Journal of Systems Engineering and Electronics ›› 2010, Vol. 32 ›› Issue (2): 437-440.

Previous Articles    

High trusted computer based on security control module

WANG Bin1,2,3, WU Qinzhang1, WANG Chunhong1, SUN Yongquan3, DU Zhongping3   

  1. (1. Inst. of Optics and Electronics, Chinese Academy of Sciences, Chengdu 610209, China;
    2. Graduate Univ. of Chinese Academy of Sciences, Beijing 100039, China;
    3. Beijing Inst. of Computer Technology and Applications, Beijing 100854, China)
  • Online:2010-02-03 Published:2010-01-03

Abstract:

At present, the integration and application of TPM security chip is mainly focused on, however the existing trusted computer has some shortages in root of trust protection, encryption storage of files and system security protection. Based on the trusted computing technology, a high trusted computer is put forward to solve the above problems, in which security control module is the physical trust root. The architecture and working principle of the high trusted computer is described. Meanwhile, the implementation of security control module and the trusted BIOS are analyzed in detail. The applicability of the proposed method is validated by a detailed experimental results.

[an error occurred while processing this directive]