Trusted Computing Technology
Nowadays, open platforms such as desktop and laptop computers provide complete choice to the users regarding what software to run, the power to read, to modify and to delete the stored files on them. This freedom of choice has created problems such as insecurity for the user due to being prone to viruses, insecurity for the network on terms of viruses that threaten other systems on the network, and insecurity for software authors and content providers regarding the allowance of copying without limit and loss of quality.
What is Trusted Computing?
It is a collection of ideas and proposals for a locked-down PC architecture, gives assurances about the application software run on it, and allows secure communication for applications with other servers and applications. The encryption of pathways between the system and its peripherals such as monitor, mouse, and keyboard is done. The encryption keys are built into the hardware of the system and are unavailable to the owner of the system. The operating system is run by the PC only if it can authenticate its integrity and identity, enabling it to communicate securely with remote servers to assure the identity and integrity of application software before running it.
What does Trusted Computing require?
It requires hardware support to enable the following:
- Hardware encryption keys
- Secure execution
- Memory curtaining
- Temper resistance
A small ROM program is given control at boot time which verifies the hash value of the operating system code before loading and running it. This guarantees the expected operating system which can, in turn, verify the hash of application programs before running them to check their honesty and credibility.
What is a Trusted Computing Group?
Trusted computing involves the enhancement of hardware and modification of associated software. This venture and specific plans are cooperated by Trusted Computing Group which consists of numerous major hardware manufacturers and software vendors. The specifications for computer resources protection are developed and promoted by a trusted computing group from malicious entities threats without infringement of end-users rights.
How Microsoft defines Trusted Computing Technology?
Microsoft breaks down trusted computing into four technologies which altogether require the use of new and improved hardware at a personal level computer. These four technologies, listed as follows, can be effective if they are supported by refinements and advances in operating systems and software used by PC.
- Secure input/output which addresses threats from spyware that captures the displayed content
- Remote attestation which discovers changes that are unauthorized to the software by producing certificates encrypted for all applications on the system
- Memory curtaining which avoids the programs from reading or writing inappropriately to others memory
- Sealed storage which allows computers to store encryption keys securely as well as other critical data
What are the Applications of Trusted Computing Technology?
There are many applications of trusted computing technology, which are as follows:
- The authentication of the platform
- The security of data
- The improving of reputation reckoning
- The management of digital rights
- The prevention of cheating in multiplayer games
- The computing of the third party
- The usage of anonymous service
- The balance of privacy and security
Latest posts by Moiz Khan (see all)
- How to Use AI to Enhance your SEO Strategies? - August 31, 2023
- What You Need to Know About Test Automation in DevOps - August 30, 2023
- 6 Cloud Computing Challenges That Businesses Need to Be Aware of - August 22, 2023