A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module

被引:0
|
作者
Kim, Daewon [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [1 ]
机构
[1] Elect & Telecommun Res Inst, Cyber Secur Res Dept, Daejeon, South Korea
关键词
Platform integrity verification; trusted platform module; mobile trusted module; hardware security module; secure boot;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are developing a new hardware security module based on the tamper-proof IC (Integrated Circuit) card to enhance the insufficient functions of previously known modules. The functions of our module includes platform integrity verification, cryptography management, security services such as banking, payment, etc., internal storage management, and the access control based on application integrity verification. This paper presents a method based on platform integrity verification for activating our new module. Under the situation of maliciously tampered platform, the method makes the module to any disabled status although the boot process is completed.
引用
收藏
页码:1174 / 1176
页数:3
相关论文
共 50 条
  • [1] Trusted mobile devices: Requirements for a mobile Trusted Platform Module
    McGill, K.N. (kathleen.mcgill@jhuapl.edu), 2013, John Hopkins University (32):
  • [2] Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
    McGill, Kathleen N.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 544 - 554
  • [3] An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module
    Kim, Daewon
    Kim, Jeongnyeo
    Cho, Hyunsook
    2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, 2013, : 782 - 784
  • [4] Integrity Measurement Enhanced Security for Mobile Agent Based on Trusted Computing Platform
    Wu, Xiaoping
    Zhang, Huanguo
    Shen, Zhidong
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4805 - +
  • [5] Research on Linux Trusted Boot Method Based on Reverse Integrity Verification
    Huang, Chenlin
    Hou, Chuanwang
    Dai, Huadong
    Ding, Yan
    Fu, Songling
    Ji, Mengluo
    SCIENTIFIC PROGRAMMING, 2016, 2016
  • [6] Firmware of trusted channel based on the trusted platform control module
    Mao Junjie
    Zhang Chongbin
    Zhang Baofeng
    Guo Ying
    Wu Yushu
    Xie Shihua
    Zhang Xiaofei
    Zhao Shuang
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192
  • [7] Trusted Platform Module Evolution
    Osborn, Justin D.
    Challener, David C.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 536 - 543
  • [8] Trusted platform Module evolution
    Osborn, Justin D.
    Challener, David C.
    Johns Hopkins APL Technical Digest (Applied Physics Laboratory), 2013, 32 (02): : 536 - 543
  • [9] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Ju, Hongil
    Kim, Youngsae
    Park, Jiman
    Park, Youngsoo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (01) : 134 - 140
  • [10] FPGA-based trusted platform module attack
    Jiang, W. (j8w8@sohu.com), 1600, Beijing University of Technology (39):