A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module

被引:0
|
作者
Kim, Daewon [1 ]
Jeon, Yongsung [1 ]
Kim, Jeongnyeo [1 ]
机构
[1] Elect & Telecommun Res Inst, Cyber Secur Res Dept, Daejeon, South Korea
关键词
Platform integrity verification; trusted platform module; mobile trusted module; hardware security module; secure boot;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We are developing a new hardware security module based on the tamper-proof IC (Integrated Circuit) card to enhance the insufficient functions of previously known modules. The functions of our module includes platform integrity verification, cryptography management, security services such as banking, payment, etc., internal storage management, and the access control based on application integrity verification. This paper presents a method based on platform integrity verification for activating our new module. Under the situation of maliciously tampered platform, the method makes the module to any disabled status although the boot process is completed.
引用
收藏
页码:1174 / 1176
页数:3
相关论文
共 50 条
  • [31] A new security scheme of trusted mobile platform based on MTM
    Yang, Manzhi
    Zhou, Huixiang
    ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 415 - 418
  • [32] Feasibility Study of Dynamic Trusted Platform Module
    Kanuparthi, Arun K.
    Zahran, Mohamed
    Karri, Ramesh
    2010 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2010, : 350 - 355
  • [33] A Lightweight Anonymous Mobile Shopping Scheme Based on DAA for Trusted Mobile Platform
    Yang, Bo
    Feng, Dengguo
    Qin, Yu
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 9 - 17
  • [34] Novel design of trusted platform control module
    Institute of Electronic Technology, Information Engineering University, 12 East Shangcheng Road, Zhengzhou 450004, China
    不详
    Wuhan Daxue Xuebao Xinxi Kexue Ban, 2008, 10 (1011-1014):
  • [36] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [37] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [38] ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)
    Munoz, Antonio
    Farao, Aristeidis
    Casas Correia, Jordy Ryan
    Xenakis, Christos
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 147 - 165
  • [39] A mobile and portable trusted computing platform
    Surya Nepal
    John Zic
    Dongxi Liu
    Julian Jang
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [40] A mobile and portable trusted computing platform
    Nepal, Surya
    Zic, John
    Liu, Dongxi
    Jang, Julian
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011, : 1 - 19