Abstract—According to the relevant criterion and principle
for designing and evaluating various trusted computing
chips, we have proposed a new trusted SoC chip, and have
given the implementation of its basic functional modules. In
detail, we have discussed the design of the trusted SoC
security architecture and the main module functional
modules such as microprocessor, cryptographic function
module, security management module, input/output
interface, along with the most important memory
management unit. Moreover, we have discussed reliability
of relevant parameters and transfer strategy for trusted root
in chip development and application, together with the
simulation and validation of corresponding functions. At
last, we point out that one of the most important further
research directions is the trusted measurement of dynamic
data and software running in security environment.
Index Terms—SoC, COS, security system design, trusted
measurement, trusted transfer strategy