Based on this, the paper gives out the overall design schemes of Trusted Computer, and introduces the design goal, design plan, workflow, key management, integrity checking, user identification and authorization of the Trusted Computer. 在此基础之上提出了可信计算机的总体设计方案,介绍了设计目标、设计方案、工作流程、密钥管理、完整性校验、用户身份识别和授权。
Burdens on key management center ( KMC ), user and Monitor agency are reduced, while escrow agency has to take more responsibility. 在保证安全和效率的前提下,减少了密钥管理中心(KMC)、托管者和监听机构的负担,适当增加了托管代理的作用。
Analysis the key application technique of GIS spatial database management and graphical user interface in the process of building the system; 分析了GIS空间数据库管理以及图形用户界面设计等较为关键的应用技术;
The key management system with less number of keys held by each user and less cost of re-keying is efficient. 一个高性能的密钥管理系统应具有较小的用户密钥存储量和密钥更新代价。
According to research, current video security communication system has two ways of managing keys : 1.Allocate a permanent key to all users; 2.Use point-to-point both-side key management protocol to share a pair of keys with each user. 根据调研,现有的视频安全通信系统采用的密钥管理方式主要分为两种:①为每个组员分配固定不变的单一密钥;②采用点对点双方密钥管理协议为每个组员构建一对共享密钥。