Welcome to Changzhou College of Information Technology - Study Abroad
Lectures Current Location: Homepage | School Life | Lectures | 正文 | Article Content
[Academic Report] Research and Application of Power Trusted Computing Technology
Issuedate:2021-11-15  Visits:

Sponsor: School of Cyberspace Security

Report time: November 17, 2021 19:00---20:30

Reporting location: Online Tencent conference: 881 7592 3781

Report title: Research and Application of Power Trusted Computing Technology

Speaker: Wang Zhihao

Content of report:

This paper introduces the basic situation of the units undertaking the research and application of power trusted computing technology, policy requirements for power trusted computing, technical architecture, main ideas and product framework, and shares the application cases of relevant research results in the power industry Internet system.

Brief introduction of the reporter:

Wang Zhihao, senior engineer, head of the Trusted Computing Project Team of the Institute of Computing and Application of State Grid Global Energy Internet Research Institute Co., Ltd. He has been engaged in the research and development of power information security and trusted computing for a long time. As the main completer, he participated in the compilation of national standards such as "Information Security Technology Trusted Computing Trusted Computing Architecture", "Information Security Trusted Computing Specification Trusted Software Base" and other national standards, and promoted the R&D and engineering of trusted computing in the power industry. application. (Text/School of Cyberspace Security  Review/Huang Lijuan)