Trusted computing is a term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and software modifications.
It is made to develop and promote specifications for the protection of computer resources from threats without infringing on the rights of end users.
There are four main technologies that define trusted computing:
Memory Curtaining – prevents programs for inappropriately writing to or reading from each other’s memory.
Secure input/output – Addresses threats from spyware such as keyloggers and programs that capture the contents of a display.
Sealed storage – Allows computers to securely store encryption keys and other critical data.
Remote attestation – Detects unauthorized changes to software by generating encrypted certificates for all applications on a computer.
Check out our Expertyzr offer to learn about Trusted Computing solution.
Industry Specific Standardization: