This paper is organized as follows. Section 2 describes
the trusted computer. Section 3 introduces hardware integrity
measurement, Section 4 discusses the protocol for hardware
integrity measurement and shows part of the experiment
result based on the trusted computer designed by us. Section
5 draws the conclusion ..