Wuhan University Journal of Natural Sciences

, Volume 12, Issue 1, pp 21–24 | Cite as

A new approach of TPM construction based on J2810

  • Zhao Bo 
  • Zhang Huanguo Email author
  • Huang Rui 


Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation—essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. Existing TPM products have some limitations. This paper adopts J2810TPM Single Chip cryptogram MCU produced by Jetway Company to construct typical TPM after comparing existing TPM products. Finally, an improved construction approach of TPM based on J2810 is proposed.

Key words

trusted platform model(TPM) trusted computing J2810 

CLC number

TP 309 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Trusted Computing Group. Reference Architecture for Interoperability (Part I) TCG Copyright Specification Version 1.0[EB/OL]. [2005-06-16].
  2. [2]
    Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1.2, Revision 94[EB/OL]. [2006-03-09].
  3. [3]
    Trusted Computing Group. TPM Main Part 2 TPM Structures Specification version 1.2, Level 2 Revision 94. [EB/OL] [2006-03-09].
  4. [4]
    Trusted Computing Group. Trusted Computing Platform Alliance. (TCPA) Main Specification Version 1.1b [EB/OL]. [2005-06-16].
  5. [5]
    Pearson S. Trusted Computing Platforms, the Next Security Solution[R]. Beaverton, USA: Trusted Computing Group Administration, 2002.Google Scholar
  6. [6]
    Marchesini J, Smith S W. Open-Source Applications of TCPA Hardware[C]//Computer Security Applications Conference, 2004. 20th Annual. Tucson: IEEE Press, 2004: 294–303.Google Scholar
  7. [7]
    Manferdelli J. An Open and Interoperable Foundation for Secure Computing[C]//Windows Trusted Platform Technologies Information Newsletter. Boston: MS Press, 2003:383–387.Google Scholar
  8. [8]
    Zhao Bo, Zhang Huanguo. Implementation of the Trusted Computing in Commercial Cryptogram Based on Embedded System [C]//Proceedings International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, September, 2005.Google Scholar
  9. [10]
    Kagal L, Cost S, Finin T, et al. A Framework for Distributed Trust Management[EB/OL]. [2006-03-10],2001.

Copyright information

© Wuhan University Journals Press 2007

Authors and Affiliations

  1. 1.School of ComputerWuhan UniversityWuhanChina

Personalised recommendations