【24h】

Hope in Hardware

机译:希望五金

获取原文
获取原文并翻译 | 示例
           

摘要

Since it's so hard to analyze the security of ever-changing software configurations (see "Measuring Security," p. 61), many researchers are pursuing hardware-based security. They believe that hardware can be made simpler than software, is easier to verify, and is harder to hack once it's deployed.rnOne example of this strategy is the use of smart cards and USB tokens as an alternative to usernames and passwords. The U.S. Department of Defense uses such methods to control access to sensitive websites and to digitally sign and encrypt e-mail. Another approach is the Trusted Platform Module (TPM), a fingernail-size microchip that can be built into computers.
机译:由于很难分析不断变化的软件配置的安全性(请参阅第61页的“测量安全性”),因此许多研究人员都在追求基于硬件的安全性。他们认为,硬件可以比软件更简单,更易于验证,并且一旦部署就更难破解。这种策略的一个示例是使用智能卡和USB令牌代替用户名和密码。美国国防部使用这种方法来控制对敏感网站的访问以及对电子邮件进行数字签名和加密。另一种方法是可信平台模块(TPM),这是一种可以内置在计算机中的指甲大小的微芯片。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号