Journal of Information Security Research ›› 2016, Vol. 2 ›› Issue (9): 834-844.

Previous Articles     Next Articles

Research on Trusted Computing Technology and Its Development

  

  • Received:2016-09-19 Online:2016-09-15 Published:2016-09-19

可信计算技术及其进展研究

王群   

  1. 江苏警官学院
  • 通讯作者: 王群
  • 作者简介:博士研究生,教授,主要研究方向为网络体系结构与协议、物联网、可信计算、信息安全. wqun@jspi.edu.cn

Abstract: Trusted computing is an important application and research branch of the information security field, it is an effective mechanism to solve the current information security from the view of system. This paper describes the concept of trusted computing technology, and mainly analyzes the system of key management and the type of certificate in the trusted computing domain, and discusses the trusted platform module (TPM) and trusted computing platform (TCP). Based on the research of basic theory and realization method in the trusted computing domain,this paper summarizes the research progress of trusted computing and put forward the research direction of trusted computing.

Key words: trusted computing, key system, digital certificate, trusted platform module (TPM), trusted computing platform (TCP)

摘要: 可信计算是信息安全领域一个重要的应用和研究分支,是从系统角度解决当前信息安全隐患的一种有效机制.介绍了可信计算技术的基本概念,重点对可信计算的密钥管理体系和证书类型进行了系统分析,对可信平台模块和可信计算平台进行了讨论.通过对可信计算基础理论和实现方法的研究,总结了可信计算的研究进展,提出了可信计算的研究方向.

关键词: 可信计算, 密钥体系, 数字证书, 可信平台模块, 可信计算平台