No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


ME60 V800R010C10SPC500 Feature Description - System Management 01

This is ME60 V800R010C10SPC500 Feature Description - System Management
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Trusted Startup

Trusted Startup


Communication devices consist of multiple embedded computer systems, where software may be vulnerable to viruses and modified by attackers and even attacked by Trojan horses and unauthorized programs. Once a system is being attacked, the attacker may modify configurations or intercept packets to tamper with or intercept data.

The trusted startup function detects system trustiness problems in a timely manner, helping improve system security and reliability.

Related Concepts

Trusted system: A trusted system indicates that system hardware and software are running properly as designed. The prerequisite for a trusted system is that the system software integrity is good without being intruded or tampered with.

Basic Principles

The trusted startup function establishes a trust root for the trusted startup platform based on device hardware capabilities and initial startup code.

During startup, the system establishes a complete trust chain from the trust root, BIOS, BootLoader, OS, to system software package, with each level measuring the boot phase of the next level. The measurement results are irrevocably saved to the TPM chip. This implementation ensures:
  • Setup and transmission of the trust chain.
  • Recording of the system's trusted status.


This feature offers the following security benefits:
  • Software integrity measurement

    Provides software integrity measurement, setup and transmission of trusted links, and records the trusted status of the system.

  • Trusted status query

    Provides query of the trusted status of the system.

  • Trusted status alarm

    Generates an alarm if the trusted status of the system is abnormal.

Updated: 2019-01-04

Document ID: EDOC1100059466

Views: 10636

Downloads: 7

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next