Font Size: a A A

Technology Research And Application, Based On The Credibility Of The Pci Card Guide

Posted on:2012-10-01Degree:MasterType:Thesis
Country:ChinaCandidate:K TianFull Text:PDF
GTID:2218330335986414Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer technology,people's lives are becoming more and more convenient.At the same time,computer security has become increasingly prominent. The traditional solutions to computer security problems are to defend against computer terminal security problems through security softwares. But it can not fundamentally solve the problem of computer security.Trusted computing is an effective solution to computing security problem.The idea of trusted computing is to solve the current computer security issues by using the method of trusted startup through the establishment of a trusted chain with the help of trusted hardware.The advocate of this idea is to establish a trusted computer system on the basis of the computer's own system architecture structure.It is a kind of effective solutions to computer security issues.The subject is a part of the National Natural Science Foundation of China "A Research to Trusted Access Policy of I/O Resource Based on Multi-core"(Fund Code: 60850002).The main work of this subject is to study how to achieve trusted startup in the computer system on the PCI card.CH364 card is the platform of this research,which is a PCI card with option rom.CH364 option rom can store data. Based on the research of CH364 card and option rom,in accordance with the trusted computing specifications,this paper proposed and implemented BIOS-level trusted startup.In this paper,designed and implemented trusted storage space,which can store the initial values of computer information,trusted logs, the platform configuration registers,etc;built trusted samples warehouse;implemented two BIOS-level algorithms, generation and storage of the root key and user keys;designed and implemented the BIOS-level authentication system based on key and U DISK,designed the BIOS-level trusted chain and implemented The Windows Files Trusted Access System.This system consists of two modules:the System Authentication Module and the Trusted Access Module.This system can allow users to access personal files trusty.Our experiment proves that the BIOS-level trusted startup policy can effectly examine the trustworthiness of computer system. And the trusted startup of computer system has been implemented.The Windows Files Trusted Access System can measure the trustworthiness of user files.Users can trusty access personal files.
Keywords/Search Tags:trusted chain, option rom, CH364, BIOS-level trusted startup, Windows Files Trusted Access System
PDF Full Text Request
Related items