User bound portable trusted mobile device

A mobile device and portable technology, applied in computer security devices, user identity/authority verification, instruments, etc., can solve the problems of complex key migration and authorization, inconvenient use of TPM, etc.

Inactive Publication Date: 2009-11-18
BEIJING JIAOTONG UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to TCG's Trusted Platform Module (Trusted Platform Module, TPM) main specification, the trusted system with the trusted platform module as the root of trust is based on the TPM, the binding relationship between the TPM and the computer motherboard, and the TPM and the computer. BIOS verification relationship constitutes such a trusted guarantee that the TPM, computer terminal and user form a 1:1:N relationsh...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User bound portable trusted mobile device
  • User bound portable trusted mobile device
  • User bound portable trusted mobile device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Below in conjunction with accompanying drawing and embodiment the present invention is described in detail:

[0048] figure 1 It is a structural diagram of a portable trusted mobile device according to a specific embodiment of the present invention. Such as figure 1 As shown, the portable trusted mobile device includes the following components:

[0049] 1. On-chip service device for secure computing and management

[0050] The on-chip service device for secure computing and management establishes an independent computing and management environment, which is provided by a single-chip chip with security protection capabilities. According to an embodiment of the present invention, the single-chip chip preferably adopts, for example, ZTE integrated Z32U chip. It should be clear to those skilled in the art that the single-chip chip with security protection capability is not limited to this kind of chip.

[0051] Such as figure 1 As shown, the on-chip service device for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user bound portable trusted mobile device (PTPM), belonging to the field of information security protection. In the prior art, the corresponding relation between a trusted terminal and a trusted platform module (TPM) is 1:1, and the corresponding relation between the trusted terminal and the user is 1:N, namely, the relation among the trusted terminal, the TPM and the user is 1:1:N, so that one user can not conveniently and safely use TPMs in a plurality of terminals in a security domain. In the independent running environment of the PTPM, the device has safe computing power, key management capability, signature and ID authentication capability, special cryptographic algorithm download execution and high rate data encryption and decryption capability as well as safe guarding capability of high&low voltage and frequency detection. By adopting a method of the invention, the user can be bound with the PTPM under the existing condition, and a single user can safely and simply use different trusted terminals in the security domain.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a portable trusted mobile device bound to a user. Background technique [0002] The development of computer technology and network communication technology has brought incomparable flexibility to the business needs of enterprises and individual users. With the continuous development of these technologies, various devices are becoming more and more diversified, miniaturized, intelligent and mobile direction of development. The security of various information and data of users in storage, transmission and application operation is constantly being challenged. [0003] In order to solve the security and trust issues in terminals and networks, the Trusted Computing Group (Trusted Computing Group, TCG) provides a series of standards, the purpose of which is to ensure the security of the entire network by enhancing the security of the existing terminal architecture. So as to build a t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/00G06F21/71
Inventor 刘吉强韩磊张大伟韩臻
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products