Skip to main content
Log in

A new approach of TPM construction based on J2810

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Trusted platform model (TPM) is special-purpose integrated circuits (ICs) built into a variety of platforms to enable strong user authentication and machine attestation—essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. Existing TPM products have some limitations. This paper adopts J2810TPM Single Chip cryptogram MCU produced by Jetway Company to construct typical TPM after comparing existing TPM products. Finally, an improved construction approach of TPM based on J2810 is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Trusted Computing Group. Reference Architecture for Interoperability (Part I) TCG Copyright Specification Version 1.0[EB/OL]. [2005-06-16]. http://www.trustedcomputing.org.

  2. Trusted Computing Group. TPM Main Part 1 Design Principles Specification Version 1.2, Revision 94[EB/OL]. [2006-03-09]. http://www.trustedcomputing.org.

  3. Trusted Computing Group. TPM Main Part 2 TPM Structures Specification version 1.2, Level 2 Revision 94. [EB/OL] [2006-03-09]. http://www.trustedcomputing.org.

  4. Trusted Computing Group. Trusted Computing Platform Alliance. (TCPA) Main Specification Version 1.1b [EB/OL]. [2005-06-16]. http://www.trustedcomputing.org.

  5. Pearson S. Trusted Computing Platforms, the Next Security Solution[R]. Beaverton, USA: Trusted Computing Group Administration, 2002.

    Google Scholar 

  6. Marchesini J, Smith S W. Open-Source Applications of TCPA Hardware[C]//Computer Security Applications Conference, 2004. 20th Annual. Tucson: IEEE Press, 2004: 294–303.

    Google Scholar 

  7. Manferdelli J. An Open and Interoperable Foundation for Secure Computing[C]//Windows Trusted Platform Technologies Information Newsletter. Boston: MS Press, 2003:383–387.

    Google Scholar 

  8. Zhao Bo, Zhang Huanguo. Implementation of the Trusted Computing in Commercial Cryptogram Based on Embedded System [C]//Proceedings International Conference on Wireless Communications, Networking and Mobile Computing, Wuhan, China, September, 2005.

  9. Kagal L, Cost S, Finin T, et al. A Framework for Distributed Trust Management[EB/OL]. [2006-03-10] http://www.cs.umbc.edu/:_finin/papers/nimas01/nimas01.pdf,2001.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhang Huanguo.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90104005,60373087,60473023) and Key Laboratory of Geo-Informatics of State Bureau of Surveying and Mapping (200626)

Biography: ZHAO Bo(1972–), male, Ph. D. candidate, research direction: information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhao, B., Zhang, H. & Huang, R. A new approach of TPM construction based on J2810. Wuhan Univ. J. of Nat. Sci. 12, 21–24 (2007). https://doi.org/10.1007/s11859-006-0146-6

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-006-0146-6

Key words

CLC number

Navigation