
Functional Description
17
cPCI-6530BL
3.5
Intel® Hyper-Threading Technology
Intel® Hyper-Threading Technology allows an execution core to
function as two logical processors. While some execution
resources (such as caches, execution units, and buses) are
shared, each logical processor has its own architectural state with
its own set of general-purpose registers and control registers. This
feature must be enabled using the BIOS and requires operating
system support. Intel recommends enabling Hyper-Threading
Technology with Microsoft Windows 7, and disabling
Hyper-Threading Technology using the BIOS for all previous ver-
sions of Windows operating systems.
3.6
Trusted Platform Module
The cPCI-6530BL integrates an Atmel AT97SC3204 Trusted Plat-
form Module (TPM). The TPM is a secure controller with added
cryptographic functionality to provide users a secure environment
in e-commerce transactions and Internet communications.
The key features Trusted Platform Module (TPM) offers are:
X
Fully compliant to the Trusted Computing Group (TCG)
Trusted Platform Module (TPM) version 1.2 specification
X
Hardware hash accelerator for SHA-1 algorithm
X
Advanced Crypto Engine (ACE) for asymmetric key opera-
tions(up to 2048-bit key length) to make hardware protec-
tion.
X
Tick counter to extend the time required to decipher the key
X
In addition to encryption key created by user. it also provide
some security features to protect the integrated circuit itself:
X
Over/Under-voltage detection to monitor the system stabil-
ity. If the voltage fluctuates dramatically, this function can
block the data transfer and lock the chip.
X
Low/High frequency sensor to detect the IC clock fre-
quency. If the frequency fluctuates dramatically, this func-
tion can block the data transfer and lock the chip.
X
Reset filter to filter reset signal in order to break the time set
by tick counter is received
X
Memory encryption to protect memory
Summary of Contents for cPCI-6530BL Series
Page 8: ...viii Table of Contents Leading EDGE COMPUTING This page intentionally left blank ...
Page 10: ...x List of Figures Leading EDGE COMPUTING This page intentionally left blank ...
Page 12: ...xii List of Tables Leading EDGE COMPUTING This page intentionally left blank ...
Page 16: ...4 Introduction Leading EDGE COMPUTING This page intentionally left blank ...
Page 24: ...12 Specifications Leading EDGE COMPUTING This page intentionally left blank ...
Page 68: ...56 Getting Started Leading EDGE COMPUTING This page intentionally left blank ...
Page 76: ...64 Utilities Leading EDGE COMPUTING This page intentionally left blank ...
Page 110: ...98 BIOS Setup Utility Leading EDGE COMPUTING 8 4 2 PCH IO Configuration ...