English  |  正體中文  |  简体中文  |  Items with full text/Total items : 69561/69561 (100%)
Visitors : 23025589      Online Users : 221
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://ir.lib.ncu.edu.tw/handle/987654321/83948


    Title: 基於OP-TEE的可信應用程式軟體生態系統;TAMS:An Trusted Application Ecosystem base on OP-TEE
    Authors: 邱振玠;Chiu, Chen-Chieh
    Contributors: 資訊工程學系在職專班
    Keywords: OP-TEE;IoT;OP-TEE;IoT
    Date: 2020-08-20
    Issue Date: 2020-09-02 17:44:31 (UTC+8)
    Publisher: 國立中央大學
    Abstract: 半導體技術的進步,嵌入式平台的計算能力愈來愈強大,加上5G
    超高速、低延時通訊技術,使得物聯網應用正快速發展,物聯網安全
    也越趨重要。為了提昇物聯網安全性,各大處理器廠商都在自家處理
    器加上可信執行環境(Trust Execution Environment) 技術,讓有隱私或
    安全議題的應用程式在可信執行環境中執行以保護其安全性,而且置
    放於可信執行環境中執行的應用程式亦必須是可信的應用程式(Trusted
    Application)。當設備製造商開始使用可信執行環境在來作為開發平台
    時,如何建構出一個同時兼顧安全性與開放性的平台軟體生態圈讓第
    三方進來開發可信應用程式,是必然會面臨到的問題與挑戰。本論文
    中完善OPTEE
    中所欠缺的針對第三方所開發的可信應用程式的來源
    驗證機制,同時提供了一個具體而微的實作範例。;The Internet of Things (IoT) is rapidly evolving in recent years. IoT devices
    will be able to generate large amounts of securityand
    privacysensitive
    data. In order to enhance the security of the Internet of Things, processor
    manufacturers have added Trusted Execution Environment (TEE) to their processors
    to enhance the security of the Internet of Things. Building the TEE
    software ecosystem is the important thing for device manufacturers, software
    vendor, cloud service provider and customers. To building TEE software
    ecosystem will be facing a problem which most secure operating system in
    TEE like OPTEE,
    by default all Trusted Applications (TA) are signed with
    the single RSA key (private key). Device manufacturers need to provide the
    same private key to many software vendors for TA signing. However, ask all
    software vendors to protect the same private key safely is difficultly. In this
    paper, we implement third parties the trusted application verify mechanism
    of OPTEE.
    It solves problem of the OPTEE
    only support a single key and
    reduce loading of private key management in device manufacturers .
    Appears in Collections:[資訊工程學系碩士在職專班 ] 博碩士論文

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML13View/Open


    All items in NCUIR are protected by copyright, with all rights reserved.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback  - 隱私權政策聲明