Computer Engineering and Applications ›› 2007, Vol. 43 ›› Issue (16): 165-168.

• 网络、通信与安全 • Previous Articles     Next Articles

Study of TPM based on embedded technology

LIN Xiao-cha,LI Guang   

  1. Beijing Information Technology Institute,Beijing 100101,China
    North China Institute of Computing Technology,Beijing 100083,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-06-01 Published:2007-06-01
  • Contact: LIN Xiao-cha

基于嵌入式技术的信任根研究

林小茶,李 光   

  1. 北京信息工程学院,北京 100101
    华北计算技术研究所,北京 100083
  • 通讯作者: 林小茶

Abstract: With rapid development in recent years,the trusted computing technology has been recognized as a method to solve the computing security problems from the root,while the root of trust is the base of the trusted computing.This article briefly introduces the development history of the trusted computing,then analyzes some reasons of depression in the trusted product market,and finally digging into the root of trust,proposes two proposals for realizing the root of trust based on embedded technology,and supports these two proposals with detailed design concept as well.

摘要: 可信计算近年来发展迅速,被认为最有可能从根源上解决计算机的安全问题,信任根是可信计算的根本。简要介绍了可信计算的发展历史,分析了可信产品市场不景气的原因,从可信计算信任根的角度入手,提出了两种采用嵌入式技术来实现信任根的方案,并给出了方案的详细设计思想。