Credible computing is the immune system of information systems
Credible computing refers to the security protection of computing operations at the same time, so that the calculation results are always the same as expected. The whole process of calculation can be measured and controlled without intervention.
It is a new computing mode of active immunity with both operation and protection. It uses password to implement identification, state measurement, confidential storage, and timely identification of "self" and "non-self" components, thus destroying and repelling harmful substances entering the body.
The code is as unique as the human gene sequence and can not be forged
1.Identification
Identify "self" and "non-self"
1.State measure
Found variation
1.Confidential storage
Transparent encryption and decryption protection
Credible computing 3.0 is the first new generation of security computing core technology in China, which can make the information system have active immunization ability, and has been listed as the national strategy and legal requirements. China has missed the best opportunity to develop CPU and operating systems with independent intellectual property rights. The establishment of independent and credible computing technology system is the last line of defense for information security in China.