See "trust", the history of the Trusted Computing full resolution

First, what is the Trusted Computing

Trusted Computing (Trusted Computing, referred to as TC) is a push by the TCG (Trusted Computing Group) and development of technology. One of the trusted core objective is to ensure the integrity of the system and applications to determine system or software designed to run credible desired state. Trusted security is not the same, but it is safe foundation, because the security programs, policies only run in order to further ensure the safety purpose in the environment has not been tampered. By integrity assurance systems and applications, we can ensure that the correct software stack, and are subject to change after the attack can discover in the software stack. Overall, the addition of credible verification systems and applications in use can reduce the possibility of unknown or have been tampered system / software of attack.

For example to a PC credible, popular terms, credibility is to detect BIOS and operating system in the completeness and correctness of each PC, start to protect your hardware configuration and operating system have not been tampered with when using a PC, all system security measures and the setting will not be bypassed; after the start, for all applications, such as social software, music software, video

Guess you like

Origin yq.aliyun.com/articles/710337