A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module

被引:0
|
作者
Kim, Daewon [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [1 ]
机构
[1] Elect & Telecommun Res Inst, Cyber Secur Res Dept, Daejeon, South Korea
关键词
Platform integrity verification; trusted platform module; mobile trusted module; hardware security module; secure boot;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are developing a new hardware security module based on the tamper-proof IC (Integrated Circuit) card to enhance the insufficient functions of previously known modules. The functions of our module includes platform integrity verification, cryptography management, security services such as banking, payment, etc., internal storage management, and the access control based on application integrity verification. This paper presents a method based on platform integrity verification for activating our new module. Under the situation of maliciously tampered platform, the method makes the module to any disabled status although the boot process is completed.
引用
收藏
页码:1174 / 1176
页数:3
相关论文
共 50 条
  • [21] A Trusted Platform Module Based Anti-Forensics System
    Goh, Weihan
    Leong, Peng Chor
    Yeo, Chai Kiat
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 46 - 50
  • [22] Method for building hardware emulating platform in trusted mobile terminal
    Tang, Kai
    Xu, Xin
    Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 164 - 168
  • [23] Blockchain based secret key management for trusted platform module standard in reconfigurable platform
    Paul, Rourab
    Ghosh, Nimisha
    Panigrahi, Amrutanshu
    Chakrabarti, Amlan
    Mohapatra, Prasant
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (22):
  • [24] A Design of the Trusted Platform Module Based on Multi-Core Processor
    Wang Yubo
    Mao Junjie
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 538 - 541
  • [25] RAVS: Remote attestation of video security based on trusted platform module
    Ma, Q. (maqiang_my@163.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (09):
  • [26] hTPM: Hybrid Implementation of Trusted Platform Module
    Kim, Yongjin
    Kim, Evan
    PROCEEDINGS OF THE 1ST ACM WORKSHOP ON WORKSHOP ON CYBER-SECURITY ARMS RACE (CYSARM '19), 2019, : 3 - 10
  • [27] Secure DRM scheme for future mobile networks based on trusted mobile platform
    Zheng, Y
    He, D
    Wang, HX
    Tang, XH
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1164 - 1167
  • [28] Development of a Module Based Platform for Mobile Robots
    Su, Kuo L., Jr.
    Guo, H.
    Shiau, Sheng V.
    2008 IEEE WORKSHOP ON ADVANCED ROBOTICS AND ITS SOCIAL IMPACTS, 2008, : 137 - 142
  • [29] Formal analysis and testing of trusted platform module
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    不详
    Jisuanji Xuebao, 2009, 4 (646-653):
  • [30] Secure user authentication based on the trusted platform for mobile devices
    Kim, GeonLyang
    Lim, JaeDeok
    Kim, JeongNyeo
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2016,