| CPC G06F 21/57 (2013.01) [G06F 1/12 (2013.01)] | 20 Claims |

|
1. An information security management method, comprising:
obtaining, through a root of trust (ROT) circuit, first position information;
verifying, through the ROT circuit, the first position information to generate a first verification result of the first position information; and
controlling at least one function operated by a main processor through the ROT circuit according to the first verification result, wherein the first verification result is a basis on which the main processor is allowed to use a resource, and the information security management method further comprises:
verifying, through the ROT circuit, the resource used by the main processor according to the first verification result to generate a second verification result of the resource; and
controlling, through the ROT circuit, the at least one function according to the second verification result, wherein the resource is an executable image file of a system, the system is turned on in response to the main processor loading the executable image file, and verifying the resource comprises:
accessing, through the ROT circuit, a reference image file; and
comparing, through the ROT circuit, the executable image file with the reference image file to generate the second verification result, wherein
the second verification result is one of the executable image file conforming to the reference image file or the executable image file not conforming to the reference image file, and
the reference image file and the executable image file are stored in different memories.
|