In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > IT Information >
Share
Shulou(Shulou.com)11/24 Report--
CTOnews.com April 17 news, according to the release of Godson, in order to meet the application needs of industrial scenarios, while providing protection for industrial data security, Godson Zhongke Design launched Godson 2K1000LA Industrial School, and added trusted features.
Godson 2K1000LA Industrial School adopts 3.5in board architecture (146mm*102mm), Godson 2K1000LA processor, dual-core LA264 based on dragon architecture, onboard 4GB memory particles, 1GB NAND storage, supports I / O interface, supports interface extension, supports wide temperature operation from-40 ℃ to 85 ℃, suitable for a variety of industrial scenarios; on-board trusted computing chip, self-developed trusted algorithm, while expandable AI module, support AI edge computing applications. Application fields and scenarios include energy, transportation, industrial control, medical, industrial network, intelligent manufacturing, AI edge, trusted security.
The main features are as follows:
● Security: on-board trusted Computing Chip and self-developed trusted algorithm
● AI Intelligence: scalable AI module to support AI edge computing applications
● interface and expansibility: Mini-PCIe (support Msata) interface, gigabit network interface, USB3.0, PCIe, CAN2.0, I2C, GPIO, RS232, RS484/422, HP, MIC; support interface expansion, 3G / 4G / WIFI / nvme / Msata / AI and other modules can be extended to meet more industrial application scenarios.
● multi-operating system support: support Loongnix, LoongOS, LxAMP, Yihui, Ruihua, RT-Thread and so on.
The hardware specifications of the development board are attached to CTOnews.com:
The working mechanism and functions of trusted security are as follows:
Trusted security highlights
● active measurement
● peripheral hardware information, kernel, file system metrics
Static Measurement of Application in ● system
Establishment of whitelist under ● system
● trusted image or application update
The working mechanism and function are as follows: after the board is powered on, the trusted encryption module (TCM) starts before the system and initializes its own basic peripherals (such as SPI, etc.) as the trust root to measure the BIOS of Godson 2K1000LA; the trust chain extends to BIOS, and measures the identity of the file system, kernel, and sensitive peripherals during the execution of BIOS. After the system runs, the files of some key sensitive applications are measured before running under the system; based on the trusted policy of adding trusted access control, only files in the whitelist and through trusted verification are allowed to load and run; support the establishment and maintenance of the whitelist; through key verification, you can do basic simple trusted images and application updates. In the follow-up, Godson Zhongke will gradually increase the functions of real-time dynamic measurement, log file system for recording metrics and trusted remote management.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.