywords/Search Tags:Terminal security, Trusted computing, Embedded technology, Trusted chain, Trust for measurement, Transitive trust
PDF Full Text Request
Related items