
QSEVEN-Q7AL - Rev.1.0
www.kontron.com
// 26
Table 6: Dual Staged Watchdog Timer- Time-Out Events
0000b
No action
The stage is off and will be skipped.
0001b
Reset
A reset restarts the module and starts a new POST and operating system.
0101b
Delay -> No action*
Might be necessary when an operating system must be started and the time for
the first trigger pulse must be extended. Only available in the first stage.
1000b
WDT Only
This setting triggers the WDT pin on the QSEVEN® connector (pin 72) only.
1001b
Reset + WDT
1010b
NMI + WDT
1011b
SMI + WDT
1100b
SCI + WDT
1101b
DELAY + WDT -> No
action*
5.6.1.
Watchdog Timer Signal
Watchdog time-out event (pin 72) on the QSEVEN® connector offers a signal that can be asserted when a watchdog
timer has not been triggered within a set time. The WDT signal is configurable to any of the two stages. After reset,
the signal is automatically deasserted. If deassertion is necessary during runtime, contact Kontron Support for
further help.
Real Time Clock (RTC)
5.7.
The RTC keeps track of the current time accurately. The RTC’s low power consumption means that the RTC can be
powered from an alternative source of power, enabling the RTC to continue to keep time while the primary source of
power is off or unavailable. The Qseven-Q7AL’s RTC battery voltage range is 2.4 V - 3.3 V.
Trusted Platform Module (TPM 2.0)
5.8.
A Trusted Platform Module (TPM) stores RSA encryption keys specific to the host system for hardware
authentication. The term TPM refers to the set of specifications applicable to TPM chips. The LPC bus connects the
TPM chip to the CPU.
Each TPM chip contains an RSA key pair called the Endorsement Key (EK). The pair is maintained inside the TPM chip
and cannot be accessed by software. The Storage Root Key (SRK) is created when a user or administrator takes
ownership of the system. This key pair is generated by the TPM based on the Endorsement Key and an owner-
specified password.
A second key, called an Attestation Identity Key (AIK) protects the device against unauthorized firmware and software
modification by hashing critical sections of firmware and software before they are executed. When the system
attempts to connect to the network, the hashes are sent to a server that verifies they match the expected values. If
any of the hashed components have been modified since the last started, the match fails, and the system cannot gain
entry to the network.
Kontron Security Solution
5.9.
Kontron Security Solution is a combined hardware and software solution that includes an embedded hardware
security module and a software framework to protect applications.
The Qseven-Q7AL includes an integrated security module connected to SoC port 7 that means that QSEVEN port 7 is
not available. Features of the integrate security solution are: