Abstract—Computer technology has developed rapidly, the same
time it brings more opportunities for information theft, tamper
and destruction. Information security has become a research
focus. The security of operating system, as the base of
information system, is particularly important. With the
developing of 40 years, the security operating system has made
certain achievements. However, it still exist some problems.
Trusted operating system which is based on trusted computing
can help solve the problems. A design process of trusted
operating system based on linux was proposed, and also its
architecture was given. A double-key authentication was given as
an application example of the trusted operating system.