Bajikar, 2002 - Google Patents
Trusted platform module (tpm) based security on notebook pcs-white paperBajikar, 2002
View PDF- Document ID
- 9487199799904728711
- Author
- Bajikar S
- Publication year
- Publication venue
- Mobile Platforms Group Intel Corporation
External Links
Snippet
Business and commerce depend on trust. With the growth of the Internet, wireless communication technologies and connected mobile computing, trust has become a pivotal issue for e-Commerce. Since notebook PCs are increasingly used for e-Commerce, there is …
- 238000004891 communication 0 abstract description 7
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F1/00—Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/1615—Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bajikar | Trusted platform module (tpm) based security on notebook pcs-white paper | |
| JP5060652B2 (en) | How to unlock the secret of the calling program | |
| JP4689945B2 (en) | Resource access method | |
| JP6151402B2 (en) | Inclusive verification of platform to data center | |
| US7986786B2 (en) | Methods and systems for utilizing cryptographic functions of a cryptographic co-processor | |
| US5953422A (en) | Secure two-piece user authentication in a computer network | |
| US20050138389A1 (en) | System and method for making password token portable in trusted platform module (TPM) | |
| US7263608B2 (en) | System and method for providing endorsement certificate | |
| US20110154501A1 (en) | Hardware attestation techniques | |
| US7631348B2 (en) | Secure authentication using a low pin count based smart card reader | |
| KR20060031881A (en) | How to secure mobile communications and high transaction execution using trusted, hardware-based identity verification in runtime package signatures | |
| JP2004508619A (en) | Trusted device | |
| Reid et al. | Privacy and trusted computing | |
| CN111008094B (en) | Data recovery method, device and system | |
| Gallery et al. | Trusted computing: Security and applications | |
| Nyman et al. | Citizen electronic identities using TPM 2.0 | |
| Brandl | Trusted computing: The tcg trusted platform module specification | |
| Vila et al. | Data protection utilizing trusted platform module | |
| Zhang et al. | Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices | |
| Sato | The biggest problem of blockchains: key management | |
| Adithya et al. | Advanced Encryption Standard Crypto Block Verification Utility | |
| Collins | Who can you trust?[trusted computing] | |
| Kursawe et al. | Improving end-user security and trustworthiness of TCG platforms | |
| Han et al. | Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI | |
| Ruan | Trust Computing, Backed by the Intel Platform Trust Technology |