blog




  • Essay / Computing Power and Network Connectivity - 1069

    SECTION IINTRODUCTIONWith the increase in computing power and ubiquitous network connectivity, we have seen a significant proliferation in the use of mobile handsets and experienced mobile handsets have become more open, general-purpose computing environments [1]. More and more applications and services have been applied to mobile devices. Mobile phones have become a platform that carries a lot of important data. Ultimately, these developments have created new security challenges, which cannot be solved by conventional security mechanisms. Phone theft is a significant problem. Stolen mobile phones pose a risk of exposure of private information if they do not have strong protection for access to stored information [2]. Additionally, users may prefer performance over security, if cryptographic processing influences performance too much. Hardware processing is necessary to avoid reckless compromise of security purely for the sake of performance. The Trusted Computing Group (TCG) has published specifications for the mobile platform, which contains the Mobile Trusted Module (MTM) [3], [4]. The mobile platform is anchored in MTM with a reliable platform-aware architecture manager that provides a security foundation to establish a data protection mechanism. MTM also includes an efficient cryptographic computing module to support key generation and data encryption. It is therefore possible to establish a data protection mechanism based on MTM. The remainder of this article is organized as follows. Section 2 analyzes the existing problems related to data protection mechanisms in traditional mobile devices. Our MTM-based data protection system is presented in section 3 and the private key generation and management mechanisms are discussed in section 4. Section 5 presents the enc...... middle of paper . .....equipment. So only the equipment can decrypt the data encrypted in the memory card. The main advantage of this mechanism is that the encryption function is performed without the participation of users and applications, which is convenient for users and reduces the work of application developers. The downside is that it does not use hardware encryption, which would reduce the performance of users' experience. And if users have not set a password for the lock screen, the data in the storage card will also be leaked if the storage card is lost. In conclusion, these mobile terminal equipment have currently put forward their data security policies. But they all have flaws. One of the important problems is that data from external memory card faces serious threat (except for IOS devices, because they do not support external memory cards), and this is the problem that this article will solve..