- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
TPM核心功能
* * * * * * * * * * * * * * * * * 一致性、合格 * * * * * * * TPM Ownership TPM?owner Taking?ownership Deleting?ownership * TPM Owner Entity?owning?a?TPM‐enabled?platform e.g.,?platform?owning?person?or?IT‐department TPM?Owner?must?initialize?TPM?to?use?its?full functionality?(take?ownership?of?the?TPM) Owner?sets?owner?authorization?secret Owner?creates?the?Storage?Root?Key?(SRK)?(see?TPM?keys) Owner?authorization Proof?of?knowledge?of?the?owner?credentials?to?the?TPM e.g.,?via?a?challenge?and?response?protocol?or?physical presence Permits?the?TPM?to?use?several?protected?capabilities e.g.,?migration?of?cryptographic?keys?or?deletion?of?TPM?Owner * Methods of Proving Ownership to a TPM User?proves?knowledge?of?TPM?owner?authorization?secret?to?the?TPM? e.g.,?OIAP?or?OSAP?(see?TPM?authorization?protocols) Assertion?of?physical?presence Proof?of?physical?access?to?the?TPM/platform e.g.,?by?using?a?hardware?switch?or?changing?a?BIOS?setting Interface?for?asserting?physical?presence?specified?by?the?PC?Client?Specification Only?a?few?commands?can?be?authorized?via?physical presence e.g.,?deletion?of?TPM?Owner,?activation/deactivation?of?the?TPM,?enabling/disabling?the?TPM * Protocol?for?Creating?a?TPM Owner * TPM?Interface?for?Taking Ownership * Protocol?for?Deleting?a?TPM Owner * TPM?Interface?for?Deleting?Owner * Deleting?Owner?via?Physical Presence * Asserting?Physical?Presence?via?BIOS * TNC Overview TNC shall enhance existing network authentication protocols with Trusted Computing concepts [TNC2007] TNC enables verification of endpoint integrity additional to user/machine authentication e.g., a user is only allowed to connect to a network via specific machines that are in a certain, probably secure configuration * * TNC Terminology Access Requestor (AR) Entity that requests access to a protected network e.g., a user or software process Platform Credential Authentication Proof of the identity of a platform e.g., via AIK certificates Integrity Check Handshake Verifica
文档评论(0)