Construction of embedded secure terminal and multimedia database based on trusted computing technology and wireless network

Internet technology, as a product of the development of the network era, connects a large number of hardware devices, but the connection of many devices makes its corresponding security be greatly tested. The network security technology and the corresponding computer hardware security technology hav...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Alexandria engineering journal 2021-10, Vol.60 (5), p.4223-4230
1. Verfasser: Xiao, Kun
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Internet technology, as a product of the development of the network era, connects a large number of hardware devices, but the connection of many devices makes its corresponding security be greatly tested. The network security technology and the corresponding computer hardware security technology have become the focus of people's attention. At the same time, the construction of multimedia database based on this related technology has become the development trend of people's research and attention. Most of the conventional computer security technology focuses on the security construction of the operating system, which has certain openness, so its corresponding reliability is very low, but also uncontrollable. Based on this, this paper proposes a design scheme of the public security architecture on the embedded terminal, and realizes the design of the multimedia security broadcast control system based on this scheme, and realizes the play and storage of multimedia files, as well as the interaction between the corresponding media servers. The wireless network embedded security terminal designed in this paper includes client terminal identity authentication, corresponding media content protection and storage, and real-time broadcast content monitoring. Finally, the experiment is carried out based on the proposed design scheme. The experimental results show that the embedded security terminal proposed in this paper has obvious performance advantages, and its correctness and availability have been verified in practice.
ISSN:1110-0168
2090-2670
DOI:10.1016/j.aej.2021.02.020