The first is to establish the framework of active immune dual-structure system. Active immunity is the epitomization of China's revolutionary innovation in trusted computing


strengthen the "five links" of technology and management of the whole process of control. In accordance with the requirements of the Network Security Law of the People's Republic of China, the Password Law of the People's Republic of China,

the network security grade protection system and the critical information infrastructure protection system, and in accordance with the risk analysis method, protection, guarantee and defense are carried out from five aspects:

grading,filing, evaluation, construction and rectification, supervision and inspection, so as to realize the three synchronous requirements of network security andinformatization construction. Strengthen the two-pronged security control of the whole process.

Sixth, achieve "six no" protection effect. According to the new computing model, dual architecture, three-layer protection framework, four-element access control and five-link full process control,

the protection effect of "six noes" can be achieved, that is, attackers can not enter, non-authorized important information can not get, steal confidential information can not understand, system and information can not be tampered with, system work can not be disabled and attack behavior can not be relied on.

China's trusted computing originated from the formal project in 1992 to develop the "comprehensive protection system of active immunity". Can you give us a brief introduction to the new era of trusted Computing 3.0?

Shen Changxiang: China's trusted computing originated from the "Active immunity integrated protection system" officially developed in 1992, and after long-term research, the independent innovation of the active immunity trusted system (Trusted Computing 3.0) has been formed, and many technologies have been adopted by the International Trusted Computing Organization (TCG).

The first is to establish the framework of active immune dual-structure system. Active immunity is the epitomization of China's revolutionary innovation in trusted computing.

The framework of active immunity dual structure system has been independently established in China. In the framework of dual-structure system, the reliability of the whole system connection is improved.

The second is to create a new era of trusted computing 3.0. The framework of active immune dual-structure system opens a new era of trusted computing 3.0, which is characterized by systematic immunity.

Its main feature is system immunity, which protects the dynamic network chain with system nodes as the center, forming a "host + trusted" two-node trusted immune architecture,

and the host computer operations are simultaneously monitored by trusted nodes for parallel dynamic security, realizing active immune protection against network information systems.

The third is to use trusted Computing 3.0 to build a secure defense line for critical information infrastructure. The Outline of the National Medium - and Long-Term Scientific and Technological Development Plan (2006-2020) clearly states that cybersecurity technologies and related products should be developed with the focus on the development of highly trusted networks,

and a cybersecurity technical guarantee system should be established. Important information systems, such as value-added tax anti-counterfeiting, lottery anti-counterfeiting, and second-generation resident ID card security systems, all use Trusted Computing 3.0 as the foundation support.

We must seize the core technology strategy of cyberspace security to the highest point, solve the problem that core technology is subject to others, independent innovation, self-reliance, and strengthen the national cyber security defense line.

Researchers have discovered the largest theropod dinosaur footprint in Yunnan

A research team from the Institute of Vertebrate Evolution of the University recently discovered a theropod dinosaur footprint site from the late Early Jurassic about 190 million years ago in the Central Yunnan Basin,

which is also the largest theropod dinosaur footprint site found in Yunnan. The relevant results have been published online in the international academic journal PeerJ on October 5. ...

Many National Day holidays continue to open and covert visits to ensure the safety and stability of production and business activities

During the National Day holiday, in order to prevent and resolve security risks, create a safe and peaceful holiday atmosphere, many places sent various inspection teams to go deep into the grass-roots front line and the production site of enterprises,

openly and secretly visit, check risks and eliminate disasters, and make every effort to ensure the safety and stability of production and operation activities. Hubei: Strict inspection of the implementation of the work During the National Day,

the Hubei Emergency Management Department organized a number of undercover teams to go to various places to take the "four not two straight" approach to inspect and supervise the implementation of the National Day holiday key periods,

key industries, key areas of safety risk prevention, forest fire prevention, the newly revised safety law and the natural disaster risk survey. ...We will promote the high-quality development of new think tanks with Chinese characteristics


User Login

Register Account