Scenario 1: Secure and controllable X86 trusted server
With the digital transformation of businesses in traditional industries and the implementation of new technologies such as artificial intelligence, big data, and cloud computing, information security has always been the focus of users. The solution is deployed on a server platform and consists of target CPUs, RCP chips, I/O trace (ITR) chips, Hybrid Security DIMMs (HSDIMM), and firmware running on target CPUs. This solution performs non-intrusive signal tracing on target CPUs with no affect the normal execution of the operating system and applications running on it, and randomly traces the running target CPUs’ behavior fragments and quickly analyzes, judges, implements management and control, records logs, and saves the complete tracing data as needed. In addition, the secure boot and controlled updates of microcode functions ensure that the security service covers the entire life cycle of the target CPUs. Moreover, the platform is compatible with the original ecosystem, and while safe and controllable, it does not affect the operation of the original business.
Scenario 2: Precise tracing sensitive behavior/data/device informationDSC technology can continuously and accurately collect the hardware behavior fragments in the specified user context program block, and monitor the underlying hardware behavior of the specified memory area and the specified external device. It can also combine the results of monitoring software and analysis software and summarize the characteristic rules to establish a hard behavior standard map or anomaly map of hotspot applications to help users and partners fully control the specified behavior.