Dual system trusted terminal computing architecture based on TPCM RoT
Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture based on the Chinese national standard GB/T 4...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2025-04-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025047/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849312957826072576 |
|---|---|
| author | HUANG Jianhui ZHANG Jiangjiang SHEN Changxiang ZHANG Jianbiao |
| author_facet | HUANG Jianhui ZHANG Jiangjiang SHEN Changxiang ZHANG Jianbiao |
| author_sort | HUANG Jianhui |
| collection | DOAJ |
| description | Due to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture based on the Chinese national standard GB/T 40650-2021 trusted platform control module (TPCM) trusted root was proposed. A dual architecture was adopted to implement a progressive parallel trusted execution environment architecture based on trusted roots, solving the problems of terminal device source, platform execution environment, and terminal device trusted management from the perspectives of hardware trusted root chips and underlying basic software. The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data. |
| format | Article |
| id | doaj-art-29d66c6c71f046a2971aee916c5cb529 |
| institution | Kabale University |
| issn | 1000-436X |
| language | zho |
| publishDate | 2025-04-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-29d66c6c71f046a2971aee916c5cb5292025-08-20T03:52:55ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2025-04-0146114100122153Dual system trusted terminal computing architecture based on TPCM RoTHUANG JianhuiZHANG JiangjiangSHEN ChangxiangZHANG JianbiaoDue to the limitations of the times, the von Neumann computer system failed to consider the modern security environment, and the computing structure lacked independent protective components based on hardware trusted roots. A trusted terminal architecture based on the Chinese national standard GB/T 40650-2021 trusted platform control module (TPCM) trusted root was proposed. A dual architecture was adopted to implement a progressive parallel trusted execution environment architecture based on trusted roots, solving the problems of terminal device source, platform execution environment, and terminal device trusted management from the perspectives of hardware trusted root chips and underlying basic software. The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025047/Chinese national standard GB/T 40650-2021RoTTPCMdynamic measurementtrusted execution environment |
| spellingShingle | HUANG Jianhui ZHANG Jiangjiang SHEN Changxiang ZHANG Jianbiao Dual system trusted terminal computing architecture based on TPCM RoT Tongxin xuebao Chinese national standard GB/T 40650-2021 RoT TPCM dynamic measurement trusted execution environment |
| title | Dual system trusted terminal computing architecture based on TPCM RoT |
| title_full | Dual system trusted terminal computing architecture based on TPCM RoT |
| title_fullStr | Dual system trusted terminal computing architecture based on TPCM RoT |
| title_full_unstemmed | Dual system trusted terminal computing architecture based on TPCM RoT |
| title_short | Dual system trusted terminal computing architecture based on TPCM RoT |
| title_sort | dual system trusted terminal computing architecture based on tpcm rot |
| topic | Chinese national standard GB/T 40650-2021 RoT TPCM dynamic measurement trusted execution environment |
| url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2025047/ |
| work_keys_str_mv | AT huangjianhui dualsystemtrustedterminalcomputingarchitecturebasedontpcmrot AT zhangjiangjiang dualsystemtrustedterminalcomputingarchitecturebasedontpcmrot AT shenchangxiang dualsystemtrustedterminalcomputingarchitecturebasedontpcmrot AT zhangjianbiao dualsystemtrustedterminalcomputingarchitecturebasedontpcmrot |