Trusted computing is a term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and software modifications.
It is made to develop and promote specifications for the protection of computer resources from threats without infringing on the rights of end users.
There are four main technologies that define trusted computing:
Memory Curtaining – prevents programs for inappropriately writing to or reading from each other’s memory.
Secure input/output – Addresses threats from spyware such as keyloggers and programs that capture the contents of a display.
Sealed storage – Allows computers to securely store encryption keys and other critical data.
Remote attestation – Detects unauthorized changes to software by generating encrypted certificates for all applications on a computer.
Check out our Expertyzr offer to learn about Trusted Computing solution.
Global Standardization:
Industry Specific Standardization:
Compliance to any standard certification level, Pre silicon Post silicon Software evaluation by LABORYZR, Software code or real device evaluated (White Box or Black Box against Reverse Engineering) and Pre Quotation & tailored Design for Security Recommendations. SoC Evaluation To avoid extra costs and delayed time to market, validate your…
A step by step guidance in the certification process from the roots to certification (CC, FIPS 140, ISO, CSPN) All our technological security solutions come with a set of services and support. Starting with the customer request and discussions about the security requirements, we first deliver the related IPs specifications…
Full catalogue of theoretical and practical trainings on Embedded Cyber Security. Product Integration / Installation To accelerate integration, we make all of our clients benefit from our expertise in the deployment of our technologies. Support can be brought remotely but we are also capable to send our engineers at our…
State-of-the-art synthesis of attacks/countermeasures and on any new security topic Independent audit of published attacks and practical feasibility report Security trend newsletter report State-of-the-Art Synthesis Because threats are constantly evolving, Secure-IC keeps long-term relations with all its clients to maintain the highest level of threat protection and awareness. Independent Audit…