Secure-IC Market Trusted Computing

Trusted Computing

Trusted computing is a term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and software modifications.

It is made to develop and promote specifications for the protection of computer resources from threats without infringing on the rights of end users.

There are four main technologies that define trusted computing:

  • Memory Curtaining, which prevents programs for inappropriately writing to or reading from each other’s memory
  • Secure input/output, which addresses threats from spyware such as keyloggers and programs that capture the contents of a display
  • Sealed storage, which allows computers to securely store encryption keys and other critical data
  • Remote attestation, which detects unauthorized changes to software by generating encrypted certificates for all applications on a computer

Check out our Expertyzr offer to learn about Trusted Computing solution.

 

GLOBAL STANDARDIZATION

  • FIPS140-2/3
  • OSCCA
  • Common Criteria

STANDARDIZATION FOR THE TRUSTED COMPUTING MARKET

  • Trusted Computing Group