COMe-mAL10 – User Guide, Rev. 1.3
www.kontron.com
// 37
attempts to connect to the network, the hashes are sent to a server that verifies they match the expected values. If
any of the hashed components have been modified since the last started, the match fails, and the system cannot gain
entry to the network.
3.10.
Kontron Security Solution
The Kontron Security Solution feature is available on request and offers a hardware and software solution that
includes an embedded hardware security module and a software framework to protect applications.
On request, the COMe-mAL10 can be equipped with a security chip connected to SoC port 7 (= COMe USB6). Integrated
security solution features are:
Copy protection
IP protection
License model enforcement
If required, customers can customize the solution to meet specific needs. For more information, contact Kontron
Support.
3.11.
SpeedStep™ Technology
SpeedStep™ technology enables the adaption of high performance computing in applications by switching
automatically between maximum performance mode and battery-optimized mode, depending on the needs of the
application. When battery powered or running in idle mode, the processor drops to lower frequencies (by changing
the CPU ratios) and voltage, thus conserving battery life while maintaining a high level of performance. The frequency
is automatically set back to the higher frequency, allowing you to customize performance.
In order to use the Intel® Enhanced SpeedStep™ technology the operating system must support SpeedStep™
technology.
By deactivating the SpeedStep™ feature in the BIOS Setup, manual control or modification of the CPU performance is
possible. To achieve manual control setup the CPU Performance State in the BIOS Setup or use third party software to
control the CPU Performance States.