Trusted computing technologies typically used in trusted terminal, trusted connect, trusted network, focusing on the self immunity of terminal and network, put forwards the thinking which accomplishes security in the way of building trust. It becomes the first choice of many information security companies. This paper chooses the trusted-chain model of trusted terminal technology as the research object, studies the conception model of trusted-chain, gives the modeling process, the realization of the model’s antetype, and points out the advantages of the model compared with the conditional information security model.