A document protection solution in mobile platform based on trusted computing

被引:0
|
作者
Yu, Xiaojun [1 ]
Wen, Qiaoyan [1 ]
Yan, Tao [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100088, Peoples R China
关键词
document protection; mobile office; trusted computing; transparent encryption;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile office is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means application could run independent to the security module and keep the consistency of user experience. The trusted mobile client platform architecture and security functions process of the mobile document protection system are detailed. The security analysis shows the proposed solution could provide well security enhancement for document protection in mobile platform.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [1] Content Protection based on Trusted computing in Mobile Terminal
    Liu Ren
    Niu Dongxiao
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 192 - 195
  • [2] A mobile and portable trusted computing platform
    Surya Nepal
    John Zic
    Dongxi Liu
    Julian Jang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [3] A mobile and portable trusted computing platform
    Nepal, Surya
    Zic, John
    Liu, Dongxi
    Jang, Julian
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011, : 1 - 19
  • [4] A Practical Solution to Trusted Computing Platform Testing
    Zhang, Huanguo
    Luo, Jie
    Yan, Fei
    Xu, Mingdi
    He, Fan
    Zhan, Jing
    [J]. APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 79 - 87
  • [5] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [6] The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform
    Shen, Zhidong
    Wu, Xiaoping
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 672 - 676
  • [7] RT Framework Based on Trusted Computing Platform
    Geng, Xiuhua
    Han, Zhen
    Cai, Ying
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2770 - 2773
  • [8] A Private-data Protection Mechanism for Trusted Mobile Platform
    Li, Tao
    Hu, Aiqun
    [J]. 2012 7TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2012, : 222 - 226
  • [9] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [10] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384