Bajikar, 2002 - Google Patents

Trusted platform module (tpm) based security on notebook pcs-white paper

Bajikar, 2002

View PDF
Document ID
9487199799904728711
Author
Bajikar S
Publication year
Publication venue
Mobile Platforms Group Intel Corporation

External Links

Snippet

Business and commerce depend on trust. With the growth of the Internet, wireless communication technologies and connected mobile computing, trust has become a pivotal issue for e-Commerce. Since notebook PCs are increasingly used for e-Commerce, there is …
Continue reading at ogobin.de (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/1615Constructional details or arrangements for portable computers with several enclosures having relative motions, each enclosure supporting at least one I/O or computing function
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Bajikar Trusted platform module (tpm) based security on notebook pcs-white paper
JP5060652B2 (en) How to unlock the secret of the calling program
JP4689945B2 (en) Resource access method
JP6151402B2 (en) Inclusive verification of platform to data center
US7986786B2 (en) Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
US5953422A (en) Secure two-piece user authentication in a computer network
US20050138389A1 (en) System and method for making password token portable in trusted platform module (TPM)
US7263608B2 (en) System and method for providing endorsement certificate
US20110154501A1 (en) Hardware attestation techniques
US7631348B2 (en) Secure authentication using a low pin count based smart card reader
KR20060031881A (en) How to secure mobile communications and high transaction execution using trusted, hardware-based identity verification in runtime package signatures
JP2004508619A (en) Trusted device
Reid et al. Privacy and trusted computing
CN111008094B (en) Data recovery method, device and system
Gallery et al. Trusted computing: Security and applications
Nyman et al. Citizen electronic identities using TPM 2.0
Brandl Trusted computing: The tcg trusted platform module specification
Vila et al. Data protection utilizing trusted platform module
Zhang et al. Mdaak: A flexible and efficient framework for direct anonymous attestation on mobile devices
Sato The biggest problem of blockchains: key management
Adithya et al. Advanced Encryption Standard Crypto Block Verification Utility
Collins Who can you trust?[trusted computing]
Kursawe et al. Improving end-user security and trustworthiness of TCG platforms
Han et al. Design and implementation of a portable TPM scheme for general-purpose trusted computing based on EFI
Ruan Trust Computing, Backed by the Intel Platform Trust Technology