Dependable computing system capable of protecting BIOS and method of use thereof
A trusted computing and trusted technology, applied in the field of information security, can solve the problem of not taking into account the need for real-time BIOS code update, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] security architecture
[0041] Taking the trusted computer terminal based on the INTEL architecture as an example, aiming at the incomplete security protection measures for the trusted platform module TPM on the hardware platform of the trusted computing system in the existing technology, a trusted computing module based trusted computer terminal is proposed. The realization of the hardware platform of the information computing system and the method of protecting the security and trustworthiness of the hardware platform, so as to establish a trustworthy computing environment.
[0042] Compared with the traditional TPM trusted platform module system structure and mainboard wiring method specified by TCG (such as figure 1 , figure 2 ), the trusted computing module system structure and main board wiring method proposed in the present invention (such as image 3 , Figure 4 ) The specific improvements are as follows:
[0043] A FIFO unit is added inside the trusted com...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com