The Innovation of Trusted Computing Based on the Domestic Cryptography

The trusted operation is the key factor for the information systems, but the traditional security mechanisms cannot effectively guarantee the trusted operation of the information systems. In order to guarantee the trusted operation of the key information systems, there are a series of problems to solve , including studying the domestic trusted computing architecture, establishing self-protection, active immunization protection framework, and building the core information security technology system. This paper presents an independent and controllable trusted architecture. Based on the domestic cryptography system, the architecture uses the trusted platform control module as the trusted root, the trusted motherboard is the platform, the software is the core, the trusted network is a link which integrates a variety of trusted applications. The architecture has its own innovation