收录:
摘要:
Based on the trusted computing and security protocol technology, the paper designs the delegate-based property remote attestation protocol and proves the security applied the strand space theory. The protocol is designed in the public key infrastructure environment performs the function of the verifier delegation through the third trusted party, and realizes the transform from binary fingerprint to security property. This protocol sets up security channel and realizes access control mechanism based on authorization by cipher technology, which ensures integrity of communication terminal by trusted computing technologies. Our proposal meets the security request of the primary binary remote attestation with applicability and feasibility.
关键词:
通讯作者信息:
电子邮件地址: