Font Size: a A A

Dedicated Trusted Computing Research And Design Of The Network

Posted on:2012-03-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2218330368997817Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
In recent years, the study of trusted computing technology, trusted platform technology has made some progress, based on the improvement of the existing hardware and software, new breakthroughs in key technologies to verify the system feasibility, reasonableness, and adaptability. of trusted computing platform project.Research and design of hardware-based PCI card and software protocol stack of computer security protection system. Design and trial password Trusted Computing platform in line with standard PCI interface defined by the Trusted Platform Module. The module supports the platform authentication, integrity measurement and reporting, secure storage of important information, cryptographic operations, and auditing services. Password and the transformation of the BIOS module will be trusted as a trusted root, installed on a common computing platform based on trusted cryptographic module, combined with the trusted BIOS, trusted software stack, providing trusted computing platform security capabilities, with anti- network attacks, malicious code attack prevention, anti-theft password capability. As a basis for the transmission through the chain of trust to the entire computer hardware platforms, operating systems and application software to provide credible support for the transformation of ordinary computing platforms provide a trusted computing platform password economical and practical method.Trusted Computing platform ensure legitimate users of the machine resources are safe to use, and to prevent unauthorized users from malicious intrusions, but can not control its legitimate users on the Internet for ultra virus acts of abuse, it is necessary for the practical application of specific requirements and management system using access control and authentication measures, based on the true identity of the chain of trust by trusted computing platforms extends to the network password.This article is based on the TCG trusted computing, trusted computing modules and PC-related security solutions, combined with the actual situation and the user requirements, the project study design cards based on PCI-TCM computer security protection system. Credibility of the terminal platform will extend to the network, , provide security for the network, and proposes a framework to build a specialized trusted network of, and particular trusted network model has been implemented and verified, the dedicated Trusted network model in line with most organizations management and authorization of the actual process, easy to form a flexible, controllable, manageable network trust system, to facilitate the implementation of the higher concentration of a large number of user security control, with small costs on operation and maintenance.
Keywords/Search Tags:trusted network connect, Trusted computing, trusted platform module, integrity measurement, trusted attestation
PDF Full Text Request
Related items