Dual system trusted terminal computing architecture based on TPCM RoT

Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture based on the Chinese national standard GB/T 4...

Full description

Saved in:
Bibliographic Details
Main Authors: HUANG Jianhui, ZHANG Jiangjiang, SHEN Changxiang, ZHANG Jianbiao
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2025-04-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025047/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture based on the Chinese national standard GB/T 40650-2021 trusted platform control module (TPCM) trusted root was proposed. A dual architecture was adopted to implement a progressive parallel trusted execution environment architecture based on trusted roots, solving the problems of terminal device source, platform execution environment, and terminal device trusted management from the perspectives of hardware trusted root chips and underlying basic software. The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data.
ISSN:1000-436X