Welcome to Journal of University of Chinese Academy of Sciences,Today is

Journal of University of Chinese Academy of Sciences ›› 2008, Vol. 25 ›› Issue (5): 657-664.DOI: 10.7523/j.issn.2095-6134.2008.5.012

Previous Articles     Next Articles

An approach for compliance validation of TPM through applications

CUI Qi1,2, SHI Wen-Chang1,3   

  1. 1. Graduate University, Chinese Academy of Sciences, Beijing 100049, China;
    2. Institute of Software, Chinese Academy of Sciences, Beijing 100080, China; 3. Information Security Group, MOE Key Lab of DEKE, Renmin University, Beijing 100872, China
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-09-15

Abstract:

Security involves both protection and compliance. Although the Trusted Computing Group (TCG) has defined specifications for Trusted Computing, including those of Trusted Platform Module (TPM), criteria on compliance testing is still not available. In this paper, a test mechanism checking TPM commands is instrumented into TPM applications, which will validate TPM’s conformance to specifications before its functional execution. Based on this, the initial idea of a chain of compliance is also discussed to enhance the trustworthiness of computing platforms by verifying the conformance of their components.

Key words: trusted computing group (TCG), trusted platform module (TPM), compliance test, chain of compliance