建设国内领先、国际先进新型网络安全研发机构

服务热线:0531-55585000

Security chip
Security chip

Credible computing is the immune system of information systems

 

Credible computing refers to the security protection of computing operations at the same time, so that the calculation results are always the same as expected. The whole process of calculation can be measured and controlled without intervention.

It is a new computing mode of active immunity with both operation and protection. It uses password to implement identification, state measurement, confidential storage, and timely identification of "self" and "non-self" components, thus destroying and repelling harmful substances entering the body.

 

The code is as unique as the human gene sequence and can not be forged

1.Identification

Identify "self" and "non-self"

1.State measure

Found variation

1.Confidential storage

Transparent encryption and decryption protection

 

Credible computing 3.0 is the first new generation of security computing core technology in China, which can make the information system have active immunization ability, and has been listed as the national strategy and legal requirements. China has missed the best opportunity to develop CPU and operating systems with independent intellectual property rights. The establishment of independent and credible computing technology system is the last line of defense for information security in China.