The paper analyzes security of UCON model and puts forward the TUCON model based on Trusted Computing Module(TPM).
主要对UCON模型的安全性进行了分析,并将可信计算模块TPM引入UCON模型,构建了基于TPM的使用控制模型——TUCON模型。
The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.
可信计算是在计算和通信系统中广泛使用基于硬件安全模块支持下的可信计算平台,以提高整体的安全性。
Trusted computing enhances computer systems'security by adding some module on both software and hardware.
可信计算通过在软件和硬件上增加一些组件来增加计算机系统的可信赖性。
With the development of information technology, the advantage of trusted computer in security is much accounted of The Trusted platform module is the core of Trusted Computing PC.
随着信息技术的飞速发展,可信计算机在安全方面的优越性越来越受到国内外计算机领域工作者的重视。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
应用推荐