Difference between revisions of "Trusted Computing"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Context)
Line 2: Line 2:
 
[[Trusted Computing]] is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.
 
[[Trusted Computing]] is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.
 
==Context==
 
==Context==
 +
There has been a recognized effort to create a separate execution environment that would be unaffected by malware running in the main computer. The first effort was started in 1995-02-21 in the Intel Data Security Operation where a 386 based co-processor was developed that could use the main data store by encryption and decryption of all data on the fly. This was widely realized with the TPM 1.0 hardware chips in the late 1990 and now with separate instruction sets on ARM and Intel processors.
 +
 
==Problems==
 
==Problems==
 
==Solutions==
 
==Solutions==

Revision as of 17:06, 10 July 2019

Full Title

Trusted Computing is a set of solutions to assure that computing devices are who they say they are and are able to keep user secrets protected from programs running on the devices.

Context

There has been a recognized effort to create a separate execution environment that would be unaffected by malware running in the main computer. The first effort was started in 1995-02-21 in the Intel Data Security Operation where a 386 based co-processor was developed that could use the main data store by encryption and decryption of all data on the fly. This was widely realized with the TPM 1.0 hardware chips in the late 1990 and now with separate instruction sets on ARM and Intel processors.

Problems

Solutions

Trusted Supply Chain

Trusted Platform Module

Trusted Mobility Solutions

TCG Trusted Mobility Solutions Work Group Use Cases – Enterprise, Financial, & NFV was published 2018-09-26.

References