Credible computing system
A trusted computing and trusted technology, applied in the field of information security, can solve the problem of not taking into account the need for real-time updating of BIOS codes, and achieve the effect of improving request response speed and data transmission time, improving flexibility, and realizing security protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0045] Computer hardware transformation, such as figure 1 Shown:
[0046] 1) Set up a safety controller on the computer hardware platform, and connect the control signal line to the computer motherboard south bridge device controller through the data line.
[0047]2) BOOT ROM and motherboard peripherals are connected to the output terminal of the safety controller through data lines and control signal lines.
[0048] 3) As a slave device, the trusted security module is connected to the computer south bridge device controller through its LPC communication interface or USB communication interface.
[0049] 4) The trusted security module is used as the control terminal and is connected to the security controller through the communication bus for control and data transmission.
[0050] 5) BOOT ROM, security controller, BIOS backup storage unit, identification device and trusted security module use the same power system, and this power system is independent of the power system of othe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap