{"title":"一种基于SoC的安全芯片系统架构设计方案","authors":"Luguo Zhang, Shengjun Wen, Ruijiao Wang, Guofang Zhang","doi":"10.1109/IWISA.2009.5072680","DOIUrl":null,"url":null,"abstract":"By analyzing threatens faced by the secure chip nowadays, we point out several disadvantages existing in current commonly adopted settle means, and present a system architecture scheme of the secure chip based on the trusted computing theory. This scheme, which can satisfy the requests of code downloaded by the user himself and multi-cryptographic function services, not only possesses security attributions of a normal secure chip, but also provides the stronger security protection for itself.","PeriodicalId":6327,"journal":{"name":"2009 International Workshop on Intelligent Systems and Applications","volume":"142 1","pages":"1-4"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A System Architecture Design Scheme of the Secure Chip Based on SoC\",\"authors\":\"Luguo Zhang, Shengjun Wen, Ruijiao Wang, Guofang Zhang\",\"doi\":\"10.1109/IWISA.2009.5072680\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By analyzing threatens faced by the secure chip nowadays, we point out several disadvantages existing in current commonly adopted settle means, and present a system architecture scheme of the secure chip based on the trusted computing theory. This scheme, which can satisfy the requests of code downloaded by the user himself and multi-cryptographic function services, not only possesses security attributions of a normal secure chip, but also provides the stronger security protection for itself.\",\"PeriodicalId\":6327,\"journal\":{\"name\":\"2009 International Workshop on Intelligent Systems and Applications\",\"volume\":\"142 1\",\"pages\":\"1-4\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Workshop on Intelligent Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWISA.2009.5072680\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Workshop on Intelligent Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWISA.2009.5072680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A System Architecture Design Scheme of the Secure Chip Based on SoC
By analyzing threatens faced by the secure chip nowadays, we point out several disadvantages existing in current commonly adopted settle means, and present a system architecture scheme of the secure chip based on the trusted computing theory. This scheme, which can satisfy the requests of code downloaded by the user himself and multi-cryptographic function services, not only possesses security attributions of a normal secure chip, but also provides the stronger security protection for itself.