What is trusted computing in the Web Knowledge column? ID cards, sports lottery tickets, etc. are all in use.

Networking times

In the digital intelligence era of the Internet of Everything,

The strategic position of network security is getting higher and higher,

The network security protection technology is constantly upgraded and iterated.

In recent years,

Trusted computing is gradually becoming

One of the mainstream technologies in the field of network security.

What is trusted computing?

Trusted computing refers to a computing mode that uses a special security module in a computing system to improve the overall security of the system.

What can trusted computing do?

Exploration and application

Trusted computing technology originated in 1992. After a long-term technical research, it gradually formed an independent and innovative trusted computing 3.0 system. From the national power system dispatching to the second-generation resident ID card, taxation, sports lottery, etc., all play a powerful role in ensuring network security.

Trusted computing technology landing power system

During the National Cyber Security Publicity Week in 2021, Beijing Trusted Huatai Information Technology Co., Ltd. won the third prize in the "Network Security Outstanding Innovation Achievement Competition Finals" for its "Information Security Solution of Power Industry Control System Based on Trusted Computing 3.0". This scheme innovatively realizes the application of active immune trusted computing 3.0 technology in the control system environment of electric power industry, and has been widely applied and deployed in the national electric power dispatching system.

Protect data security through trusted computing and other measures

On January 31, 2021, Henan Social Credit Construction Promotion Association, enterprise representatives, etc. released the kettle-opening App in Zhengzhou. To protect the security of users’ data, Kettle App combines cryptographic technology with data identification, and builds a data security system integrating transmission, analysis and application through trust management, access control, data encryption, trusted computing, and secret search, so as to solve problems such as privacy protection, authenticity of data sources, and prevention of identity counterfeiting.

Deployment and planning

"The 14th Five-Year Plan of China Film Development"

In November, 2021, "The 14th Five-Year Plan for China Film Development" was officially released. According to the "Planning", the National Film High-tech Research Laboratory is established by relying on the national film research strength, and has passed the national certification, focusing on cloud computing, big data, 5G, VR, artificial intelligence, machine learning, deep learning,Trusted computingThe whole solution of the new generation information communication technology and intelligent science and technology such as blockchain in the informatization construction, cloudization and intelligent upgrading of the whole film industry chain.

Beijing Sub-center Metauniverse Innovation and Development Action Plan (2022-2024)

In August, 2022, the People’s Government of Tongzhou District of Beijing issued the Action Plan for Innovation and Development of Metauniverse of Beijing Sub-center (2022-2024). According to the Action Plan, the sub-center will speed up security chips, zero-trust networks,Trusted computingTechnology research and development and industrialization, continue to strengthen the research and application of blockchain technology, and build a digital trust security system.

Shanghai Action Plan for Building an Innovative Highland of Network Security Industry (2021-2023)

In December, 2021, the Shanghai Economic Information Commission, the Network Information Office of the Municipal Party Committee, the Municipal Development and Reform Commission, the Municipal Science and Technology Commission, the Municipal Finance Bureau, and the Municipal Communications Administration jointly issued the Shanghai Action Plan for Building an Innovative Highland of Network Security Industry (2021-2023). The Action Plan focuses on frontier areas such as next generation communication and intelligent governance,Trusted computingZero trust and other new architectures, as well as the integration of new technologies such as cloud computing and artificial intelligence with network security technologies, to accelerate the research breakthroughs of key theoretical technologies.

Note: This article has been deleted.