Nowadays, open platforms such as desktop and laptop computers provide complete choice to the users regarding what software to run, the power to read, to modify and to delete the stored files on them. This freedom of choice has created problems such as insecurity for the user due to being prone to viruses, insecurity for the network on terms of viruses that threaten other systems on the network, and insecurity for software authors and content providers regarding the allowance of copying without limit and loss of quality.
It is a collection of ideas and proposals for a locked-down PC architecture, gives assurances about the application software run on it, and allows secure communication for applications with other servers and applications. The encryption of pathways between the system and its peripherals such as monitor, mouse, and keyboard is done. The encryption keys are built into the hardware of the system and are unavailable to the owner of the system. The operating system is run by the PC only if it can authenticate its integrity and identity, enabling it to communicate securely with remote servers to assure the identity and integrity of application software before running it.
It requires hardware support to enable the following:
A small ROM program is given control at boot time which verifies the hash value of the operating system code before loading and running it. This guarantees the expected operating system which can, in turn, verify the hash of application programs before running them to check their honesty and credibility.
Trusted computing involves the enhancement of hardware and modification of associated software. This venture and specific plans are cooperated by Trusted Computing Group which consists of numerous major hardware manufacturers and software vendors. The specifications for computer resources protection are developed and promoted by a trusted computing group from malicious entities threats without infringement of end-users rights.
Microsoft breaks down trusted computing into four technologies which altogether require the use of new and improved hardware at a personal level computer. These four technologies, listed as follows, can be effective if they are supported by refinements and advances in operating systems and software used by PC.
There are many applications of trusted computing technology, which are as follows: