检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]国网安徽省电力公司信息通信分公司,安徽合肥230061
出 处:《电力信息与通信技术》2017年第1期64-68,共5页Electric Power Information and Communication Technology
摘 要:随着国家对信息安全意识的不断加强,我国开始大力推进提高信息技术自主可控能力,其中可信计算起到十分关键的作用。目前国外主流IT厂商、标准组织建立的是以TPM为核心的技术规范体系,为了打破国外对可信计算的技术垄断,我国相关管理机构、科研组织和科技公司联合制定具有自主知识产权的可信密码模块(Trusted Cryptography Module,TCM)技术体系,推动中国可信计算产业发展。文章提出基于定制化服务器开展TCM应用研究,对系统启动过程进行分析,建立以可信基本输入输出系统(Basic Input Output System,BIOS)为可信根,并将可信性传递到可信主引导记录(Main Boot Record,MBR),最终实现系统可信的可信链。结果显示,基于可信BIOS和可信MBR双重保障的系统具有较好的安全可行性。With the increasing awareness of information security, China began to vigorously promote information technology to improve the selfLcontrol ability, and trusted computing plays a very crucial role. At present, foreign mainstream IT vendors, standards organizations take TPM system as the core technical specifications. In order to break the monopoly of foreign technology for trusted computing, our regulatory agencies, research organizations and technology companies jointly develop the TCM technology system with independent intellectual property rights, and promoted China trusted computing industry development. This paper presents a TCM application research based on the customized servers, analyzes the system startup process, then establishes trusted BIOS as a trusted root and delivers credibility to MBR, and ultimately the system trusted chain is realized. The results show the system based on trusted BIOS and MBR has a good feasibility.
关 键 词:可信密码模块(TCM) 可信链 可信BIOS 可信MBR
分 类 号:TP311[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.117