From figure.2, we can fmd that the Embedded Security
Module supports four types of protocols, that is: USB, I2C,
GPIO and IS078 16. The Embedded Security Module uses
GPIO to communicate with the south-bridge chip so as to
control peripherals directly. It also uses IS07816 to
commun-icate with a smart card reader. Anybody who wants
to power up the platform must insert the smart card first,
which contains his identity and privilege information, to
authenticate himself to the platform.We must emphasize that
it does not imply that our work is specific to our trusted
computer, though we illustrate it based on trusted computer.
Actually, it is a common framework and can be implemented
in any trusted platform, as long as the platform is developed
according to TCG specificat-ions or the platform has the
hardware enhancement analogous to TPM.