Abstract:In the maintenance process on the trusted computing platform,the integrity,security and usability of the protected data must be ensured. According to the requirement,the key on the trusted platform and its usage is analyzed, the data need to be moved in the maintenance process is discussed, and a secure maintenance method is presented. Under the charge of four roles in the maintenance process: the owner of the source platform, the ownerof the destination platform, the TPM manufacturer, TTP, this method utilizes the securitycharacteristic of TPM to guarantee the security of the maintenance process .Key words:TPM;Trusted Computing;Maintenance
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore