摘要 |
PURPOSE: A security-enhanced computer system and a method thereof are provided to control access of applications to peripheral devices by a security firmware executed in a second processor of a second slave system. CONSTITUTION: A first slave system (102) includes a first processor constituted to execute applications. A second slave system (104) includes a separate second processor constituted to execute a security firmware. Peripheral devices (106) are connected to the second slave system. Access to the peripheral devices by the applications is controlled by the security firmware executed in the second processor. The security firmware emulates peripheral device connections corresponding to the first slave system. [Reference numerals] (102) X86 host processor (apps); (104) System controller (embedded); (106) Physical peripheral devices |