Zhining Lv, Yu Du, Zhonghang Li, Wei Liu, Bing Qi, Shan He, Wei Wang, Jingbin Liu
{"title":"基于信任链的可信终端系统研究","authors":"Zhining Lv, Yu Du, Zhonghang Li, Wei Liu, Bing Qi, Shan He, Wei Wang, Jingbin Liu","doi":"10.1109/ICISCAE51034.2020.9236914","DOIUrl":null,"url":null,"abstract":"This paper presents a system in the trusted platform called Trusted Terminal System (TTS). Based on Trusted Cryptography Module (TCM), TTS establishes an comprehensive protection system of the terminal host via several key technologies such as trusted boot, kernel measurement and integrity report. Also, TTS sends the integrity status of terminal to the Trusted Terminal Attestation Server (TTAS) by remote attestation technology for the purpose of ensuring the terminal within a trusted environment. The paper illustrates the fundamental of the TTS, and also the key technologies and implementation method based on it. Finally, the paper describes the construction technology of TTS based on the TCM and analyzes its performance.","PeriodicalId":355473,"journal":{"name":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","volume":"8 3-4","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Trusted Terminal System Based on Trust Chain\",\"authors\":\"Zhining Lv, Yu Du, Zhonghang Li, Wei Liu, Bing Qi, Shan He, Wei Wang, Jingbin Liu\",\"doi\":\"10.1109/ICISCAE51034.2020.9236914\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a system in the trusted platform called Trusted Terminal System (TTS). Based on Trusted Cryptography Module (TCM), TTS establishes an comprehensive protection system of the terminal host via several key technologies such as trusted boot, kernel measurement and integrity report. Also, TTS sends the integrity status of terminal to the Trusted Terminal Attestation Server (TTAS) by remote attestation technology for the purpose of ensuring the terminal within a trusted environment. The paper illustrates the fundamental of the TTS, and also the key technologies and implementation method based on it. Finally, the paper describes the construction technology of TTS based on the TCM and analyzes its performance.\",\"PeriodicalId\":355473,\"journal\":{\"name\":\"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)\",\"volume\":\"8 3-4\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCAE51034.2020.9236914\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCAE51034.2020.9236914","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Trusted Terminal System Based on Trust Chain
This paper presents a system in the trusted platform called Trusted Terminal System (TTS). Based on Trusted Cryptography Module (TCM), TTS establishes an comprehensive protection system of the terminal host via several key technologies such as trusted boot, kernel measurement and integrity report. Also, TTS sends the integrity status of terminal to the Trusted Terminal Attestation Server (TTAS) by remote attestation technology for the purpose of ensuring the terminal within a trusted environment. The paper illustrates the fundamental of the TTS, and also the key technologies and implementation method based on it. Finally, the paper describes the construction technology of TTS based on the TCM and analyzes its performance.