网络与信息安全学报 ›› 2019, Vol. 5 ›› Issue (4): 108-118.doi: 10.11959/j.issn.2096-109x.2019042

• 学术论文 • 上一篇    

基于加密SD卡的内网移动终端可信接入方案

李济洋1,2(),赵鹏远1,2,3,刘喆1,2   

  1. 1 武汉大学国家网络安全学院,湖北 武汉 430072
    2 武汉大学空天信息安全与可信计算教育部重点实验室,湖北 武汉 430072
    3 河北大学网络空间安全与计算机学院,河北 保定 071002
  • 修回日期:2019-06-06 出版日期:2019-08-15 发布日期:2019-08-20
  • 作者简介:李济洋(1994? ),男,湖北武汉人,武汉大学硕士生,主要研究方向为信息系统安全、网络安全。|赵鹏远(1979? ),男,河北保定人,武汉大学博士生,主要研究方向为信息系统安全? 网络安全、可信计算。|刘喆(1989? ),男,山东青岛人,武汉大学博士生,主要研究方向为信息安全。
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目(2015AA016002)

Trusted access scheme for intranet mobile terminal based on encrypted SD card

Jiyang LI1,2(),Pengyuan ZHAO1,2,3,Zhe LIU1,2   

  1. 1 School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China
    2 Key Laboratory of Aerospace Information Security &Trusted Computing,Ministry of Education,Wuhan University,Wuhan 430072,China
    3 School of Cyber Science and Engineering,Hebei University,Baoding 071002,China
  • Revised:2019-06-06 Online:2019-08-15 Published:2019-08-20
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program)(2015AA016002)

摘要:

为了解决因不可信移动终端非法接入内网导致的信息安全问题,设计了一种基于加密SD卡的内网移动终端可信接入方案。通过可信计算技术,以加密SD卡作为可信硬件设备实现了移动终端设备的可信启动、完整性验证与内网可信接入,并对接入后移动终端与内网的数据交互过程提供了一种加密通信安全存储机制。实验结果表明,该方案在不改变移动终端基本架构的前提下,较为高效地对移动终端进行安全性认证,并在一定程度上保护内网环境的安全。

关键词: 移动终端, 可信计算, 加密SD卡, 完整性度量

Abstract:

In order to solve the problem of information security caused by illegal access of untrusted mobile terminals to intranet,a trusted access scheme for intranet mobile terminals based on encrypted SD card is designed.By using encrypted SD card as trusted hardware equipment,trusted start-up,integrity verification and Intranet trusted access of mobile terminal devices are realized.A secure storage and encrypted communication mechanism for data interaction between mobile terminal and Intranet is also created.The experimental results show that the scheme can effectively authenticate the security of mobile terminals without changing the basic architecture of mobile terminals,and to some extent protect the security of the Intranet environment.

Key words: mobile terminal, trusted computing, encrypted SD card, integrity measurement

中图分类号: 

No Suggested Reading articles found!