摘要 |
<p>A computer may be secured from attack by including a trusted environment used toverify a known monitor. The monitor may be used to determine a state of the computer forcompliance to a set of conditions. The conditions may relate to terms of use, suchas credits available for pay-per-use, or that the computer is running certain software,such as virus protection, or that unauthorized peripherals are not attached,or that a required token is present. The monitor may send a signal directly or throughthe trusted environment to a watchdog circuit. The watchdog circuit disruptsthe use of the computer when the signal is not received in a given timeout period.</p> |