Communication devices consist of multiple embedded computer systems. The software that runs on these devices may be vulnerable to viruses, modified by attackers, or implanted with Trojan horses.
The trusted boot function promptly detects issues that affect the trusted status of the system, helping improve the security and reliability of the system.
Trusted system: A trusted system indicates that system hardware and software are running as designed. The prerequisite for a trusted system is that the system software integrity is high and free of intrusion or unauthorized modification.
The trusted boot function establishes an RoT for the trusted boot platform based on the hardware capabilities of a device and an initial boot code.
Software integrity measurement
Measures the integrity of the software during the boot process, establishes and transfers a chain of trust, and records the system's trusted status.
Trusted status query
Provides query of the trusted status of the system.
Trusted status alarm
Generates an alarm if the trusted status of the system is abnormal.