From figure.2, we can fmd that the Embedded Security
Module supports four types of protocols, that is: USB, I2C,
GPIO and IS078 16. The Embedded Security Module uses
GPIO to communicate with the south-bridge chip so as to
control peripherals directly. It also uses IS07816 to
commun-icate with a smart card reader. Anybody who wants
to power up the platform must insert the smart card first,
which contains his identity and privilege information, to
authenticate himself to the platform.We must emphasize that
it does not imply that our work is specific to our trusted
computer, though we illustrate it based on trusted computer.
Actually, it is a common framework and can be implemented
in any trusted platform, as long as the platform is developed
according to TCG specificat-ions or the platform has the
hardware enhancement analogous to TPM.
From figure.2, we can fmd that the Embedded SecurityModule supports four types of protocols, that is: USB, I2C,GPIO and IS078 16. The Embedded Security Module usesGPIO to communicate with the south-bridge chip so as tocontrol peripherals directly. It also uses IS07816 tocommun-icate with a smart card reader. Anybody who wantsto power up the platform must insert the smart card first,which contains his identity and privilege information, toauthenticate himself to the platform.We must emphasize thatit does not imply that our work is specific to our trustedcomputer, though we illustrate it based on trusted computer.Actually, it is a common framework and can be implementedin any trusted platform, as long as the platform is developedaccording to TCG specificat-ions or the platform has thehardware enhancement analogous to TPM.
การแปล กรุณารอสักครู่..
