【打印本页】      【下载PDF全文】   View/Add Comment  Download reader   Close
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 6538次   下载 8268 本文二维码信息
码上扫一扫!
安全处理器研究进展
赵剑锋,史岗
分享到: 微信 更多
(中国科学院信息工程研究所 第五实验室, 北京 中国 100093;中国科学院大学, 北京 中国 100049)
摘要:
信息安全已经影响到一个国家的政治、军事、经济和文化等诸多领域。信息一般在计算机系统上存储和处理。计算机系统的核心器件是处理器,所以处理器的安全是计算机系统安全的基础,也是信息安全的基础。在可信计算、工业控制、身份识别、网络通信、电子支付等许多行业,都要用到安全处理器。文章对安全处理器发展过程进行了梳理,并根据应用场景、功能进行了分类,结合具体安全处理器架构,分析了各主要安全处理器的技术特点和不足之处,找出安全处理器研究中的规律。最后,总结全文,对安全处理器的研究进行了展望。
关键词:  安全处理器  分类  特点  展望
DOI:10.19363/j.cnki.cn10-1380/tn.2018.01.009
Received:September 19, 2016Revised:November 15, 2016
基金项目:本课题得到国家“核高基”科技重大专项基金项目(No.2013ZX01029003-001);国家“八六三”高技术研究发展计划基金项目(No.2012AA01A401)资助。
Research Progress on Security Processor
ZHAO Jianfeng,SHI Gang
Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;University of Chinese Academy of Science, Beijing 100049, China
Abstract:
Information Security has influenced political, military, economic, cultural and many other fields of a country. Information is generally stored and processed in computer system. The core component of a computer system is CPU (central processing unit). Therefore, CPU security is the basis of both computer system security and information security. Security processors are used in such industries as trusted computing, industrial control, identity recognition, network communication and e-payment. After summarizing the security processor development process, this paper classifies key processors according to application scenarios. Combining the specific function and security processor architecture, it analyzes the features and shortcomings of main security processor technology and finds out the rules in security processor research. Finally, it offers research direction to the security processor.
Key words:  Security Processor  Classification  Feature  Prospect