Improvement Method of TCG Command Validation Protocol

This paper shows that the Trusted Computing Group(TCG)command validation protocols are exposed to a Dolev-Yao Man in The Middle(MiTM)attack,which will tamper with the security and the trustworthiness of the entire system.In order to avoid such attack,this paper proposes a countermeasure which makes an effective way through which the caller and TPM can well understand the session state of each other.