1. Secure Boot
Secure Boot prevents unauthorized firmware from running by verifying the integrity of the boot area.
2. Run-Time Tuning Protection
Run-Time Tuning Protection continually checks the integrity of the firmware and when detects the tampered firmware, the logs are recorded.
3. Secure Storage
Secure Storage provides the secured management and place of critical data.
4. Secure Debug
Secure Debug provides secure access control via Debug interface and only authorized password has temporary access.
5. Memory Protection
Memory Protection securely manages access permissions for operations such as reading, writing and executing on memory.
-
PREV 没有以前的帖子。
-
NEXT 没有以下帖子。