Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Interesting job ad from Microsoft:
Seems that they are pushing Trusted Computing with the big four as part of a solution for compliance with Sarbanes Oxley requirements (see bolds below). Wave's KTM (and later ACM) would certainly mesh nicely with Microsoft's initiative.
Manage the WW relationship and the business development with the Big 4 Audit PWC, KPMG, E&Y and Deloitte, which will result in increased sales of Microsoft client and server software - mainly in the Enterprise space. The position is to develop and manage the Big 4 Audit community, and drive MS business in the enterprise space with them around some key initiatives including Security, Sarbanes Oxley etc.
The Global Services and Technology Partners Team
Works with the major Platform Vendors and Support & Service organizations on jointly identified initiatives around solutions, product and service development, technology and marketing projects and programs, sales engagement, etc. Provides the Microsoft field with a list of go-to-partners to engage and win with in customer opportunities.
Works across Microsoft's Solutions Developer and Marketing Groups, Vertical industry and ISV Teams to create solution selling scenarios.
This person will be primarily responsible for developing and managing the WW relationship with the Big 4 Audit community, developing a partner community 1: few model, driving some key initiatives, Security, Sarbanes Oxley … and through these initiatives, increase their influence of Microsoft platform based products. This position will require international travel. An estimate of travel time would be 1-2 days /nights per week though this could increase or decrease based on the particular share of functional responsibilities assumed by the individual.
RESPONSIBILITIES:
This person will be primarily responsible for
Build global business plan and collaborate and communicate the plan for execution by region /subsidiary. Build partner community 1: few model.
Drives key business development programs and initiatives Security, Sarbanes Oxley with this community.
Owns selected strategies and establishes relationships with senior executive level partners.
Focuses on new business development opportunities.
Articulates the benefits of Microsoft technology .NET, web services, security/trusted computing, reliability, availability, scalability.
Identify and execute long range strategic opportunities to impact Microsoft presence in the Enterprise space through solutions and co-marketing activities.
Persuade with business arguments the reasons for the Big 4 Audit community to build and promote solutions based on a Microsoft platform, to jointly solve customer problems.
Communicate deliverables of program to Microsoft field. Build champions in subsidiaries, district offices and vertical sales teams. Use efficient leveraged means to engage the Microsoft sales force. Communicate local case studies, design wins and best practices.
Own and manage the assigned marketing budget.
This position is based in Redmond and will require cross US and occasional international travel. An estimate of travel time would be 1-2 days /nights per week though this could increase or decrease.
Contacts:
This position has frequent contact with all levels of Microsoft managers and periodic contact with Microsoft Executive Management. Additionally, this position will require regular contact with the respective Big 4 Audit Executive management and staff, vendors, and other partner companies.
Qualifications:
The position requires a significant industry experience with key Global SIs and large organizations.
Knowledge of Microsoft's products especially those for the Enterprise, product benefits, and competitive offerings, through experience in partner management programs, 10+ years of direct sales and /or consulting experience. Strong oral and written communication skills. Strong prioritization and objection handling skills, strong customer service and interpersonal skills, and budget and project management experience. A good generic technology background is required. Ability to travel as needed. College degree, MBA preferred.
Khillo - Agree with Barge
There are many intriguing questions here!!
Interesting connections between Intel and Wave vision.
I quickly went through the Intel "Wireless Trusted Platform" document and selected a few passages that distinctly echo Wave's language and vision as presented on their website. The parallels abound and go pretty deep, including how they envision attestation (first set of parallels). I'm sure many more could be pointed out.
-This from Wave on Embassy:
Platform Security: Enables the monitoring and control of platform configuration, boot and security features on the user's device. These capabilities assure that the user's platform has not been changed nor compromised and is therefore a 'trusted' device. Also, services based devices such as subscription PCs or servicer provided devices, can be controlled, managed, and even shut down in the event of violations of the services agreements.
-This from Intel on Wireless TPM
In this case,
the trusted boot code is designed to measure the present
operating configuration of the platform and securely stores that
measurement. The measurement can be presented to a user,
an internal process, or an external agent, such as a payment
server as part of a process called attestation. This allows the
requestor to check the present health of a platform before
enabling a secure service. For example, a payment server may
require that a platform be in a certain measurable configuration
prior before establishing a connection, or a local application may allow cryptographic keys to be used only if the platform configuration is the same as when the keys were initially created.
-WAVE
Broadcast Data System: Client enabled for receiving mass media, and interactive Internet data including electronic program guide, proxy server, multimedia players, and streaming data support using standard browsers. Broadcast Data System: Client enabled for receiving mass media, and interactive Internet data including electronic program guide, proxy server, multimedia players, and streaming data support using standard browsers. Fully integrated with e-commerce transaction systems and digital rights management technologies.
-INTEL
The Intel Wireless Trusted Platform building blocks enable a rich
set of capabilities that include secure network access based on
protected logon and secured VPN connections, information
access to remote protected documents and records, protection
of valuable information stored locally such as private databases,
digital tokens, digital content and rights objects, protected
communications, and protected electronic transactions including
online purchasing and banking.
-WAVE
The EMBASSY Trust System is the industry's first comprehensive trust infrastructure, tools and device components required to create, deploy, and manage Trusted Client hardware devices...Wave's EMBASSY Trust Assurance Network (TAN) will provide a complete trust infrastructure. required to support and operate a network of Trusted client devices
-INTEL
A hard lesson learned through several spectacular security
failures is that security cannot be added on. Security must be a
key consideration from the beginning of definition and designed
in from a top down system perspective. This fundamental truth
is still often overlooked as developers try to patch security by
adding security building blocks to address specific vulnerabilities. Individual point solutions do not always interoperate securely and it can be near impossible to measure the resulting level of platform security without the necessary architectural framework.
-WAVE
Wave's trusted client-server products provide two primary functions to business's and users that deploy TPM platforms. The first is backup of created TPM keys, and the second is to manage or migrate keys that a user or network administrator would like to recover/move to a new Trusted platform.
-INTEL
Moreover, the security framework must take into
account all stages of a product's life cycle, from provisioning
through customer use and finally end of life, where end
customers will want to be able to migrate their security
configurations and secrets to a new platform.
go-kite -I don't deny Verisign's stature
but my point is that Intel has a very clear idea of where it wants to go with Trusted Computing and that vision meshes very nicely with facts on the ground already proven and tried by Wave. Just look at the Intel PDF surfaced by CM on Trusted Wireless Platforms. Wave has already worked on e-wallets, online purchasing, secure banking, secure datacasting and interactive entertainment, metering etc Not only do they clearly see how all of these can work together in the trusted computing space, but they also have products in these areas that can be quickly implemented. It seems clear to me that Intel and Microsoft are moving into these types of trusted operations quicker than I had anticipated (maybe spurred on by Apple's success)and that Wave can be a valuable partner for both of them. Show me how Verisign has this kind of depth in Trusted Computing or show me where they even mention any details of device attestation as it relates to Trusted Computing (way back when they were working on the TAN Wave was already getting into this). My next post points out some blatant parallels between where Intel is going with Trusted Computing and what Wave has been saying for an eternity. Regards and appreciate your comments, Foam
The Intel Wireless PDF emphasizes the need to measure the platform configuration at boot up time and also thereafter when needed (PHOENIX). These measurements are then stored in a secure area where they can be attested by an authentication authority during any trusted transaction. The blurb below from the Phoenix Technologies site more or less refers to the same process. Still seems that Wave's ACM alone could presently handle that kind of authentication - there's no detailed description of Wave's ACM on their site but these kinds of functions are consistent with what Wave has been preaching for a long time now.
(FROM PHOENIX TECHNOLOGIES)
Device Authentication
In today's networks, there is no easy, built-in way of identifying what types of devices can connect to the network. When an organization's IT department cannot identify or control a device, it becomes a potential vulnerability to network integrity. If it is to fully protect an organization, a security policy not only should keep unauthorized individuals from gaining improper network access, but also should deploy measures that enforce a policy for the computing devices that are given access to the network. Devices should be checked for proper configurations, patch versions and latest updates of security software like anti-virus. Modern IT policy in the age of trusted computing should authenticate devices and deny access to devices that do not conform to the profiles defined in the device security policies.
With Phoenix cME TrustConnector, enterprises can now authenticate the devices as they connect to the network. The authentication can happen at multiple levels - at the switch, AV server, directory servers and so on. : TrustConnector enables the presentation of security status information of the connecting device to the authentication authority, thus making the entire network more secure.
On CM's "Intel Wireless Trusted Platform" PDF
Just read CM's very interesting find (on the other board) and then went back and reread the Wave/NTRU PDF. The tone, language and specifics are very close to each other.
-(FROM THE WAVE/NTRU DOCUMENT)
The NTRU Core TCG Software Stack (CTSS)
The NTRU CTSS is designed in accordance with
the TCG TSS standard and is enhanced with
strong, standards compliant cryptographic
libraries. The CTSS provides a set of software
components that allows applications and
peripherals to take advantage of a platform's TPM
hardware module in a coordinated, consistent and
portable manner.
Following are selected features of the CTSS:
-Fully compliant with TCG specifications and
guidance for standard TSS design
-Strong, standards compliant cryptographic
services built-in
-Interoperable with all 1.1b compliant TPMs
-Includes migration path to 1.2 compliant TPMs
-Modular design enables addition of custom
functionality
-Supports application-defined security policies
-Maintains authorization data within the local
process
(FROM THE INTEL DOCUMENT)
Security Software
The Intel Wireless Trusted Platform solution includes a security
software stack that enables the operating system (OS) and
applications to access the Intel Wireless Trusted Platform resources through standard Cryptographic APIs. This allows the OS and applications to access the underlying cryptographic services without having specific information regarding the split of functions between hardware and software, or knowledge of the hardware interfaces and protocols. The application interface is provided by the Intel® Integrated Performance Primitives--Cryptographic Primitives (Intel® IPP cryptos). The Intel IPP cryptos fill high-level requests for cryptographic services using a combination of software services and the hardware security capabilities found in the security module. When the security module is invoked, the Intel IPP cryptos translates high-level requests for security services to a set of primitive operations that are executed by the Intel® Wireless Trusted Module. The Intel IPP cryptos also provides highlevel
management for the Intel Wireless Trusted Module functions.
Based on Intel's Vision going forward...
It seems that Intel is pursuing an aggressive strategy of bringing together all the nodes on the current digital network into a common trusted space. Enterprise, diverse wireless points of access, home networks, mobile phones/communicators etc are all lined up for TPM deployment and will require an array of interesting trusted functions (business, entertainment, commerce, banking etc) to make them more attractive and a sophisticated trusted architecture (servers) to manage this dynamic and increasingly pervasive trusted network. The language of what they are doing in this space certainly sounds a lot like Wave-speak. Also seems that Microsoft has its eye on this game (Media Player, Security, Games, Peer to Peer) and is in some form talking with Wave for enterprise security (ETS) and perhaps entertainment (Wavexpress). Certainly, both gorillas are to some extent aligned in their endeavours and visions and, in my opinion, Wave fits into this picture best of all (of course, there will be others). It's not just their ACM or KTM or ETS that has some special appeal but it's how they fit so well into this entire picture that makes their prospects so attractive in this space. Any of the big companies working with them have to appreciate the depth which they can offer in this sector (and I don't believe Microsoft and Intel are going forward blindly). I also don't think that all of this will continue to be a theoretical matter for much longer. Regards, Foam
Doma -About Banias and Verisign
What I've read about the Intel/Verisign collaboration around the Banias processors is that Verisign's offerings would permit user authentication and then the certificates would be stored in the TPM. This doesn't seem like device attestation to me. I do concede that the TCG does advertise Verisign as having attestation servers, but the question that immediately comes to my mind is how close to a working (and tested) reality are these servers. Wave has been speaking about ACM now for some time, presumably they are close to being a tested reality (albeit in stealth mode for now just like the KTM). Can we say the same for Verisign (they certainly have deeper pockets than Wave, so they may very well be well into this thing)? I would appreciate your comments on these crucial issues, since I think they are at the very heart of current and crucial business realities. Also, perhaps Intel and others will be enticed by the greater depth of Wave's offerings in the Trusted Computing space (attestation is crucial, but if you can get even more trusted functions, why not). Thanks and my best regards, Foam
Orda-Microsoft on a similar track
(Job ad from Monster.com)
Longhorn has been conceived as the next great wave to carry personal computing to new heights. One of the three key pillars of this industry-leading system is the area of collaboration and communications. The vision of this pillar has two key parts: the first is to deliver key platform technology components for ISVs to build exciting solutions that allow people to interact with others regardless of their location at home or work, or on the move; the second is to deliver out of the box user experience enabling powerful and natural ways for users to interact with others in their various social networks and for sharing information among the members of these communities. The collaboration pillar will include capabilities for powerful Identity-System based trusted peer-to-peer interaction, and for enabling multi-modal real-time and asynchronous communication; it will exploit the power of WinFS schemas to represent collaboration contexts, and use Indigo technologies for enabling distributed applications, and server and services technologies from MSN and our server organizations. With Longhorn collaboration, users will be able to enjoy exciting and fun solutions for more effective team interaction, more fluid and natural sharing of information among family and friends, and exciting entertainment and team games. The Peer Networking team owns key technologies needed to enable these scenarios.
Specifically, we are responsible for providing serverless (that is, peer-to-peer) implementations of several of the platform pieces required, such as name resolution, presence and multipoint communication. Together with other teams, we will also be working on the end-user experiences that will be part of the Longhorn collaboration capabilities. We’re looking for an outstanding senior development lead to lead a highly skilled, motivated team of developers that will build the next-generation set of features in the peer-to-peer collaboration space. This will entail being the technical owner of a set of features, working with the team to produce detailed technical designs and schedules and managing the developers on the team to produce high-quality implementations of the features on time. The position will have a strong hands-on component - we expect our leads to take an active part in writing the code for the product and be well-versed in the technical details of the features owned by their team.
Experience developing production-quality system software in C/C#/C++ is required. Knowledge of networking, distributed systems and the .NET framework is a big plus. Previous experience managing and growing a team of developers as well as a good track record of cross-group work are a big plus. The successful candidate will be a team player who is highly focused, has excellent people management skills and has a strong desire to help ship a robust, scalable, secure system that meets customer needs. If you have the skills above and like to be involved with the newest technology then this is the place for you!
Orda Thanks,
Intel's bet that the line traditionally drawn between the Enterprise and the Consumer will be effaced by the reality of a ubiquitous network (as per the demo on the Communicator) is probably correct. It seems to me that as this scenario comes closer to being a daily reality Wave's technology will become increasingly relevant (assuming all goes well for Wave in the meantime, of course). Also seems that Microsoft has not been idle on this front (cf. Janus etc) and that interesting things are on the horizon. Regards, Foam
Interesting Flash demo on Intel Universal Communicator
http://www.intel.com/labs/index.htm?iid=HPAGE+up_about_randd&
There is an interesting mention of the need for Trusted Identity and Authentication as all kinds of devices start to connect in an increasingly porous network. Seems quite clear that Trusted Computing is at the heart of Intel's vision for the future. I found it interesting that Intel's presentation on Lagrande at the China IDF is in the Home Networking Track. Seems like the push for Trusted Computing in the consumer sector will come sooner than later. Add to this the fact that Sony Entertainment and NVidia are currently hiring in the field of Trusted Computing and you start to get a pretty interesting picture. Regards, Foam
And Broadcom
(so who said TCG will die before it is born?)
Broadcom Corporation is a leading provider of highly integrated silicon solutions that enable broadband communications and networking of voice, video and data services. Using proprietary technologies and advanced design methodologies, Broadcom designs, develops and supplies complete system-on-a-chip solutions and related hardware and software applications for every major broadband communications market.
Our diverse product portfolio includes solutions for digital cable and satellite set-top boxes; cable and DSL modems and residential gateways; high-speed transmission and switching for local, metropolitan, wide area and storage networking; home and wireless networking; cellular and terrestrial wireless communications; Voice over Internet Protocol (VoIP) gateway and telephony systems; broadband network processors; and SystemI/O server solutions. These technologies and products support our core mission: Connecting everything..
Develop drivers, BIOS, and applications for Security products. Be responsible for the definition and execution of system testplans for security products.
Work with S/W and H/W teams to set up test environment.
Document and implement Software & System QA on Security Applications. Enable customers to use our security solutions.
QUALIFICATIONS:
Strong tools skills including GNATS, Make, Perl, TCL, Python, CVS/RCS, CD Tools, C and C++ Experience with Unix, Linux and Windows environments. Strong driver and BIOS experience. Familiarity with security applications such as TCPA and TCG is desirable. BSC in Computer Engineering or Computer Science; MS preferred
Same with Sony Pictures Entertainment
Sony Pictures Entertainment is a leading creator and distributor of entertainment products, services and technology. Our global operations encompass motion picture production and distribution, television programming and syndication, home video acquisitions and distribution, operation of studio facilities, development of new entertainment technologies and distribution of filmed entertainment in over 67 countries.
The function of the Sr. Security Specialist is to act as the subject matter expert on copy protection technologies, systems and vendors. This position will be asked to evaluate digital rights management, fingerprinting and watermarking technologies at a detailed level, including low-level understanding of both software and hardware components. These evaluations will serve as a guide to Sony Pictures policy related to content licensing, standard-setting efforts and development activities.
In addition, the Sr. Security Specialist will serve as primary technical liaison to Sony core technology teams. The Security Specialist will be expected to define detailed requirements for copy protection aspects of these systems, and work collaborative with these teams to build the envisioned systems.
Key Responsibilities:
- Work closely with the Senior Vice President of Strategic Technology in organizing Digital Policy Group positions on a broad range of Internet, digital media, digital rights management, copy protection, and standards-setting activities.
- Provide in-depth technical analysis and advise the Digital Policy Group on technical aspects concerning content protection technologies, digital rights management systems, watermarking/fingerprinting technologies, peer-to-peer architectures, device driver authentication in trusted PC systems, Internet Protocol networking security, Public Key Infrastructure (PKI) cryptography, and security co-processors.
- Analyze, discuss, draft and present technical specifications and requirements for digital content protection, digital rights management and content delivery standards and systems.
- Provide analysis and recommendations about the robustness of copy protection systems implemented by content delivery systems.
- Participate in and report on standards-setting activities such as Digital Home Working Group, Digital Video Broadcasting group, and the Trusted Computing Platform Alliance.
- Work collaborative with various Sony core technology teams to define, document and develop copy protection systems and components.
- Meet with computer hardware and digital media software manufacturers to analyze and review Internet content delivery standards, digital rights management systems, and watermarking technologies.
- Provide technical support to anti-piracy efforts, including investigation of software-based tools that circumvent content protection and digital rights management systems.
Required Skills:
- Bachelor of Science degree in mathematics, engineering, or computer science field.
- A min. of 3-5 years work experience in product development or product planning of digital media player, digital rights management, copy protection or streaming media delivery systems.
- A min. of 6 - 8 years of proven hands on experience working in digital media, cryptographic systems, public key infrastructure encryption, secure digital media delivery technologies, IP networking, MPEG, and digital rights management systems.
- Superior interpersonal and communication skills; with the ability to convey complex ideas in clear, logical terms, and persuade others to understand and agree.
- Comfort with speaking in front of large groups.
- High energy, self-starter with ability to operate autonomously and to manage complex, long-term projects.
- Sound business acumen with creative insight and the ability to craft technical business solutions, both strategic and tactical.
This position is fundamentally technical in nature requiring deep technical proficiency but has elements of business, legal and political analysis that are also critically important. In addition, the position will involve travel, both domestic and international up to 25% per month.
As a global leader in creativity and innovation, Sony Pictures Entertainment draws upon the diverse backgrounds and perspectives or our workforce for continued success. Our respect for employee differences and focus on employee development encourages a progressive and rewarding work environment. In addition, SPE offers excellent benefits: medical, dental, vision, 401k, 10 paid holidays, plus much more.
To be considered for this position, you must meet the minimum qualifications as described above and forward your resume online at www.sonypicturesjobs.com / under Information Technology.
Sony Pictures Entertainment is an EE/AA/E. No telephone calls please.
Nvidia looking to hire TCG Specialist
(I put in a search for Trusted Computing at Hot Jobs)
The computing industry recognizes NVIDIA as the global leader in advanced graphics processing technology for mainstream platforms, awarding the company the most awards in the history of the PC industry. The unmatched breadth of the NVIDIA product family enables gripping multimedia experiences for the entire desktop computer market from workstations to internet-enabled appliances. NVIDIA was recently voted the Most Respected Public Fabless Company and also earned the distinction of the Best Financially Managed Company. In addition, the FSA honored the Company for its achievement as the fastest U.S.-based semiconductor company to hit $1 billion in revenues.
We have a team of brilliant, creative, hard-working employees and we are always looking for more. Join the best of the best and reap the rewards! You've heard of our past accomplishments like the Microsoft X Box, performance leading NFORCE chipsets and the industry leading GeForce line of Graphic Processors ... come work of projects that will continue to define our market dominance and share in the billions it will bring us in the next four years.
CHIPSET SECURITY ARCHITECT
Responsibilities:
Expert sought in computer and system security. The architectural and systems aspects of security are far more important for this position than cryptographic and theoretical background. Position will entail definition of requirements, and architecture for trusted PC core logic, as well as representing Nvidia technically at security standards organizations and in bilateral work with other companies.
Minimum Requirements:
BS in CS, EE or related technical field required, advanced degree desired.
Experience on the PC platform desired, and an understanding of PC hardware and software architecture desired.
Experience in computer architecture desired, in particular in core logic supporting the memory controller, various I/O standards including PCI, Express, AGP, USB, LPC, and integrated devices such as disk and networking controllers.
Experience with Trusted Windows, the architecture defined by the Trusted Computing Group (TCG), the Trusted Platform Module (TPM), and with the next-generation trusted PC highly desirable. EOE
2B-Foxconn member of Intel Innovation Alliance
Seems that they foresee future demand from Taiwanese OEMs for 1.2 TPM functionality for corporations.
"Foxconn is the registered trade name for Hon Hai Precision Industry Co., Ltd. Hon Hai Precision Industry Co., Ltd. ("Foxconn") is a global leader in providing mechanical solutions. It is the largest manufacturer of connectors for use in PCs in Taiwan, and a leading manufacturer of connectors and cable assemblies in the world. The company also manufactures enclosures, primarily for desktop PCs and PC servers."
Would be glad to get your impressions on this. Regards, Foam
Intel Kessler(TPM 1.2)for Corps.(Foxconn Blazer I)
http://www.intel.com/platforms/desktop/vision/KesslerFlyer.pdf
Corporate Stable Platform
Foxconn* Blazer I
■Integrated Graphics
■Intel
®
802.11b/g Wireless Networking
with Integrated AP
■uBTX Form Factor
■Dual Channel
DDR2 SDRAM
■Intel
®
Stable Image Platform Program
■Trusted Platform Module 1.2
■Gigabit Ethernet
Cybersecurity liability seen increasing
(How's this as an incentive for Trusted Computing? - Foam)
Last modified: March 28, 2004, 5:40 PM PST
(www.news.com)
By Reuters
Hackers, viruses and other online threats don't just create headaches for Internet users--they could also create prison sentences for corporate executives, experts say.
Though business groups have lobbied successfully against laws focused on cybersecurity, companies that don't make efforts to secure their networks could face civil and criminal penalties under an array of existing laws and court decisions, according to security and legal experts.
"Computer security is not solely a technology issue," said Dan Burton, a vice president at computer-security firm Entrust who serves on a private-sector board to boost accountability.
Though health care, banking and deceptive-business laws all create security obligations, a new accounting-reform law now being phased in is likely to have the biggest impact.
The 2002 Sarbanes-Oxley Act holds executives liable for computer security by requiring them to pledge that companies' "internal controls" are adequate, and auditors are starting to include cybersecurity in that category, said Shannon Kellogg, director of government affairs at RSA Security.
Violating that provision could lead to criminal charges by the Justice Department and jail, said David Becker, a partner at the law firm of Cleary Gottlieb in Washington and former general counsel at the Securities and Exchange Commission.
"Any egregious intentional violation of federal securities law could be criminal," Becker said.
Companies that can prove they have taken concerted steps to improve their networks stand a much better chance of success in court, experts say.
Online viruses and worms like Sobig and Slammer have clogged computer networks and knocked vital Web sites offline, costing businesses some $55 billion in productivity last year, according to anti-virus company Trend Micro.
Other online risks, from identity theft to espionage, are harder to quantify.
The U.S. government released a plan to increase online security last year, but it contained few hard-and-fast requirements for the businesses that control roughly 85 percent of the nation's Internet infrastructure.
Another proposal to require public companies to disclose cybersecurity efforts was shelved last fall after business groups objected.
But many of the experts who advocate a hands-off approach say businesses will have to upgrade their online defenses, thanks to Sarbanes-Oxley and other laws.
Health care companies will have to ensure by April 2005 that electronic patient data is stored in a confidential and secure manner, under the Health Insurance Portability and Accountability Act of 1996.
Banks and other financial-services groups face similar obligations under the Gramm-Leach-Bliley Act of 1999.
Companies that don't live up to their security promises have faced action by the Federal Trade Commission. Drug maker Eli Lilly agreed to beef up its internal security after it inadvertently revealed the e-mail addresses of customers who used its Prozac anti-depressant medication.
Some courts have held businesses accountable as well. A Maine state panel ruled last year that Verizon Communications should have foreseen that its network would be vulnerable to Internet attacks like the Slammer virus, and thus should be forced to make infrastructure payments to the state even when its network was down.
In Washington, a judge has several times ordered the U.S. Interior Department to unplug its computers from the Internet until it can guarantee that trust-fund payments to American Indians are secure against hackers.
"In the realm of terrorism and cyberterrorism, courts are more willing to find negligence than they did before," said Bill Cook, a partner at Wildman Harrold in Chicago.
Others are less convinced that a courtroom precedent is emerging, though they say that is no excuse not to improve computer defenses.
"There are some court cases, but I don't know that there's really enough to pull together," said Bruce Heiman, a partner with Preston Gates & Ellis in Washington.
Story Copyright © 2004 Reuters Limited. All rights reserved.
Lagrande&Digital Home at China IDF
Interesting that there is a presentation on Lagrande in the Digital Home series of talks. I thought this connection might appear somewhere down the line.
http://www.prcidf.com.cn/eng/conf_info/track_digital.html
- Digital Home
Date Time Session tittle
Apr.15 13:30-14:00
14:00-14:50 Next Generation PCs Enabled with PCI Express* TV-tuners
• Platform design considerations and how PCI Express* enables the
new multimedia capabilities on TV tuners for the digital home.
• Design details on PCI Express card implementation.
• Information about the end-user experience with PCI Express and PCI
Express cards.
• An understanding of the '04 multimedia PCI Express solution and
next-generation capabilities.
14:55-15:45 Triple Play: Designing Intel ® Architecture-based Digital Set Top Box Systems
with Enhanced Services (Video Phone, VoD, Data )
What you will get from this session:
• Guidelines for designing a digital Set Top Box (STB) based on the
Intel® 815 chipset.
• Guidelines include:
• Development of standardized motherboard architecture.
• Implementation of a quality TV video output solution.
• Example of low power, fanless and diskless design.
• Best known methods for implementing advanced digital Set Top Box
services, such as Voice-over-IP (VoIP) and Video-on-Demand (VoD).
• Explanation of codec and VoIP challenges.
• Demonstration of an IA-based STB and 'Triple play' (VoIP, VoD, data).
keywords: digital home
15:50-16:40 picoBTX(SFF) Thermal/Acoustic Design
• Thermal and acoustic design advantages of pico Balanced
Technology Extended (picoBTX).
• System airflow distribution and design characteristics.
• Key attributes and example solutions for component thermals.
• Discuss acoustic strategy and fan speed control.
16:45-17:35 Digital Home PC Platform Design Considerations
• Introduction to the digital home environment and integral PC platforms
• Lessons learned in integrating key technologies into digital home platforms
• Case study in design considerations for a targeted PC platform (Entertainment PC)
• How Intel programs and tools enable better, more innovative platform design
Apr.16
13:30-14:00 The Technology behind Graphics; Evolution and Trends- NVDIA
• The session follows the evolution of each of the fundamental
technologies relevant to graphics, including: --Process technologies
--Memory --CPU --Graphics macro trends It leads to a more detailed
description of the evolution of the bus, the transition to PCI-E and what
NVIDIA is doing with PCI-E.
• The session includes examples and demos and concludes with a
look at the future of graphics by extrapolating the growth in each of the
technology areas and highlighting some of the challenges that will
need to be overcome.
14:00-14:50 LaGrande Technology and Safer Computing Overview
• Overview of the market opportunities, technology, platform
requirements and usage models for LaGrande Technology and
Intel's Safer Computing Initiative.
• Intel's position on effective and responsible deployment of LaGrande
Technology.
• Important context baseline for attendees moving on to technical
sessions in this track.
• One-stop program summary for those desiring a high-level overview
14:55-15:45 Building Interoperable Networked Digital Media Products: Technical Requirements
and Tools
• Opportunity and benefits of building interoperable networked digital
media products.
• Guidelines for interoperable digital media products via Intel's
Networked Media Product Requirements (NMPR).
• Intel® Tools for quickly building and testing NMPR conformant digital
media products.
• Vendor experiences with building products to NMPR with Intel® Tools.
keywords: digital home
15:50-16:40 microBTX System Thermal Mechanical Design Validation
• Detailed understanding of the validation procedure utilized to ensure a
robust next- generation platform form factor.
• Thermal performance results for micro Balanced Technology
Extended (microBTX) system and sub-system components including
flow performance and processor heatsink thermal performance.
• Acoustic performance results for microBTX system.
• Mechanical performance results for microBTX system.
• Discuss performance and sensitivity of critical parameters and their
effect on microBTX system performance.
16:45-17:35 2004 Platform Ingredient Deployment Technical Details
Doma-My pleasure
The least anyone could do in return for the excellent DD you've been doing of late (and many others, I might add).
The connecting lines seem to be emerging into greater relief, just waiting for the trigger event that will make it all come into clear view. Regards, Foam
NSM plugging Super I/O Security at Asia IDF (April 12-13)
-Here's the blurb on their presentation:
"NS: Next Generation SuperI/O - Incorporating Security and
Manageability Functions into Desktop and Notebook PCs"
http://www.apacidf.com/twn/Conference/Sponsorinfo/sponsor_sessions.htm
-There are also some conferences on SECURITY
13:00-13:50 LaGrande Technology and Safer Computing Overview
Overview of the market opportunities, technology, platform requirements and usage models for LaGrande Technology and Intel's Safer Computing Initiative Intel's position on effective and responsible deployment of LaGrande Technology
14:00-14:50 Trusted Platform Module (TPM) Impact to Manufacturing ,Impact of key generation during manufacturing
Credential and key options for system level assembly
Protection of key and credential generating machinery
Testing of the TPM platform
15:40-16:30 LaGrande Technology Architecture - Part I
A review of La Grande Technology architecture - hardware and software partitioning and domain sepration LaGrande Technology hardware block diagram with impact to CPU, memory protections, DMA, integrated graphics, TPM and protected input and output
LaGrande Technology-focused usage scenarios Design principles
16:40-17:30 LaGrande Technology Architecture - Part II
XTS-400 Trusted Computer System (Intel Xeon)
www.digitalnet.com/solutions/info_sec_sol/ pdf/XTS-400TechnicalOverview.pdf
This PDF document gives the specs for trusted servers to be used by certain government agencies. Seems to be somewhat inspired by TCG and validates further the trusted computing model, I believe.
Another International Conference on Trusted Computing
Looks like Intel and IBM are very busy on this front (if you look at the list of organizers). One of the topics is secure key storage!
www.world-academy-of-science.org:8080/ CSREA/ws/SAM/samsession1
Call for Papers Special Track on Trusted Computing Platforms Special Track on Wireless and Mobile Security The 2004 International Conference on Security and Management (SAM'04) June 21 - 24, 2004, Monte Carlo Resort, Las Vegas, Nevada, USA The SAM'04 Conference will be held simultaneously with a number of other international conferences and workshops, and will be sponsored by the World Academy of Sciences and co-sponsored by CSREA. This year, SAM'04 will once again offer a Trusted Computing Platforms Track, and will introduce a new Track on Wireless and Mobile Security aimed at promoting discussions on industry efforts to implement wireless security technologies. You are invited to submit a paper which may be about 5 pages (see below for submittal information), or a panel proposal. All accepted papers will be published in the conference proceedings.
SCOPE OF THE TRUSTED COMPUTING PLATORMS TRACK Topics of interest should be centered around Trusted Computing and include the following:
Trusted Identity Management
and Federation Data
and Memory Protection
Smartcards and Security Tokens
Trusted Path and Channels
Trusted Platform Modules
Secure Key Storage
Tamper Resistance Trusted Signature
Secure Operating Systems Policy Enforcement and Languages Intrusion Prevention and Detection
Identification and Authentication
Cryptographic Techniques
Privacy and Authenticated Anonymity
SCOPE OF THE WIRELESS AND MOBILE SECURITY TRACK Topics of interest should be centered around Wireless and Mobile Security and include the following: Mobile Device Security IEEE 802.1x, EAP, PEAP, WiFi, and WAPI Security Mobile Identity Management
GSM and 3G Security Mobile
Lightweight Cryptography mCommerce Security
Airborne Viruses
Bluetooth Security
Instant Messaging Security
Secure Location Related Services
Wireless Authentication and Key Exchange Privacy of GSM, CDMA, and 3G
SUBMISSION OF PAPERS AND PANEL PROPOSALS Prospective authors are invited to submit a draft copy of the paper (about 5 pages - single spaced, font-size of 10 to 12) to Selim Aissi @ selim.aissi@intel.com by the due date (see schedule below). The length of the Camera-Ready papers (if accepted) will be limited to 7 (IEEE style) pages. Papers must not have been previously published or currently submitted for publication elsewhere. Panel proposals should be no longer than three pages in length, should include possible panelists, and should include an indication of which panelists have confirmed participation. The first page of the paper or the panel proposal should include: title and each author's name, affiliation, postal address, E-mail address, telephone number, and Fax number. The first page should also include the name of the author who will be presenting the paper and a maximum of 5 keywords. IMPORTANT DATES Feb. 20, 2004: Draft papers and panel proposals due March 22, 2004: Notification of acceptance April 21, 2004: Camera-ready papers and pre-registration due
GENERAL CHAIR TRUSTED COMPUTING PLATFORMS TRACK Prof. H.R. Arabnia WIRELESS & MOBILE SECURITY TRACK
Selim Aissi, Ph.D., CISSP - Intel Corporation (Chair) Nora Dabbous - Gemplus SA CONFERENCE VICE CHAIRS Hiroshi Maruyama, Ph.D. - IBM Corporation Selim Aissi, Ph.D., CISSP Ned Smith - Intel Corporation Prof. Youngsong Mun Wyatt Starnes, Tripwire, Inc. (President and CEO) Please refer to http://www.world-academy-of-science.org:8080/CSREA/ws/SAM for up-to-date information on The 2004 International Conference on Security and Management (SAM'04).
Intel Universal Communicator Prototype (TPM mention)
This PDF document dates to September 2003 and proposes the use
of a TPM on Universal Communicators. I haven't seen it before, my apologies if it has already been posted.
www.intel.com/netcomms/events/downloads/ intel_universal_communicator_wp.pdf
Go to page 7 where there is a diagram of the architecture and some mention of security and authentication.
Regards, Foam
"Wave is working with Microsoft"
I think I heard SKS say this at the beginning of the CC. Seemed to me that it referred to more than making sure that ETS works well in a Microsoft environment (windows, office). ETS already works with office and his statement seemed more forward-looking. Anyone care to speculate on this remark of his? I don't think I have ever heard him state so explicitly this relationship before. Given the delays with NGSCB it probably refers to a long-term objective, but I found it interesting nonetheless. Regards, Foam
More on the DPX-114 -Transmeta & TPM
SANTA CLARA, CA and KENT, ENGLAND - January 27, 2004 - Transmeta Corporation (NASDAQ: TMTA), the leader in efficient computing, and Densitron Technologies, the display and computer products specialist, today announced that the Transmeta Crusoe processor will be used on the new Densitron Technologies DPX-114 Single Board Computer (SBC). The DPX-114 is specifically designed for a wide range of embedded applications that require high-security, a small footprint and high-performance. The DPX-114 is optimized for use in a variety of deployments such as ATMs, telecommunications, ticketing, vending machines, POS kiosks, video slot machines and various multimedia gaming applications.
Launched as part of the new Densitron ConnectBus® II platform, the DPX-114 provides the OEM with a turnkey solution for the creation of embedded SBC devices. Based on the Transmeta Crusoe processor, the DPX-114 offers a full range of performance starting at a 667MHz model with optional graphics, up to a 1GHz model that incorporates MOBILITY RADEON graphics technology by ATI. The latter enables high-end graphics with extended capabilities such as the ability to run dual independent displays, wide-format displays, digital LCD and plasma screens.
The Transmeta Crusoe microprocessor, used in conjunction with an industry standard Trusted Platform Module (TPM) solution, enables the high level of onboard security necessary for use in certain markets such as automated banking and the multimedia gaming industry. Specific functions include the Data Encryption Standard (DES) for encryption and decryption, secure key storage and Secure Hash Algorithm (SHA) acceleration. These functions allow the system to lock the software down to the hardware platform, thereby protecting the code against theft or cheating and preventing software piracy.
"We are excited that the Crusoe line of processors is now available to additional markets with the introduction of Densitron's new single board computer," said Arthur L. Swift, senior vice president of marketing at Transmeta. "Pairing the low power, small footprint and high-performance Crusoe processor with the high-security features implemented by Densitron in the DPX-114 makes this new single board computer well suited for use in the automated banking industry, vending machines, video slot machines and various other embedded applications."
In addition to its security and performance features, the DPX-114 is capable of running processor-intensive multimedia applications such as MPEG4 or MPEG2 video while using less than ten watts of power. It also features an accelerated PCI wavetable polyphonic sound controller with 4-channel Line level outputs offering impressive sound capabilities. The DPX-114 includes a versatile expansion bus (DirectPC) that allows a wide range of I/O configurations through Densitron or customer specific I/O cards. Other features include two serial ports, four USB ports, a PCI Bus Master 10/100Base-TX Ethernet controller and support for up to 512MB DDR SDRAM.
"We have produced a winning product combination by building the Transmeta Crusoe into our new single board computer platform," said Nick Jarmany, technology director at Densitron. "The Crusoe processor-based DPX-114 makes sound economic sense for any manufacturer designing new equipment. It provides an efficient, high-performance platform with great multimedia capabilities on which our customers can build the next generation of embedded single board computer related devices."
The Densitron DPX-114 is currently available. For more information on the product, please visit www.densitron.com/computers.
About Densitron Technologies
Densitron Technologies plc is a leader in flat-panel display technologies and embedded PC products. Densitron designs, manufactures and sells industrial computers, flat-panel industrial monitors, graphic and alphanumeric LCDs, touchscreen display assemblies, and public information systems. Densitron specializes in engineering the most cost-effective solution to meet its customers needs and has the ability to design and manufacture turnkey solutions for the handheld, medical, instrumentation, and industrial OEM markets in America, Asia and Europe. Visit us at www.densitron.com for more information on our products and services. Densitron Technologies plc (LSE: DSN) is a publicly held company, traded on the London Stock Exchange.
About Transmeta Corporation
Founded in 1995, Transmeta Corporation designs, develops and sells highly efficient x86-compatible software-based microprocessors that deliver a compelling balance of low power consumption, high performance, low cost and small size. We announced our first Crusoe family of processors in 2000, and we introduced our new Efficeon family of processors in October 2003. Our products are valuable for diverse computing platforms demanding energy efficiency, low heat and x86 software compatibility. We also develop advanced power management technologies for controlling leakage and increasing power efficiency in semiconductor and computing devices.
To learn more about Transmeta, visit www.transmeta.com.
26601 - TCPA/TPM Compliant Security Device
is what they call it (their own hardware?). The board is being marketed for the following sectors (but gaming seems to be in the foreground) :
Gaming industry
Monitoring equipment
Mission critical applications
Telecommunication
Secure applications
ATM
Ticketing
Vending machines
POI kiosks
Thanks Doma, just saw your reply while posting. Foam
TPM in Gaming Board from Densitron(Intel Processor)
Don't know if this has been posted before, but you can get more information at densitron.com (under computers)- the DPX-115 also has a TPM.
January 2004 Small Power Consumption and Small Size, but High Performance makes Densitron's new DPX-114 Gaming Board a Winner.
Using only 10 Watts of power while playing an MPEG4 video, the new DPX-114 embedded PC board from Densitron Technologies, provides significant savings in both power and thermal management for gaming machines.
Considering the power used and heat generated by banks of video slot machines in a casino environment, the DPX-114 with its energy efficient Transmeta Crusoe® processor makes sound economic sense for any manufacturer designing new equipment, or any operator who is looking to reduce overheads. The small size, just 195x148mm (7.7 x5.8 inches), together with the low power and cooling requirements also makes the DPX-114 ideal for smaller gaming machines, kiosks, ticket machines, and table top or portable devices.
Providing exceptional value and ideally suited to AWP gaming equipment, the DPX-114 is launched as part of the new ConnectBus® II gaming platform from Densitron, the established pioneer in embedded PC technology for the gaming industry. ConnectBus® II is a platform that offers the gaming OEM a complete solution for building gaming devices.
Densitron offers a range of performance with the DPX-114 from 667MHz with no video for driving mechanical (reel) systems, right up to a 1GHz CPU coupled with ATI Technologies' powerful Mobility® Radeon® graphics. The ATI graphics system breaks new ground in embedded computing, and enables state of the art 3-D graphics with advanced capabilities such as dual independent displays, wide format displays, digital LCD and plasma screens.
Gaming devices require a high level of security and the DPX-114 offers on-board hardware for functions such as DES (data encryption standard) encryption/decryption, secure key storage and SHA (secure hash algorithm) acceleration to lock down the software to the hardware platform, combat software piracy and safeguard the game code against cheating. These functions are provided by the Transmeta Crusoe® processor and the industry standard Trusted Platform Module.
With well over 10,000 worldwide installations, the Densitron range of ConnectBus® SBCs has already proven itself in the most demanding gaming applications and the new ConnectBus® II products, including the DPX114, offer an enhanced platform for the gaming OEM to build tomorrow's innovative and dynamic games!
Email from maker of white box with ETS
(I asked if the computers with ETS were selling well and if customers found ETS useful - last part not really answered)
Yes, we have many clients from different business entities, such as, Banking, Legal, Govt., Accounting and others have bought our security based products. As you may know, hardware and software based security is the only way out there if you want to protect your data from the hackers.
Beside the Ultra P4T-2800 Desktop Computer, we also offer Ultra-460 motherboard upgrade kit for businesses who wants to upgrade older model PCs w/ secure Pentium-4 technology. Please visit http://www.linkcomputers.com/womoth.htm to get more details.
Let me know if you any other question or if I can be of any further assistance.
Sincerely,
Vin Bhaskar, Technical Sales
Link Computers, Inc.
4026 Colonial Dr., SW
Suite-B
Lilburn, GA 30047-3297 USA
Tel: (678) 380-6400
Fax: (678) 380-6464
About linkcomputers.com (see post #30065)
Link Computers started business in 1998 and is located in Atlanta, Georgia, USA. We are specialized in custom Desktop Computer, Workstation, Server Systems, Notebook PC, Tablet PC, Wireless LAN products and services. Link Computers is the home of Ultra series Desktop and Notebook upgrade solutions for aging name brand and generic computers. Our clients are US Corporations, State & Federal Government Agencies, Educational Institutes, Hospitals, Accountings and Insurance companies. Whether your concern is faster computer processing power, reducing IT operational cost or to keep-up with ever changing PC network technology, you can depend on our commitment to provide superior quality & affordable computing solutions with full service and support.
Ultra Computer(?)with Intel chipset and ETS
Found this at: http://www.linkcomputers.com/ultradtc.htm
High Performance Ultra Computer with Intel 800MHz FSB Motherboard w/TPM hardware security, Pentium-4 2.8GHz HT Processor, 64MB Extreme Graphics-2 Video, 256MB DDR333 DIMM, 120GB SATA Hard Drive, 1.44 FD, SoundMAX, PRO/1000 Ethernet, 52x/24x/52x CD-W/RW Drive, MS Natural MultiMedia Keyboard + Optical Wheel Mouse, Tower Case loaded with Windows XP Pro, Embassy Trust Suite Pro,[\B] Easy CD Creator, AntiVirus and PC Health monitoring utilities.
Price*: $1,119.00 + S/H
Hardware Options: Add $79.00 for 3.0GHz, $199.00 for 3.2GHz Pentium-4 HT Processor upgrade, $329.00 for 15" S500, $429.00 for 17" S700 CTX Ultra-Thin LCD Display Panel, $99.00 for 128MB AGP 8X nVidia GeForce FX 5200 Video card, $79.00 for SoundBlaster Audigy 2 Sound card, $39.00 for Altec Lansing AVS300 PC Speakers, $59.00 for 512MB DDR333 Memory upgrade, $49.00 for 160GB SATA Hard Drive upgrade, $199.00 for Pioneer 4x A06 DVD Burner, $69.00 for 56K V.92 USR Performance Pro Modem, $79.00 for SMC 4-Ports Broadband Router w/ Firewall & Print Server, $54.00 for Intel PRO/1000 MT Gigabit Network Adapter, $49.00 for MS Wireless Optical Desktop Keyboard & Mouse upgrade, $269.00 for Samsung ML-1450 Laser Printer, $29.00 for Antec Minuet Piano Slimline Case upgrade, $69.00 for extra cool and quieter Antec Specialty Lanboy Aluminum Case upgrade, $29.00 for CasEdge Black Color systems upgrade and $99.00 for APC Back-UPS ES725 Broadband w/ PowerChute and USB port.
Software Options: Add $79.00 for MS Works Suite 2004 - Home Tools, $199.00 for MS Office 2003 Basic Edition, $249.00 for MS Office 2003 Small Business Edition, $349.00 for MS Office 2003 Professional Edition, $59.00 for Norton AntiVirus 2004 Professional, $89.00 for Norton Internet Security 2004 Professional and $89.00 for Norton SystemWorks 2004 Professional Edition.
Services: Call us for on-site technical support, local delivery, equipment setup and operational training within Atlanta, Georgia and surrounding suburbs.
Fujitsu-Siemens using Intel Chipset
Don't know if this was already posted but got this from the following PDF:
http://www.siemens.si/fsc/pdf/ds_scenic_e.pdf
Security for the Scenic E small desktop
Easy and secure access and data
protection for your business intelligence
SecureIT: software suite with best
integration into your IT environment
Trusted platform module (TPM) provides
more secure applications and makes
transaction trust worthy (for projects only)
Very Interesting,Intel's Desktop Platform Guide 2004
Go to: http://intel.com/platforms/desktop/vision/
and click on Part 1, Usage Models and Platforms. See pages 15,17 and 21. The chipset with TPM is being recommended to all corporate customers, big and small. Some intriguing mention of digital signatures, platform authentication and a smart card (p. 21), the last of these is to be included with chipsets with TPM for large corporate customers. Seems the curtain is being pulled back ever so slowly!! Regards.
S Sprague & P. Otellini, seeing eye to eye
From PC Forum, March 2003, Arizona
www.edventure.com/pcforum/transcript/intel%20inside.pdf
STEVEN SPRAGUE, WAVE SYSTEMS It seems to me that if we can solve the problems around
WiFi communications on an open platform with services-based delivery and a billing system
that ties into the back office of the telco -- which requires security -- that will point the
way to a content solution. It will be a user-controlled open platform on which the consumer
can choose service partners and whom they do business with. The problems are inextricably
linked. While we've had half the conversation today around WiFi and the other half
around content, if you solve the problem for WiFi, it will provide the foundation for the content
community. Can you comment on the comparison between those two?
OTELLINI Yeah, it's a chicken-and-egg phenomenon. I think you're right. My opening comment
was that we are working both on the infrastructure side and on the application side. I
think the applications have to come first, before we can get the ability to self-select networks
and to roam seamlessly and easily.
SPRAGUE My point is that once you have the tools to do that, that's going to lay the same foundation
on which Blockbuster could offer you a subscription-based service on multiple platforms
-- in essence, roaming over different devices. It doesn't seem to me that there is massive difference
between the problem sets.
OTELLINI Yeah, I agree.
OMA evolving the DRM solution, Dec. 2003
From: www.openmobilealliance.org/docs/DRM%20Short%20Paper%20DEC%202003%20.pdf
OMA evolving the DRM solution, Dec. 2003
DRM solution is evolving with the mobile industry. The higher bandwidth provided by 2,5G and 3G cellular networks allow larger content files to be transmitted over the air. Proliferation of wireless Internet "hotspots" makes Internet access easily available to consumers. Smart mobile devices with removable media and larger color screens support downloading and streaming rich media content. Content and service providers are eager to release rich audio/video content and applications into the mobile marketplace. All these factors contribute to the requirements of continuously enhanced OMA DRM solution. Greater security and trust management is required to protect the high value content. There's a need to ensure that the target device can be trusted to keep the content and secrets safe. Greater security is also needed in order to prevent content from leaking out during the acts of downloading and other distribution. The Open Mobile Alliance is meeting these market needs by upgrading the existing OMA DRM Enabler Release with enhanced features. The next version of OMA DRM will add enhanced security by encrypting the rights object and the content encryption key by using the device's public key to bind them to the target device. Integrity protection for both content and the rights object will be added to reduce the risk of tampering. In addition to these enhanced security features, additional trust elements will be introduced. Mutual authentication between the device and the rights issuer, i.e. the content retailer, will add trust to the downloading or messaging scenario. The rights issuer will be able to accurately identify the device in order to determine the revocation status of the transaction. [\b],
Wave mention at CAD/CAM Forum
(Computer aided Design/Computer aided manufacturing)
www.cadcamforum.net/dirt/trusted-computing.html
Protecting Manufacturing with Security - The Lock and Key for your CNC Machine
January 1, 2004
CAD CAM Forum Staff Writer
Ever wish there was a way to keep a disgruntled employee from destroying records or messing with files or NC programs? This is a scary time for an employer or manager - not knowing how an employee will react to an unfortunate situation like cutbacks or downsizing. Manufacturing companies today are having the screws put to them due to a suppressed market that has been long and difficult. Unfortunately, sometimes good employees have to be let go. If not, the business will fold. It's a tough decision to make but one that many companies have had to face recently. Even more unfortunate, emotions sometimes run high and these employees feel they should make a "statement" about their unfortunate situation.
Today, the typical manufacturing company cannot afford to have an IT department watching over all their PCs, and other computing equipment, including their machine tool(s). Yes, their machines. Each of these machines has a computer inside that is completely vulnerable to attack - especially if the machine is connected to the company network. Besides attacks from the outside, inside attacks cause companies to lose productivity and money all the time. Removing one decimal point somewhere in an important revenue-generating program could cause many thousands of dollars damage to that machine tool and tooling - damage that cannot be repaired in many cases.
So what's a CNC machining company to do? You can't afford to staff more people or hire consultants to secure your network - after all, that's why you had to lay someone off. Times are tough and the company is struggling to survive.
Help Is On the Way
Soon, security will be built-in to the PC on any motherboard. This will allow someone in IT, which can be anyone, to give someone access, or deny access to any PC in the company (whether on a desk or built-in to a machine control). So if you suspect there may be problems, access can be turned off ahead of time over a network connection. With the the right software, it will be easy. Okay so you've heard that before, but it really will be easy.
Security Gets Attention
In the year 2003, the number one word used in search engines last year was "embedded". Embedded refers to software loaded onto a small computer chip. For 2004, this will have a huge impact on security for companies looking to protect their data from viruses or attacks (from people outside, or inside, the company).
Some computing "Gorillas" have been getting together since the late 1990s (remember those days?) and formed a group to collaborate on ideas and come up with a solution. Some of these companies include AMD, Intel, Microsoft, Verisign, Wave Systems and many more. These products are finally hitting the shelves. Intel recently announced its new security-specific motherboard for PCs, the Intel D865GRH motherboard.
This motherboard has what's called a Trusted Platform Module (TPM) soldered onto the board. This TPM chip is a piece of hardware that will actually act as a "vault" for your PC, or the files or NC-programs stored on the PC. The files can be encrypted when they are saved, with the key to unlock the file, stored in the TPM. A matching "key" can be assigned to any user. For example, XYZ Corp. would have a key assigned to the owner, the manager and the NC-Programmer. At any time, the owner can take that key away, or give it to someone else. Beautiful, isn't it?
This "key" will allow the NC-programmer access to only the things he accesses: CAD CAM Software programs, NC-programs, Posts, Secured E-mail like Outlook, Internal Company Data (that only he needs to see), etc. For an administrative person, they would not have a key to the CAD CAM Software, or Posts, since this does not concern them. Their "keys" would allow them to have access to accounting software, employee records, etc. With the proper management software, the assigning of keys for new/old employees will be a simple drag-and-drop operation and managing everyone's access will be easy, so any owner or manager can act as the IT person in this regard.
By the end of 2004, this TPM-enabled motherboard will have plenty of company. The Trusted Computing Group (which came up with the idea) anticipates many more PC makers to jump on board in the first-half of the year, as well as many other motherboard manufacturers. Currently, this technology is available on select HP and IBM computers: HP 530d desktop series and IBM Thinkpad notebooks. Your company may already have some of these PC in the building. By the end of 2004, the group anticipates to see a majority of computing equipment in support of the specification so "Trusted Computing" is gaining traction, which is good for us all. It will make security more affordable to the smaller company, or single user.
So What Happens If I Lose My "Keys"?
No problem. This isn't like your car keys where you find yourself borrowing a coat-hanger from the dry-cleaner shop nearby. There are software companies that are making solutions available to prevent this from being a problem. One company, Wave Systems, which in August announced the availability of their Embassy Trust Suite software, will allow you to recover those keys if you lose them, or get a new computer and need to transfer everything from one PC to another. This software encrypts files and manages them easily so your worries of losing a key and never being able to get access to a file again are over.
What's more is that their software allows you to work with this security system across multiple brands of computers. So it doesn't matter if you bought one from Gateway and another from HP, or Dell. All of them will be able to work together as though they were meant to be.
So What about My Machine Tool?
Well, let's face it, the machine tool industry is always a little behind, but that doesn't stop you from calling them up and requesting they provide built-in security using the new motherboard design. More and more machine tools are being networked. As they are "plugged-in" to the company network, any virus that infects the company computer system can infect the machine tools. A hacker can delete key NC-programs or destroy CAM files or posts. If enough manufacturing managers and owners send emails and letters to these machine OEMs, the problem will be addressed more quickly, and the machine tools will be just another "secure PC" on the network. Once enough requests are made, the machine OEM will have no choice but to respond to the demand for more security, and contact the control manufacturers to "embed" security in the control. Don't let your machine tools be unsecured, secure them in the vault and protect your company from outside (or inside) attack.
OT But suggestive
RealNetworks Teams with Intel on Music Service
By Kirk L. Kroeker
TechNewsWorld
November 10, 2003
"We believe that the combination of broadband, Rhapsody and UPnP technology gives consumers what they have been looking for -- the ability to listen to any music anywhere in their home," said Sean Ryan, vice president of music services at RealNetworks.
Not to be ignored in the wake of several big online music announcements made over the course of the past few weeks, RealNetworks has announced a partnership with Intel that could help move RealNetworks' on-demand music service -- called Rhapsody -- from the office into the living room. While Apple's iTunes and Roxio's Napster have received much coverage in the press of late, RealNetworks has made it clear that the legit online music business is anything but a two-horse race.
In what could be a significant step forward for the online music market, RealNetworks is working together with Intel to make it easier for broadband-connected consumers to link their PCs with their home stereo systems and use the company's Rhapsody digital music subscription service throughout their homes. Rhapsody will be among the first digital music services to let consumers control and listen to an online music service in their living rooms.
Rhapsody's digital music service provides access to a library of music from all major music labels, plus more than 200 independent labels. From Elvis Presley and Sting to Outkast and Clay Aiken, the Rhapsody service offers more than 400,000 songs.
While Napster offers streaming CD-quality online radio and MusicMatch offers an artist-on-demand subscription service, the Rhapsody subscription service is unique in that it allows subscribers to access more than 30,000 albums instantly, listen to complete albums, create custom playlists and -- at 20 cents less per song than the other main services -- burn CDs for 79 cents per track.
Through Intel's UPnP Authoring Tools, RealNetworks integrated support for UPnP home networking technology into the current version of Rhapsody. As a result, Rhapsody is now capable of communicating with a new generation of digital audio products that enable consumers to access music from their PCs via their stereo and home theater systems.
These products include the latest version of the Omnifi from Rockford Corporation, which is expected to ship with Rhapsody support beginning November 14th, and several devices from other manufacturers that are expected to ship in the coming weeks.
"We believe that the combination of broadband, Rhapsody and UPnP technology gives consumers what they have been looking for -- the ability to listen to any music anywhere in their home," said Sean Ryan, vice president of music services at RealNetworks.
Honoring Copyrights
RealNetworks' technology is designed to ensure that consumers can enjoy remote access to their entire Rhapsody library while still honoring copyrights. Only home audio components that implement UPnP technology and include Rhapsody's security enhancements can use the Rhapsody service.
According to the company, RealNetworks' goal is to make Rhapsody compatible with all new, UPnP-compliant devices coming to market in the next year. In keeping with this goal, earlier this year RealNetworks joined the UPnP Forum, an association of more than 500 companies from a variety of consumer industries working to develop interoperable specifications and standards for easy-to-use home networking.
Rhapsody is also distributed to consumers through cobranded versions of the service by Audiogalaxy, Best Buy, Charter Communications (Nasdaq: CHTR) , Gateway, Lycos, Sony's Musiclub, Sprint and Verizon.
This week RealNetworks announced a partnership with Comcast to distribute the service through Comcast's network. "By offering the Rhapsody service to Comcast high-speed Internet customers, we are providing our users the opportunity to enjoy an extensive collection of music on demand, showcasing the value of a 100 percent pure broadband connection," said David Juliano, senior vice president and general manager for Comcast's high-speed Internet division.
In the race to achieve online music supremacy, the major players all have worked out significant partnerships -- Apple with AOL, for example, and Roxio with Penn State University. The strength and frequency of these behind-the-scenes relationships could indicate sucess and longevity more than just the number of purchased songs.
The Rhapsody service is available as RealOne Rhapsody via RealNetworks -- with a 14-day free trial -- for US$9.95 per month.