Journal of Guangdong University of Technology ›› 2016, Vol. 33 ›› Issue (03): 37-42.doi: 10.3969/j.issn.1007-7162.2016.03.007

Previous Articles     Next Articles

 Trusted Environment Construction of Self-Service System Terminal Based on Trusted Computing Technology

Wei Ge1, Ren Xiang1, Liu Dan1, Wei Yu-jing2,Yu Yong-quan3,Wang Ming-hui3, Lin Wei3, He Yuan-lie3   

  1. 1.Guangdong Kamfu Information & Technology Co. Ltd., Foshan 528200, China;2. School of Management, Jilin University, Changchun 130022, China; 3. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2015-12-11 Online:2016-05-19 Published:2016-05-19

Abstract:

In this paper, the technology of trusted computing is employed to, on the root of trust of hardware, examine the credibility of computing device terminals level by level so as to greatly reduce the possibility of malicious attack on users by stopping the launching or operation of services if any software or hardware in a device is found abnormal. This research proposes a method to offer a trusted environment for self-service system terminals and solve the security problem of computer systems from the root.

Key words: trusted computing; trusted chain construction; integrity measurement; remote attestation; self-service system

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!