Font Size: a A A

Trusted Computing Platform Application Research

Posted on:2014-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:B W WenFull Text:PDF
GTID:2268330425953332Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the continuous development of the intelligent platform technology, the computer network scale constantly expanding, and the number of terminals has rapidly increased. Increase for the difficulty of the information security protection, only using the traditional access authentication mode has been hard to ensure the user’s information security. The emergence of the trusted computing has brought a new kind of safe protection of ideas, that is, protect the integrity and the authenticity of the terminal, and protect the security of data, to achieve the terminal trusted certification. But the existing problem is that trusted computing application software development is difficult, and lack of the mature available development platform. According to this problem, this paper based on the TCG release specification about TSS1.2and TPM1.2to build trusted computing platform, and based on it do a research of trusted computing platform technology, mainly achieve the following research results:(1) Build trusted computing platform. Use TPM emulator as TPM hardware simulator to build trusted computing platform on Linux systems according to the specification. Allows the application can be invoked TPM functions through the platform. Lay a solid foundation for subsequent research and component development.(2) Design and implement trusted software development components. On the trusted computing platform, based on the design of trusted computing function module, on the trusted protocol stack Tss use object-oriented programming ideas, integration and abstracts the trusted function module interface, makes the application can invoke the related function module directly.(3) Proposed Kerberos protocol security reinforcement scheme and a trusted access protocol.Use of trusted computing technology to reinforce the classic Kerberos protocol, at the same time from the perspective of software development to design a trusted access protocol to verify the availability of trusted software development components, and providing a reference for the development of other programmer.(4) Verify the Trusted computing platform function and test the components’ efficiency. By invoking the trusted software component interface, invoke the trusted computing function module, to verify that the availability and correctness of software components. Test execution efficiency of each function, and compared with CPU execution efficiency. Experimental results show that the efficiency of TPM exexue the encrypt and hash computation has30times and124times higher than CPU, at the same time TPM can also save the CPU resource about23%.
Keywords/Search Tags:trusted computing, trusted computing platform, trusted platformmodule, trusted software development components
PDF Full Text Request
Related items