Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
SAFLink: Perfect for Windows
November 3, 2003
SAFsolution Enterprise Edition is available on the General Services Administration schedule through various resellers. For a list of resellers, visit www.saflink.com. GSA prices vary, but list pricing starts at $39.95 per seat for one user and ranges down to $23.97 per seat for 5,000 users.
SAFsolution is perfect for midsize to large organizations that use Microsoft Corp.'s Active Directory and in which the priority is on seamless integration with the existing network and interface. The product works with Windows 2000 Server, Advanced Server or DataCenter Server, and Windows NT 4.0/2000/XP Professional.
We tested SAFsolution on a Federal Computer Week test center network using a Hewlett-Packard Co. ProLiant ML350 server running Microsoft Windows 2000 Server, with HP xw5000 workstations and Compaq Evo desktop computers as clients. We tested both products with an optical fingerprint scanner system from DigitalPersona Inc. called U.are.U Pro for Active Directory.
SAFLink invented the technology that allows policy-based biometric authentication to replace passwords in a network environment, and the company's product was one of the first of its kind on the market. In fact, the company was awarded a patent for the technology in September.
SAFsolution Enterprise Edition targets midsize to large organizations using Microsoft Corp.'s Windows 2000 servers and Windows 2000, NT 4.0 or XP Professional clients. It is also certified for health care installations based on the Health Insurance Portability and Accountability Act (HIPAA), which is a national standard for electronic health care transactions.
The heart of the software is its seamless integration with Active Directory, a key component of the Windows 2000 architecture. Active Directory acts as a central authority for network security, allowing organizations to centrally manage and share information.
SAFsolution adds to Active Directory instead of creating a separate database for biometric data storage, integrating with the Microsoft Management Console by adding tabs and objects to the existing interface. Administrators continue to use the same interface but with added biometric functionality.
Specifically, SAFsolution adds two attributes to each Microsoft user object that store the encrypted biometric template information. Additionally, SAFsolution policy objects are added beneath the Microsoft group policy objects.
SAFsolution bridges the gap between the Windows log-in process and the biometric authentication process carried out by a device's accompanying software module.
When a user logs in to Windows with a user ID, the SAFLink software communicates with the biometric device's software and activates it so that the user is prompted for a biometric. The biometric information is then processed through the device's software module. When the user is authenticated, SAFsolution translates this information back to Windows and access is granted.
Passwords don't have to completely disappear, however. Both SAFsolution and Trusted Space contain options for allowing a password for a backup log-in method in case a biometric device fails or a physical injury occurs.
SAFsolution is compatible with any BioAPI-compliant device, and different combinations of devices can be used on different workstations within the same installation. For example, laboratory users who wear gloves would not be able to use fingerprint authentication, so those workstations could be set up with iris scanners instead.
SAFsolution features
SAFsolution contains several patent-pending features, including a self-paced tutorial to help users become familiar with the biometric enrollment and log-in process. User authority delegation allows several authorized users to share a common identity for auditing and administrative purposes.
Another feature called disconnected log-in allows mobile users to log in with their previously enrolled biometric even if they are not connected to a network. Users can continue to log in as they're used to without having to use or remember a password, and the mobile device is protected locally with the biometric.
For log-in convenience, SAFLink's Fast Logon feature replaces the Windows log-in dialog box with a biometric verification dialog. With this feature, users do not have to enter a user ID or domain name; they can simply present the biometric. The only requirement for this feature to work is that the user must have previously logged into that computer with a biometric.
Administrators of large deployments will especially appreciate the self-enroll feature, which allows users to complete the biometric enrollment process with no administrative assistance. Without this feature, an administrator would have to individually enroll each user.
SAFLink integrates its auditing and reporting with Microsoft's Event Viewer. An integrated audit console logs biometric events, including the time and date, whether the attempted log-in was successful or failed, and the name of the user. Reports can be created using this information.
In addition, SAFsolution complies with standard Event Viewer harvesting tools that notify administrators of certain auditing events, such as a user's enrollment status.
For biometric screen saver capability, SAFsolution integrates with the Windows XP Pro/2000/NT screen saver. When users enable the password protection feature, SAFsolution replaces the password with biometric authentication. Password-only users who are not registered with a biometric can use their passwords to unlock the screen saver.
If a user logs into a workstation with a biometric and then manually locks it, the biometric must be presented again to unlock it.
Although single sign-on capability is not integrated into SAFsolution, the software fully integrates with leading single sign-on solutions. When single sign-on is enabled, users need to present only one biometric or password to log in to multiple applications that require separate passwords.
More SP2.
Wave Systems Corp. Announces Trust @ the Edge®, A Strategic New Internet Security Model
Advanced Applications and New E-Commerce Models Based on Trusted Client Devices to be Featured at Intel Developers Forum
http://www.nabletech.com/news/press_archive/00/000822idf.html
[He and other Microsoft executives said Windows XP Service Pack 2 is designed for systems "on the edge," such as laptop PCs and remote PCs connecting in and out of the network.]
http://www.crn.com/Sections/BreakingNews/breakingnews.asp?ArticleID=48680
Microsoft to Enable AMD64 Security Techniques by Windows XP SP2
Windows XP Service Pack 2 to Activate "NX bit" on AMD Athlon 64, Opteron Chips
Microsoft Corporation and Advanced Micro Devices announced on Wednesday, the 25th of February, 2004, that the Service Pack 2 update for Microsoft Windows XP operating system will enable AMD's Enhanced Virus Protection technology available in AMD64 microprocessors.
AMD's enhanced virus protection security technology in combination with Microsoft's Data Execution Prevention in the upcoming Windows XP SP2 is designed to help render some viruses, specifically buffer overrun exploits, inoperable and prevent them from replicating and spreading to other systems.
The core of AMD's Enhanced Virus Protection is the so-called NX bit in the page-translation tables that specifies whether instructions can be executed from the page. The capability is also available on Intel's Itanium and Itanium 2 microprocessors, but is not present in IA32e chips, such as Intel Pentium 4 E also known as Prescott, unlike suggested by certain sources last year.
"With multiple avenues for attackers to compromise a network through the discovery and exploitation of vulnerable systems, a multi-layered defense has become more essential than ever before," said Robin Matlock, vice president of product marketing for Network Associates McAfee System Protection Solutions Group.
"As one of the first security companies to provide system protection for the AMD Athlon 64 processors, Network Associates is pleased to support AMD and Microsoft in their efforts to provide enhanced security technologies against malicious threats. The enhanced technology will mean greater protection for our mutual customers against both known and unknown attacks," Matlock said.
Other chipmakers, namely Intel, VIA Technologies and Transmeta are also paying close attention to security features in their consumer processors. VIA and Transmeta enabled certain encryption engines in their latest processors, while Intel is going to add La Grande technology in its future chips. Certain other firms, such as NVIDIA, also said they would add some security features into theit next-gen network controllers.
Service Pack 2 for Microsoft Windows XP is expected to be released in the second quarter of the year. It will bring numerous additional security capabilities into the operating system besides the NX bit.
http://www.xbitlabs.com/news/cpu/display/20040225144527.html
Re: Transmeta Crusoe
Transmeta shows TCPA Crusoe
The chip designer Transmeta announced to supply in the second yearly half a version of the Crusoe processor with safety functions after TCPA standard. The functions are integrated thereby directly in the Crusoe TM5800, which makes a separate TCPA chip redundant. The Trusted Computing Platform Alliance is an industrial combination with approximately 180 members, whom a stronger safety device of computers was written by Cryptography hardware on the flags. TCPA is however from some sides as potenzielle incapacitating users under bombardment .
The processor can store now information such as certificates, keys or confidential data within a range, which is not accessible with conventional x86-Befehlen. Besides it is to be offered to the x or Triple-DES a hardware acceleration for coding algorithms as which are used among other things also with procedures such as IP seconds or VPNs. Transmeta defines in addition the command sentence extension TSX (Transmeta Security Extensions), which is to be to each program at the disposal.
Since the Crusoe does not have genuine x86-Kern, but he implements, learns its command sentence by code Morphing on a VLIW core new instructions very fast by updates of the firmware, without an expensive Redesign of the core is necessary. The integration of TCPA succeeds to Transmeta thus faster than others. For example Intel introduces these functions at the earliest with the Prescott core , which is expected approximately for end of the third quarter.
For a completely TCPA secured system all components must along-play. Recently the BIOS manufacturer AMI had presented his TCPA extension , the Transmeta competitors Intel and AMD stands already from the beginning to TCPA.
Transmeta had announced only last week an intensified Embedded commitment and had presented the Crusoe SE, to which now further information is available
Transmeta pokes Trusted Computing plans in eye
Invents own X86 security extensions
By INQUIRER staff: Tuesday 14 January 2003, 11:54
DAVID DITZEL AT Transmeta talked about the firm's plans for implementing Palladium in future CPUs in Japan, at the end of November.
See Ditzel Person talks about Transmeta and Palladium.
But now it's official, it seems.
The firm said today it has silicon for a TM 5800 chip with built in embedded security.
Information theft is a major concern to consumers, businesses and governments, said Matthew Perry, the firm's CEO today.
The chips will support the Advanced Encryption Standard but it says that the Trusted Computing Platform Alliance (TCPA) adds cost and increases design complexity and system space requirements.
The Crusoe chips will include an engine, in hardware, for symmetric encryption algorithms including the Data Encryption Standard (DES), DES-X and Triple DES. It's slow in software, but Transmeta reckons it's good in hardware.
The security features will be implemented using Transmeta Security Extensions (TSX) to the X86 instruction set it employs.
So that's one in the eye for the TCPA from Transmeta, we guess.
http://www.theinquirer.net/?article=7200
Ditzel Person talks about Transmeta and Palladium
And reveals more roadmappery
Saturday 30 November 2002, 10:12
THE CHIEF TECHNOLOGY OFFICER OF Transmeta, David Ditzel, has disclosed the firm's plans for implementing Palladium on the firm's future CPUs.
In an interview with Japanese web site PC Watch, Ditzel also revealed details of Transmeta's future roadmaps, confirming some details of its Astro chip, which the firm showed off at Comdex Fall.
Transmeta has scored most of its design wins in Japan, since it first launched its "Crusoe" technology.
Other X86 CPU manufacturers, including AMD and Intel, have already said they will support Palladium in future CPUs.
Ditzel told PC Watch that it would be able to implement Palladium by modifying an intermediate software layer that the CPUs use.
The article suggests that secure features could be built into Transmeta CPUs as early as next year.
NTRU.
Past relationships
Top Technology, Media and Financial Firms Lead Formation of Consortium for Efficient Embedded Security
Representatives from Texas Instruments, Sony, NTRU, MasterCard International,
Intel and Diversinet Among Charter Members Defining Interoperable
Security Standards for Wireless and Consumer Applications
BURLINGTON, MA - March 27, 2001 - Founding members of the Consortium for Efficient Embedded Security (CEES) today held a charter meeting to initiate the development of universal standards for creating secure, interoperable implementations of highly efficient, highly scalable public key security. By defining standards for deploying the most efficient, scalable embedded security solutions, CEES is meeting the need to support emerging digital infrastructures with new innovations in public key security. The first draft of CEES standards will be based on the NTRU Public Key Cryptosystem (PKCS).
"Enormous investments in wireless and consumer infrastructures are mandating the need for stronger, more efficient security," said Daniel Lieman, Ph.D., CEES chair and NTRU co-founder. "Demands upon enterprise security solutions to support the efficiency and scalability requirements of mass-market adoption of wireless and embedded consumer applications are testing the bounds of today's security infrastructures. The CEES recognizes that new security infrastructures are emerging and that they must be carefully, but rapidly, defined."
CEES is a cooperative multi-organizational effort with oversight and contributions from leading companies and academia. Charter members include representatives from Aereous, C-SAM, Diversinet, Intel, MasterCard International, NTRU, Setec, Solid, Sony, Texas Instruments, University of Minnesota, University of Missouri, Macquarie University, and Wave Systems.
"Next generation wireless appliances will demand efficient security techniques in order to support leading edge applications including mobile commerce, wireless enterprise networking and secure data delivery," said David Potts, worldwide applications manager, TI's OMAP platform. "By utilizing more than ten years of wireless system expertise, TI looks forward to setting the next standard for secure wireless data delivery."
"New standards are needed in order to ensure interoperability within wired and wireless environments and allow for the timely deployment of emerging security infrastructures," said David Stern, strategic initiatives engineer for the Advanced Development Network Equipment Division of Intel. "We are developing core building block technologies that developers can use to increase the security of their systems and applications."
The CEES will enable device manufacturers, application developers, content providers, and security solution providers to accelerate the deployment of secure digital infrastructures and applications. The CEES standards are compatible with the draft IEEE P1363.1 standards for the NTRU PKCS.
"The introduction of the CEES consortium, particularly the focus on a universal standard for interoperable high performance public key security, represents a major milestone for the wireless market," said Hussam Mahgoub, vice president of products, Diversinet Corp. "Diversinet is pleased to be a part of the CEES consortium and will contribute our extensive experience in developing highly efficient next-generation security solutions for m-commerce, multimedia and content protection."
CEES standards will specify standard parameter choices, key sizes, certificate formats, encoding methods, OID numbers, protocols, architectures, security models and efficient implementations, as well as other critical information.
For more information about CEES, visit www.ceesstandards.org.
http://www.ntru.com/about/pr_20010327.htm
Consortium for Efficient Embedded Security
Symposium on Embedded Security
Security Ownership & Trust Models for Securing Consumer Applications
July 10, 2001
Tuesday, 9 - 4 pm
Omni Parker House
Boston, Mass.
Sponsored by
Featured Speakers and Panelists
Warwick Ford, CTO, VeriSign
Sunil Hattangady, Program Manager, OMAP Security, Texas Instruments
Dr. Burton Kaliski, Chief Scientist, RSA Laboratories
Dr. David Kravitz, Chief Scientist, Wave Systems
Dr. John Manferdelli, Manager, Unified DRM Group, Microsoft
Simon Pugh, VP, Standards & Infrastructure, Global e-Business, MasterCard International
Marc Rotenberg, Director, Electronic Privacy Information Center (EPIC)
Jeremy Wyant, Standards & Applications Manager, NTRU
Symposium Agenda
This meeting brings together recognized experts and executives from the technical cryptographic, infrastructure developer, equipment manufacturer, content owner, and semiconductor manufacturer industries to discuss, for the first time, the usage and security requirements inherent in emerging consumer applications and devices.
This daylong event will address the usage and security requirements inherent in emerging consumer applications and devices. Topics to be discussed include security and trust models for mass-market secure systems, roles of the manufacturer, merchant, content owner and device owner, and supported security algorithms and protocols.
Specifically, some of the topics to be addressed at this daylong event will include:
1) Roles of the manufacturer, merchant, device holder, content owner
2) Security model(s) for mass-market secure systems
3) Security requirements for each role (manufacturer, merchant, etc.)
4) Use cases and usage scenarios for secure devices and applications
5) Key management and role management on the secure device
Presenter: Burt Kaliski, Chief Scientist, RSA Laboratories
New Challenges in Embedded Security: Abstract: The pervasive, intelligent, and interdependent computing devices of the near future will need embedded security features to identify each other, authenticate exchanged information such as software upgrades, and defend against tampering. Since the device manufacturer, device owner, and information provider will generally be completely different authorities, new challenges about device ownershipand trust must be addressed. This talk will explore the need for and challenges of embedded security, and offer suggestions for research and standards development.
Presenter: John Manferdelli, Manager of Unified DRM Group, Microsoft
Abstract: The talk will explore the technical infrastructure for Digital Rights Management (DRM) as well as its place within the larger contextof security. Key concepts include authentication of principals, rights languages, isolated computation, trusted software and platform secrets.In addition, we'll explore some of the business models and conditions affecting the success of DRM including user requirements like privacy and usability. We'll also mention some common misconceptions about DRM and some applications to general distributed security. Finally, we'll talk about Microsoft's DRM strategy and its place in the DRM ecology.
After the meeting, the CEES will take up the task of drafting standards to address the issues identified at the Symposium.
NTRU Professional Services Team and Microsoft to Develop Next-Generation Computing Solutions
http://www.businesswire.com/webbox/bw.072103/232025004.htm
NTRU Launches Professional Services Unit in Collaboration With World's Leading Software Vendor
BURLINGTON, Mass. July 21, 2003--
"We applaud NTRU for creating a new professional services group and we welcome their contributions as we work to develop the Next Generation Secure Computing Base (NGSCB)," said John Manferdelli, general manager of the Windows Trusted Platform Infrastructures group at Microsoft Corp. NGSCB is a new security technology for the Microsoft Windows platform. It uses a unique hardware and software design to give people new kinds of security and privacy protections in an interconnected world. NGSCB will be integrated into a future version of the Microsoft Windows operating system.
NTRU Releases the First Universal Security Product for All Platforms Relying on the Trusted Platform Module (TPM)
First-To-Market Universal TCG Software Stack (TSS) Enables Widespread Deployment of Trusted Computing Devices
http://www.ntru.com/about/pr_20040217.htm
AMD's Dormant Feature.
A few past comments:
The biggest single difference between TCPA and Palladium, according to Strongin, is that in Palladium, "trusted processing" is taking place on the main CPU.
AMD's Strongin said its Palladium component was done entirely in-house, and the development was "fairly mature". He would not say when the chip would be brought to market, however. "We'll be there when we're needed to be," Strongin said. http://www.extremetech.com/article2/0,1558,1167276,00.asp
C/Net has confirmed that Athlon 64 and Opteron owners will get a little security bonus with Windows XP Service Pack 2. SP2 will reportedly activate a dormant feature in AMD's 64-bit CPUs that helps to protect against buffer overrun exploits:
All AMD64 processors, including AMD Opteron and AMD Athlon 64 processors shipped in 2003, are enabled with AMD's Enhanced Virus Protection for the upcoming Windows XP SP2. AMD64 processors are currently supported by more than 1000 global OEMS and hardware and software companies. Windows XP SP2 is currently in beta and is expected to ship in the second quarter of 2004.
Re: AMD's Enhanced Virus Protection.
"AMD's Athlon 64 and Opteron security features will work with Windows XP Service Pack 2's Data Execution Prevention feature to prevent buffer overrun exploits, a common method used to attack computers. A buffer overrun or overflow essentially overwhelms a computer's defense systems and then inserts a malicious program in memory that the processor subsequently executes"
"Whatever the initiative, Trusted Computing won't solve the problem of mistrust in the Internet. Malicious code will still run in the untrusted parts of systems. There are just too many computers without TPMs, providing fertile fields for malicious code attacks. Even Trusted applications are not safe from attacks against bad coding like buffer overruns. If there were a fully Trusted OS from Microsoft with a buffer overrun that allowed DEL c:\ <ECHO Y to run, you still would lose your hard drive's contents! Since a Trusted Computer can send authenticated anonymous data, such as e-mails, there is still plenty of potential for spam."
http://www.iapplianceweb.com/story/OEG20040223S0038
Wave Systems Demonstrates Next Generation, Secure Enterprise Software at RSA Conference 2004
Wave Introduces the EMBASSY® Trust Suite Key
Transfer Manager to Help Backup and Protect Encryption
Keys Used for Enterprise Data
San Francisco, CA and Lee, MA - February 24, 2004 - Wave Systems Corp. (NASDAQ: WAVX - www.wave.com), today announced its EMBASSY® Trust Suite software will be demonstrated at Booth 516 at the RSA Conference 2004, February 23-27, at the Moscone Convention Center, San Francisco.
In addition, Wave software solutions will be demonstrated with the Trusted Computing Group (TCG) Community exhibition area and also with AMD, Atmel, HP and Intel. Customers seeking Wave appointments and demonstrations may contact Brian Berger at bberger@wavesys.com.
At this conference Wave will highlight the availability of the newest enhancement to the EMBASSY Trust Suite portfolio - Key Transfer Manager-- an enterprise software solution that is designed to help backup and protect the hardware encryption keys used for critical personal computer data.
Key Transfer Manager - expected to be shipping to select PC OEMs in the first half of 2004 - is designed to work with all Trusted Computing Group-compliant secure hardware Trusted Platform Modules.
"As more and more trusted platforms are operating in enterprises, the importance of key back up and recovery solutions becomes more critical to users. Valuable personal computer data can be lost forever if keys are not properly archived. The availability of new applications like Key Transfer Manager that are designed to address this need make trusted computing an even more compelling choice for enterprise PC users," said Nancy Sumrall, chairman, TCG marketing work group.
"We believe this solution offers a significant improvement in ease of use and manageability over existing solutions," said Steven Sprague, Wave's president and CEO. "Key Transfer Manager was developed in cooperation with industry partners who identified this next-generation capability as needed today."
Wave's EMBASSY Trust Suite, developed to the TCG specification and integrated into the Microsoft Office® environment, is designed to deliver a variety of PC-related security and productivity tasks, in an intuitive, easy-to-understand format. The hallmark of EMBASSY Trust Suite solutions is usability - designed to be easy to enable, easy to use and easy to manage by IT administrators.
Wave's software works with a Trusted Platform Module (TPM) - a single chip solution embedded inside a PC. Millions of PCs have been shipped by the industry with TPMs installed. The TPM provides the resources used by the EMBASSY software to implement secure functions within the PC.
With the TCG standard, user data is protected by encryption keys stored within the TPM. These keys are very secure and provide the ability for an end user to encrypt a file or folder or perform other secure enterprise tasks. However, these keys must be recoverable if the TPM fails or when there is a need to replicate a user's configuration on a new machine - otherwise the protected data is lost.
In addition to Key Transfer Manager, EMBASSY Trust Suite includes other TCG-compliant capabilities. These include Document Manager Vault for securing files and folders, SmartSignature for digital signature capability for secure electronic contracts, and Private Information Manager for secure storage and management of user names, passwords and personal information. Private Information Manager is designed to intelligently retrieve data for use in web pages, logging into web sites, or for filling forms
http://www.wave.com/news/press_archive/04/040224_RSA.html
SP2 unlocks AMD Features.
AMD And Microsoft To Provide Customers New Security Technology
-Combined Hardware and Software Solution Designed to Strengthen Protection Against Viruses and Worms-
SUNNYVALE, CALIF. -- February 25, 2004 --AMD (AMD: NYSE) announced today that AMD64 processors combined with the upcoming Windows® XP Service Pack 2 (SP2) will help computers to better withstand attacks from certain classes of viruses and worms. The combination of the AMD64 processor and Windows XP SP2 technologies will help provide customers enhanced security allowing home and business users to experience safer e-mail and Internet browsing, and increased network and memory protection.
AMD's enhanced virus protection security technology in combination with Microsoft's Data Execution Prevention in the upcoming Windows XP SP2 is designed to help render some viruses, specifically buffer overrun exploits, inoperable and prevent them from replicating and spreading to other systems.
"Computer security has become one of the most important issues in both the home and enterprise, and AMD and Microsoft recognize that it will take a strong combination of hardware and software to battle malicious code," said Marty Seyer, vice president and general manager, AMD's Microprocessor Business Unit. "AMD and Microsoft are taking a leadership role with AMD64 processors and the upcoming Windows XP SP2. We will deliver a solution that is both effective and easy for customers to implement in either 32-bit or 64-bit systems."
"Data Execution Prevention is one of several security enhancements within Windows XP SP2 that will provide our customers with protection against certain buffer overrun virus attacks, thereby helping them become more secure," said Rebecca Norlander, group manager in charge of the Windows XP SP2 release at Microsoft Corp. "PC security is an issue that can only be addressed through the combined efforts of our industry partners. The work that companies such as AMD are doing provides an additional layer of protection for our customers when used in concert with solid security practices at home and in the enterprise."
"By building threat resistance into next-generation systems at the platform level, AMD's enhanced virus protection will enhance one of the major pillars of overall security management," said Lina Liberti, vice president of eTrust product marketing at Computer Associates. "CA applauds this collaborative effort and will continue working with both Microsoft and AMD to ensure that our mutual customers can help reduce the effect of certain types of malicious code polluting the Internet and reduce business risk."
"With multiple avenues for attackers to compromise a network through the discovery and exploitation of vulnerable systems, a multi-layered defense has become more essential than ever before," said Robin Matlock, vice president of product marketing for Network Associates McAfee System Protection Solutions Group. "As one of the first security companies to provide system protection for the AMD Athlon 64 processors, Network Associates is pleased to support AMD and Microsoft in their efforts to provide enhanced security technologies against malicious threats. The enhanced technology will mean greater protection for our mutual customers against both known and unknown attacks."
All AMD64 processors, including AMD Opteron and AMD Athlon 64 processors shipped in 2003, are enabled with AMD's Enhanced Virus Protection for the upcoming Windows XP SP2. AMD64 processors are currently supported by more than 1000 global OEMS and hardware and software companies. Windows XP SP2 is currently in beta and is expected to ship in the second quarter of 2004.
http://www.amd.com/us-en/Corporate/VirtualPressRoom/0,,51_104_543~82805,00.html
SP2 unlocks Athlon 64 buffer overrun protection
by Geoff Gasior - 01:49 am, February 26, 2004
C/Net has confirmed that Athlon 64 and Opteron owners will get a little security bonus with Windows XP Service Pack 2. SP2 will reportedly activate a dormant feature in AMD's 64-bit CPUs that helps to protect against buffer overrun exploits:
AMD's Athlon 64 and Opteron security features will work with Windows XP Service Pack 2's Data Execution Prevention feature to prevent buffer overrun exploits, a common method used to attack computers. A buffer overrun or overflow essentially overwhelms a computer's defense systems and then inserts a malicious program in memory that the processor subsequently executes
As if the Athlon 64 and Opteron weren't sweet enough processors already.
The article doesn't mention whether the overrun protection technology will work with operating systems other than Windows XP, though it's interesting to note that the feature will be "turned on" when SP2 is released. Since even Linux is vulnerable to buffer overrun exploits, it would be great if AMD's technology worked with any operating system.
http://techreport.com/onearticle.x/6342
Microsoft SP2.
"So we have an update to the client that turns the firewall on by default. It's got changes in Outlook Express and IE for safer e-mails and browsing. It uses some of the new hardware features in the newer chips to block a large class of exploits. It changes the way we do some of the code protection. We recompile a lot of the key modules. That goes into beta later this year, SP2."
http://www.microsoft.com/billgates/speeches/2003/10-27PDC2003.asp
InfoSec Europe April 27-29, 2004, London, England.
Trusted Computing Group - Protecting Your Vital Business Data with the Trusted Platform Module.
Wednesday 28th April
11:00 - 13:00
With Lunch Hosted by Trusted Computing Group
Join security technology architects from Atmel, IBM, Intel Corporation, and Wave Systems as they discuss how you can protect your vital business data using Trusted Platform Modules. These hardware components, embedded into desktop PCs and notebooks, can be more effective than software-only security. The TPM provides a protected space for key operations and other security critical tasks that are not protected today. Using tamper-resistant hardware and software, the TPM secures encryption and signature keys at their most vulnerable stages - operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. We will take a look at how TPMs and available applications and services can help you manage network security more effectively. And we will review the role of the TPM in authenticating users and handling other security functions.
"Representatives from Trusted Computing Group will be available throughout the Infosecurity Europe exhibit at the HP Stand 450 and Microsoft Stand 630."
Microsoft at InfoSecurity Europe 2004 Microsoft Security Workshops
"We also encourage you to visit the Microsoft exhibit on stand 630 where the technologies covered in the workshops will be demonstrated in action by Microsoft security experts and our accredited security partners."
Microsoft understands that having a secure, connected infrastructure is essential to doing business in today's interconnected world. Our 3-day security workshop programme is dedicated to providing IT professionals with valuable insights into the latest developments in Microsoft's security technology, solutions, processes and strategy.
All of the workshops include in-depth technology presentations, demonstrations and ample opportunity for interaction. The workshops are designed to provide valuable information and to answer your questions about securely deploying Microsoft technology.
All the workshops are run by security specialists and consultants who are experienced in deploying Microsoft security solutions in customer environments. Whether you simply want to understand the security functionality built into Windows Server 2003, get up-to-speed with the latest developments in patch management or know more about the latest version of Microsoft's ISA Server these workshops are the ideal environment to get information and answers.
We also encourage you to visit the Microsoft exhibit on stand 630 where the technologies covered in the workshops will be demonstrated in action by Microsoft security experts and our accredited security partners. http://www.infosec.co.uk/page.cfm/link=110
SUCCESS OF INFOSECURITY EUROPE 2003
Infosecurity Europe proved that the Information security market is going from strength to strength with over 8,728 serious buyers visiting the show, making the 8th Infosecurity Europe the best ever. There was a tangible buzz in the air as visitors packed the stands, seminars and keynotes as they updated themselves on the latest security services and solutions.
Some of the highlights from 2003 include:
Over 300 security vendors
22% of the visitors were director level (18% in 2002)
65% of the visitors had direct purchasing authority compared to 37% in 2002.
33% of visitors were from companies with over 1000 employees, and over 22% from companies that employ over 5000.
Tamar Beck, Group Exhibition Director IT / Comms, Reed Exhibitions said, "This is without doubt the best Infosecurity Europe show on record, our intensive marketing campaign certainly hit the spot. There were queues of visitors waiting to get into the show as soon as it opened. Our seminar and keynote programmes were very popular, with the demand for information so great that visitors had to stand in the aisles. Exhibitors' stands were packed with visitors not only looking to catch up on the latest solutions, but also to buy them. The demand for space for next year has been overwhelming with 70% of the exhibition space already sold."
http://www.infosec.co.uk/page.cfm/Link=21/t=m/goSection=9
InfoSec Europe April 27-29, 2004, London, England.
Trusted Computing Group - Protecting Your Vital Business Data with the Trusted Platform Module.
Wednesday 28th April
11:00 - 13:00
With Lunch Hosted by Trusted Computing Group
Join security technology architects from Atmel, IBM, Intel Corporation, and Wave Systems as they discuss how you can protect your vital business data using Trusted Platform Modules. These hardware components, embedded into desktop PCs and notebooks, can be more effective than software-only security. The TPM provides a protected space for key operations and other security critical tasks that are not protected today. Using tamper-resistant hardware and software, the TPM secures encryption and signature keys at their most vulnerable stages - operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. We will take a look at how TPMs and available applications and services can help you manage network security more effectively. And we will review the role of the TPM in authenticating users and handling other security functions.
You will hear real examples of enterprises using TPMs to manage and protect data in healthcare, finance, pharmaceutical and other environments. You also will hear about cutting-edge research into network security, authentication and data management, and learn how you can benefit from this research, which is being funded by dozens of computing industry companies worldwide.
Immediately before and after this informative programme, you can browse demonstrations of live applications and systems using Trusted Platform Modules to maintain data integrity, ensure users are authentic and keep transactions safe.
Representatives from Trusted Computing Group will be available throughout the Infosecurity Europe exhibit at the HP Stand 450 and Microsoft Stand 630. Or see the TCG website, www.trustedcomputinggroup.org
Speakers:
Kevin Schutz, Product Manager, Atmel Corporation: Kevin Schutz joined Atmel in 1989, has over 20 years experience in the semiconductor industry, and is currently the Product Manager for Secure Products within the North American ASIC and ASSP business unit. He is a key member of the team at Atmel developing products in support of the Trusted Computing Group.
Prior to joining Atmel, Mr. Schutz worked for a number of high tech companies including Mostek and Honeywell. He has worked in a variety of areas, including the design of custom mixed-signal products, embedded processors and secure cryptographic processors.
Mr. Schutz received his BS in Electrical Engineering from Colorado State University, and both a MS in Electrical Engineering and a MBA with a focus in Technology Development from the University of Colorado.
IBM (TBD)
David Grawrock, Intel Corporation:
David Grawrock is a Principal Engineer Security Architect for the Platform Architecture Solution Division of Intel. As a security architect he works both with internal and external projects. He is a lead security architect for LaGrande Technology, part of Intel's security initiative. He is Intel's lead technical representative to the Trusted Computing Group and is a member of the TCG Technical Committee and chair of the TPM workgroup. Prior to Intel David worked for Symantec, Central Point and Lotus. While at Symantec David was a lead architect for Norton Your Eyes only and other products. David has worked in the computer industry for 25 years.
Brian Berger, Wave Systems:
Brian Berger is a Executive Vice President for Wave Systems Corp. He manages the platform business, as well as the sales and marketing functions. Brian holds a key executive leadership position for the company to develop and implement the strategy for Trusted Computing. Brian has been involved in security products for the past 6 years including; Embedded hardware, Client / Server Applications, PKI and Biometrics. He has worked in the computer industry for 19 years holding senior level sales and marketing positions in multinational companies. Brian is a noted inventor on 1 issued and 3 pending patents for security products and electronic commerce transactions capabilities using security technology.
http://www.infosec.co.uk/page.cfm/Link=111/t=m/goSection=16
TCG -Trusted Computing Group
Stand 450
This Exhibitor is sharing with Hewlett Packard
http://www.infosec.co.uk/page.cfm/Action=ExhibList/t=m
Microsoft UK
Contact Details Stand : 630
Company Profile
Microsoft is committed to enabling every customer to work, communicate, and transact business more securely. With Windows Server 2003 and Windows XP at the foundation, Windows Server and Desktop Systems provide comprehensive IT infrastructure for operations (security, systems management, networked storage), applications (data management and analysis, e-business), and information work (messaging, communications and collaboration). www/microsoft.com/security
Microsoft at InfoSecurity Europe 2004 Microsoft Security Workshops
Microsoft understands that having a secure, connected infrastructure is essential to doing business in today's interconnected world. Our 3-day security workshop programme is dedicated to providing IT professionals with valuable insights into the latest developments in Microsoft's security technology, solutions, processes and strategy.
All of the workshops include in-depth technology presentations, demonstrations and ample opportunity for interaction. The workshops are designed to provide valuable information and to answer your questions about securely deploying Microsoft technology.
All the workshops are run by security specialists and consultants who are experienced in deploying Microsoft security solutions in customer environments. Whether you simply want to understand the security functionality built into Windows Server 2003, get up-to-speed with the latest developments in patch management or know more about the latest version of Microsoft's ISA Server these workshops are the ideal environment to get information and answers.
We also encourage you to visit the Microsoft exhibit on stand 630 where the technologies covered in the workshops will be demonstrated in action by Microsoft security experts and our accredited security partners. http://www.infosec.co.uk/page.cfm/link=110
Phantom, NextBend and Wavexpress?
Microsoft stated that the Phantom was the hottest item displayed in the booth. It was also displayed in the NEXTBEND suite which is a company which manufactures a entertainment system and is synergistic to the Phantom since it is a add on to their system.
http://ve3dboards.ign.com/General_News/b10496/14522339/?22
Phantom Gaming Service to be
at Consumer Electronics Show
Sarasota, Florida - January 6, 2004 - Infinium Labs announced today that its Phantom Gaming Service™ will be unveiled to the public January 8-11 at the Consumer Electronics Show in Las Vegas, Nevada.
"We're very excited to be showing the Phantom Gaming Service for the first time at North America's largest tradeshow," said Timothy M. Roberts, CEO of Infinium Labs. "This show gives us the unique opportunity to present the Phantom firsthand to both consumers and industry insiders."
The Phantom Gaming Service will be a featured product at the Microsoft® Windows® Embedded Device Showcase exhibit in the Las Vegas Convention Center. Infinium Labs is licensed by Microsoft Licensing, GP to use Windows® XP Embedded for operating system components of the Phantom Gaming Service™.
The Phantom Gaming Service also will be featured in a hospitality suite on the 7th floor of an office building at 101 Convention Center Drive, just ½ block from the Las Vegas Convention Center, and at a penthouse suite at the Palms Casino Hotel. Please email requests for appointments to visit these suites to CESrequests@phantom.net.
CES attendees can catch a glimpse of the Phantom at a special gaming session, SS2 Next-Generation Gaming Console, from 11:30 a.m. to 12:30 p.m. on Thursday, Jan. 8, at the LVCC North Hall N254. Robert Shambro, Executive Vice President of Strategy and Co-founder of Infinium Labs, will be a panel participant.
The Phantom Game Service is a next-generation gaming system that supports games on-demand, game rentals, game demos, seamless upgrades and patch management. At launch, the Phantom™ will be the fastest, most powerful gaming system on the market and will include a broad selection of pre-loaded games, on-demand games and game rentals.
The Phantom Gaming Service is an always-on broadband device, which will allow gamers a wealth of options, from wireless connectivity to massive multiplayer capabilities, allowing gamers to demo games before purchasing or subscribing. For more information on the Phantom Gaming System, please visit www.phantom.net.
http://www.infiniumlabs.com/dialup/press/019.html
NextBend, Inc., Licenses Wavexpress Broadband Technology for New Media Delivery Products
Patented UniStac™ Reference Design to Embed Wavexpress' Content Delivery Infrastructure and Secure Media Player
Sarasota, FL - December 2, 2003 - NextBend, Inc, creator of UniStac, a unique set-top box (STB) architecture for an expandable home entertainment gateway, today announced an agreement with Wavexpress to co-develop a digital content distribution platform and broadband media player for immediate integration. Wavexpress, a provider of broadband technology and services, is majority-owned by Wave Systems Corp. (NASDAQ: WAVX), a leader in trusted computing. NextBend will demonstrate the solution at the International CES, January 8-11, 2004, in Las Vegas.
UniStac enables broadband service providers to offer retail customers a low-cost residential gateway that can be extended to handle numerous entertainment, media and communications applications. Based on a patented modular system, UniStac allows consumers to expand its capabilities with the addition of multiple components, such as a DVD-player, TV tuner card, MP3 player or other device. UniStac's open architecture complies with the OSGi software specification for the delivery of managed services, ensuring that it is forward-compatible with the next generation of digital home entertainment.
UniStac's built-in features will include Wavexpress' client software to receive, manage and display rich media channels. The WX Client™ will feature custom-built channel menu and navigation controls which allow viewers to navigate between channels and access an array of interactive features using a standard remote control. Wavexpress' distribution network sends channel programming via a cable modem or DSL connection to the STB, where it is digitally recorded. Unlike ordinary TV channels, all programming delivered by Wavexpress can be watched at any time, entirely on-demand.
"NextBend has engineered a simple and logical design to transform the set-top box into a dynamic media hub," said Michael Sprague, president and COO, Wavexpress. "The web-based video experience is finally arriving on the TV screen. For the first time, ordinary TV viewers will see a compelling value offering from broadband."
"Content publishers and network operators are looking for ways to leverage broadband," said Tom Orr, CEO, NextBend. "Embedding the Wavexpress solution enables us to offer sophisticated new services, combined with convenience and security. Digital media companies will be able to address an expanded marketplace, and realize significant cost savings compared with alternative delivery methods."
UniStac-based Set Top Boxes are currently in development. NextBend anticipates product availability in 2004, with retail prices falling below $300 for volume applications. Financial terms of the agreement were not disclosed.
http://www.wavexpress.com/headlines/12.02.03.html
Phantom's DRM.
INFINIUM LABS SELECTS DISTREAM FOR DIGITAL RIGHTS MANAGEMENT OF PHANTOM GAME SYSTEM AND PHANTOMNET GAME SERVICE
DiStream Will Provide Server System and Management Platform for PhantomNet
Jacksonville and Sarasota, FL - November 4, 2003 - Infinium Labs today announced a comprehensive agreement with Digital Interactive Streams, Inc. (DiStream) to provide the digital rights management software and end to end enterprise level tiered management architecture for Infinium's Phantom Game System™ and for the PhantomNet Game Service.
DiStream, a premier provider of technology and software for high quality, low bandwidth streaming content, will customize its digital rights management software for content on demand streaming to provide the digital rights management component of the PhantomOS for game software. The Distream digital rights management solution provides an integrated state of the encryption solution. The DiStream solution takes the extra step of providing enforcement at all system levels.
"DiStream gives Infinium a digital rights management solution that provides developers the highest quality security and digital rights management," noted Timothy M. Roberts, President and CEO of Infinium Labs. "Infinium has taken a big step towards it goal of offering consumers the largest selection of game software available on the Phantom Game System and PhantomNet Game Service."
DiStream also will provide its DiStream Server system for the storage and delivery of game software via the PhantomNet Game Service. The DiServ server also provides the platform for content and media management billing, accounting, service provisioning, usage monitoring & reporting, and management of the PhantomNet Game Service.
"Infinium Labs' commitment to providing the most state of the art system to the video game enthusiast is evidenced by their dedication to quality at every level," said Royal O'Brien, CEO of DiStream. "We look forward to partnering with Infinium Labs to provide the quality, speed and compatibility that game players now expect."
The agreement provides Infinium Labs with exclusive licensing rights on software developed by DiStream for game applications including the digital rights management of game software and games on demand streaming. The terms also extend DiStream's video on demand applications to Infinium Labs for game software.
Infinium Labs' Phantom™ next-generation game system supports games on demand, game rentals, game demos, seamless upgrades and patch management. At launch, the Phantom™ will be the fastest, most powerful game system on the market and will include a broad selection of pre-loaded games, on-demand games and game rentals.
The Phantom™ is an always-on broadband device, which will allow gamers a wealth of options, from wireless connectivity to massive multiplayer capabilities, allowing gamers to demo games before purchasing or subscribing. For more information on the Phantom Game System™, please visit www.phantom.net.
About Infinium Labs
Infinium Labs is an industry-leading global entertainment and interactive game company. Infinium Labs has developed and is marketing its flagship product the Phantom™ Game System, a leading edge and intuitive game and delivery system that is the performance leader in the interactive entertainment industry. Founded and managed by senior interactive media, entertainment and technology leaders with proven industry experience and success, Infinium Labs markets a robust game system that appeals to a wide audience of interactive gamers with its ease of use, quality assurance and robust delivery system. For more information, please visit www.infiniumlabs.com or www.phantom.net.
About DiStream
Privately held, DiStream is paving the way for the convergence of today's low cost PCs with Digital Television for tomorrow's complete media center. DiStream's DiVET™ is the breakthrough software product that enables the delivery of high quality full screen display of video on demand utilizing available consumer broadband connections such as DSL and two-way cable. The Company's software suite also contains all the modules to create a complete secure integrated media center, including: Video on Demand, Audio on Demand, web access, and interactive gaming. The firm is based in Jacksonville, FL and can be found on the Internet at http://www.distream.com
Barge - Phantom.
Phantom Looks interesting.
It seems similar to Tivo, an always-on-broadband device equipped with a hard drive. I believe it uses the TPM to perform authentication and data encryption and decryption.
TiVo uses Atmels AT90SC3232C smart card crypto controller to perform authentication and data encryption and decryption functions for its PersonalTV technology platform.
Have you seen anything to indicate Phantom contains a distributed transaction system to do e-commerce and sales after the content is distributed?
http://electronics.howstuffworks.com/phantom.htm
http://www.gamespot.com/all/news/news_6072533.html
Baker & Botts.
Baker Botts L.L.P.has one of the largest intellectual property and technology practices in the United States among general practice firms. Renowned for our talent and experience in this area of the law, IP WorldWide recently ranked Baker Botts one of the top three intellectual property firms representing corporate America. In 2002, IP Worldwide also listed Baker Botts as a "Top Defense Firm" and ranked the firm first overall in its trademark counsel survey of the Global 50.
Our team of over 120 intellectual property lawyers with backgrounds in the fields of medicine, biotechnology, electrical engineering, mechanical engineering, chemistry, physics, immunology and computer science, is prepared to assist with an expansive range of services. From high stakes litigation to patent preparation and procurement and copyright and trademark matters, Baker Botts is committed to providing our clients innovative and impeccable representation.
http://www.jurisnotes.com/texas.htm
Re: Wave Patents.
http://www.bakerbotts.com/attorneys/bio.asp?id=509
PUBLICATIONS Gary M. Butter
AREA(S) OF PRACTICE:
Intellectual Property, Patents, Technology Solutions
Gary Butter focuses primarily on high-tech patent litigation, and also has significant experience in other patent and trade secret litigation, as well as intellectual property due diligence and counseling, patent preparation and prosecution, intellectual property licensing, and many other areas associated with a broad intellectual property practice.
Mr. Butter counsels both high-tech companies and individual inventors on all aspects of intellectual property protection, licensing, enforcement, risk analysis, and dispute resolution, and helps clients develop robust intellectual property protection programs. Although adept in many fields, his focus is primarily on legal matters that relate to computing, software, telecommunications, and mechanical technologies. In addition to his law practice, Mr. Butter is an assistant adjunct professor of patent law at Brooklyn Law School.
Prior to his legal career, Mr. Butter spent three years as an officer aboard the USS Billfish, a nuclear-powered attack submarine. This experience, along with eighteen months of formal technical naval training, gave him special insight into various engineering disciplines, including propulsion, power generation, atmosphere control, sonar, and weapons control systems. Currently, he is a commander in the United States Naval Reserve.
Concentration
Developing, licensing, enforcing, and defending patent and other intellectual property assets, primarily involving computing, software, telecommunications, and mechanical technologies
Representative Engagements
Cisco Systems - patent litigation relating to computer switching gear, and counseling on other patent matters
MasterCard International - patent litigation and counseling relating to software technologies
Liberty Media - due diligence matters
Mitsubishi International - patent and trademark counseling
Masco Corporation - patent litigation in the electrical and mechanical technologies
Wave Systems - counseling, enforcement, and patent and trademark procurement, including the development and management of the company's intellectual property program and a worldwide patent portfolio directed to computer and content security systems, software, and methodologies
Tumi, Incorporated - patent litigation, counseling, and patent procurement
Reliable Automatic Sprinkler Company - patent litigation, counseling, and patent procurement
Construction Specialties, Incorporated - counseling, enforcement, and patent and trademark procurement
Education and Honors
J.D., New York University School of Law, 1990
B.S. (with merit), electrical engineering, United States Naval Academy, 1982
Admissions and Affiliations
New Jersey State Bar
New York State Bar
United States Court of Appeals for the Federal Circuit
United States District Courts for the Southern, Eastern, and Western Districts of New York and the District of New Jersey
United States Patent and Trademark Office
American Bar Association
New York Intellectual Property Law Association
Publications, Speeches, and Presentations
Publications
"Using Trade Secret Law to Protect Computer Software," Rutgers Computer and Technology Law Journal, Vol. 17, No. 2, 1991 (Robert C. Scheinfeld, co-author)
Speeches and Presentations
"Festo: The Last Implications for Practitioners," New York Intellectual Property Law Association, New York, November 2003
"Avoiding a Charge of Inequitable Conduct With Respect to Declarations Executed by Non-English-Speaking Inventors," Joint Patent Seminar, New York, 2001
"Guidelines for Patent Opinions of Counsel," Joint Patent Seminar, New York, April 2000
Re:InfraBasic
OUR PORTFOLIO
Partial list of current & past projects
2003
WaveXpress
For users of Internet media, WaveXpress technology provides DVD quality picture even in large-sized monitors (including big screen televisions), a feat not capable up to now with traditional streaming media technology. Before the advent of the WaveXpress technology, the clarity of the pictures was always limited by the size of the monitors used. For content providers, the WaveXpress Digital Vault is a next generation multimedia security system which provides unparalleled secure service that does not require additional servers with the increase in the number of users.
Wave Systems Co., a US corporation, founded in 1988, develops and produces the digital security products for Internet and E-Commerce. Wave Systems has been listed on NASDAQ National Market (NASDAQ NM: WAVX) since April 1999 with the total assets of $27,776,188 as of September 30th, 2002.
InfraBasic has the exclusive rights to Wave technology for all of the Korean market (within Korea itself as well as to Korean content distribution worldwide using WaveXpress technology) and will operate Wave Korean operation as an exclusive right holder as well as a major shareholder. InfraBasic will provide Korean multimedia companies leading-edge technology and services. The revenue is expected to come from technology royalty, content provision and complete turnkey solution services.
IBM
InfraBasic is a member of IBM's Incubator Series.
www.ibm.com/bluevelocity
1. IBM is the primary and preferred technology provider of InfraBasic's incubates.
2. IBM delivers solution guidance for design and build, hardware, software, support services, hosting, marketing and business plans.
3. Speeds time-to-market and provides support services through IBM Quick Launch for e-Business Ventures.
Build Strategic Partnerships
1. Utilize the network of IBM global presence.
• IBM provides joint marketing support for Net Generation start-ups
• IBM provides benefits with Partner World support programs
; IBM Partnerships, financial & technical supports
• IBM could be invited as a board member of InfraBasic's portfolio companies.
Re:NextBend.
http://www.nextbend.net/multimedia/NextBendInterview.mp3
Tom Orr interview.
Mentions highlevel talks with AMD? around 4:20.
Two senior VP are advocates of their technology.
AWK - Re: Prescott
LeGrand boost for trusted-PC effort
16 September 2003
San Jose, Calif. - Intel Corp. will advance an ambitious systems security effort this week when it discloses the first details of the so-called LeGrand technology that's built into Prescott, its next-generation Pentium.
Stephen Sprague, chief executive officer of Wave Systems Corp. (Lee, Mass.), one of the early players in the initiative, said the full-blown features will enable a new generation of trusted service brokers that act as secure clearinghouses for digital content, payments, voting and other services.
OEM uptake
IBM Corp. is already shipping more than half its laptop computers with version 1.1 TPM hardware certificate chips from Atmel, said Stacy Cannady, client security product manager at IBM. "We have extensive plans for TPMs in other systems," he said, presumably referring to servers.
Intel has also agreed to put a TPM chip on one of its motherboards. In addition, the Trusted Computing Group is said to have queued up four other announcements, due over the next six months, about OEMs using its technology.
"We've been seeing market acceptance in second-tier PC suppliers in the last six months," said Joerg Borchert, vice president of secure mobile solutions for Infineon Technologies North America, which supplies TPM chips to HP.
http://www.eetuk.com/tech/news/OEG20030915S0025
Intel Prescott Processor Summary
Features
Summary
Prescott, the next generation Intel processor will hit the streets in the 4th quarter of 2003. The Prescott processor is the code name for a new generation of IA-32 processors. It is expected to debut at 3.2GHz and will eventually scale up into the 5GHz region. The timing of its release will coincide with AMD's Hammer processor brings Prescott into direct competition with it.
Prescott also includes support for Intel's LaGrande initiative which calls for protected execution, memory and storage. It is believed that LaGrande and Microsoft's Palladium technology will work together to increase the level of computing security. LaGrande would be implemented through processor extensions and it is left to be seen if the initial offering of Prescott will have it enabled.
In line with Intel's 865 (Springdale) and 875P (Canterwood) family of chipsets, Prescott is expected to debut on 800 MHz FSB with DualDDR333 and DualDDR400 support. Prescott platforms are expected to pack a punch in term of peformance. Following this, Intel is expected to unveil its Tejas processor, the successor to Prescott in 2004.
Intel Desktop Board D865GRHLK MicroATX MOBO
Find next-generation security technology in desktop boards today with the Intel Desktop Board D865GRHLK. This uATX board features the Trusted Platform Module (TPM). This component on the PC motherboard is specifically designed to enhance platform security above-and-beyond the capabilities of today's software. Defined by the Trusted Computing Group's public specification, the TPM provides hardware-based protection for the encryption and digital signature keys that secure your data's confidentiality.
Features: Form Factor microATX (9.60 inches by 9.60 inches [243.84 mm by 243.84 mm]). Processor Support for an Intel Pentium 4 processor in a mPGA478 socket with a 400/533/800 MHz system bus; Support for an Intel Celeron processor in a mPGA478 socket with a 400 MHz system bus. Memory Four 184-pin DDR SDRAM DIMM sockets; Support for DDR 400, DDR 333, and DDR 266. Chipset Intel 865G Chipset. Security Infineon Trusted Platform Module (TPM); Wave Systems; EMBASSY Trust Suite; Document Manager; Private Information Manager; SmartSignature. I/O Control SMSC LPC47M172 LPC Bus I/O controller. Audio SoundMAX 4 XL with AudioESP audio subsystem using the Analog Devices AD1985 codec. Video Intel Extreme Graphics 2 controller; Universal 0.8/1.5 V AGP 3.0 connector supporting 1x, 4x, and 8x AGP cards or an GP Digital Display (ADD) card; Integrated retention mechanism. Peripheral Interfaces Eight USB 2.0 ports; One serial port; One parallel port; Two Serial ATA IDE interfaces; Two Parallel ATA IDE interfaces with UDMA 33, ATA-66/100 support; One diskette drive interface; PS/2 keyboard and mouse ports. Expansion Capabilities Three PCI bus add-in card connectors (SMBus routed to PCI bus connector 2).
Specifications: Processor Processors Supported Intel Pentium 4 processors supporting Hyper-Threading Technology with 800-MHz or 533-MHz system bus in the mPGA478-pin package. Intel Pentium 4 processors (1.60a, 1.80a, 2a, 2.20 GHz or higher) with 533-MHz or 400-MHz system bus in the mPGA478-pin package. Intel Celeron processors (2 GHz or higher) with 400-MHz system bus in the mPGA478-pin package. Intel 865G Chipset Intel 82865G Graphics Memory Controller Hub (GMCH) with Accelerated Hub Architecture bus. Intel 82801EB I/O Controller Hub (Intel ICH5) with Accelerated Hub Architecture bus. Intel 82802EB Firmware Hub (FWH). Graphics Memory Controller Hub (GMCH) Designed to support up to 4 GB of system memory using DDR400/333/266 SDRAM memory. Intel ICH5 I/O Controller Hub Ultra ATA 100/66. Six PCI request-grant pairs for support of six PCI bus masters. Two SATA 150 (1.5 Gbps) ports. Intel PRO/1000 CT network connection. I/O Features Integrated super I/O LPC bus controller. Three PCI local bus slots. Designed for PC2001. USB 2.0 Integrated Intel ICH5 controllers: Four back-panel ports (two dual stack); Four front-panel ports (via 2-headers requiring cabling to front panel). Firmware Hub System BIOS 4 Mb Flash EEPROM with Intel AMI BIOS featuring Plug and Play, IDE drive auto-configure. Advanced configuration and power interface V1.0b, DMI 2.0, multilingual support. Intel Rapid BIOS Boot Optimized POST for fast access to PC from power-on. System Memory Memory Capacity Four 184-pin DIMM connectors supporting up to four double-sided DIMMs. Memory Types DDR400 SDRAM Memory (when used with Intel processor with 800-MHz front-side bus). DDR333 SDRAM Memory (when used with Intel processor with 800-MHz or 533-MHz front-side bus). DDR266 SDRAM Memory. Memory Modes Dual- and single-channel operation support. Memory Voltage 2.5V. Hardware Management Features System chassis fan speed control. Voltage and temperature sensing. Fan sensor inputs used to monitor fan activity. Power management support for ACPI 1.0b. Wake-Up From Network Wired for Management (WfM) 2.0-compatible. Support for system wake-up using an add-in network interface card with remote wake-up capability or integrated LAN. Expansion Capabilities Three PCI bus add-in card connectors. One universal 1.5V/0.8V AGP 3.0 connector supporting up to AGP 8X. Jumpers and Front-Panel Connectors Jumpers Single configuration jumper design. Jumper access for BIOS configuration mode. Front-Panel Connectors Reset, HD LED, Power LEDs, power on/off, standby header. Two front-panel USB headers. Front-panel audio header. Mechanical Board Style ATX 2.0 Compliant I/O Shield. Board Size 9.6" x 9.6". Baseboard Power Requirements ATX12V or SFX12V. Environment Operating Temperature 0 o C to +55 oC. Storage Temperature -40 oC to +70 oC. Regulations Safety Regulations U.S. and Canada: UL 1950, Third edition: CAN/CSA C22.2 No. 950-95 with recognized U.S. and Canadian component marks. Europe: Nemko certified to EN 60950. International: Nemko certified to IEC 60950 (CB report with CB certificate). EMC regulations (tested in representative chassis) U.S.: FCC Part 15, Class B. U.S.: FCC Part 15, Class B open-chassis (cover off) testing. Canada: ICES-003, Class B. Europe: EMC directive 89/336/EEC; EN 55022:1998 Class B; EN 55024:1998. Australia/New Zealand: AS/NZS 3548, Class B. Taiwan: CNS 13438, Class B. International: CISPR 22:1997, Class B.
Package Contents: Desktop Board D865GRH. ATX 2.01 Compliant I/O Shield. Floppy, SATA and IDE cables. Board and back-panel I/O layout stickers. Quick Start Guide. Desktop Board threeyear limited warranty. Intel Express Installer CD, including: Wave Systems; EMBASSY Trust Suite; Document Manager; Private Information; Manager; SmartSignature; Norton Internet Security; Intel Active Monitor; NTI CD-Maker; Software Drivers, with easy Web updates; Product Guide.
References: / Manufacturer / Understanding System Memory & CPU speeds /
Availability: ETA: 11-25-03.
http://www.directron.com/d865grhlk.html
Wave part of Powersville?
INTERVIDEO'S WINDVD RECORDER A PART OF INTEL'S POWERSVILLE CONCEPT PLATFORM
InterVideo's DVD-Playing And DVD-Recording Software A Key Part Of Intel's 2004 Concept Platform
FREMONT, Calif.--February 18, 2003--InterVideo, Inc. today announced that WinDVD Recorder, its DVD recording and playback software, will be an integral part of Intel's new Powersville Concept Platform. The Powersville Concept Platform, which was unveiled at the Intel Developer Forum, demonstrates key experiences that desktop PCs will deliver for corporate and consumer markets in 2004.
The Powersville Concept Platform demonstrates a vision for the next generation of the "Extended PC" concept that focuses on the ability of users to access and enjoy digital media (music, photos, videos, and TV), both locally and remotely, from a computer. The Powersville Concept Platform includes a digital media adapter prototype that wirelessly connects a television to a home network, allowing users to utilize the power of the PC for multimedia tasks such as recording television and PVR functions, playing music, looking at photos, video editing and much more. This remote viewing capability is enabled by a special version of WinDVD Recorder that supports video streaming. The Powersville Concept Platform also features remote control functionality and a customized GUI (Graphical User Interface) that allows it to be seen and controlled from across the room.
"Intel and InterVideo have a strong track record of working together for consumer and OEM benefit and we are very pleased that Intel has selected WinDVD Recorder as part of the Powersville Concept Platform," said Steve Ro, CEO of InterVideo. "Choosing WinDVD Recorder as part of its concept platform validates InterVideo's rock-solid DVD-playing and DVD-recording technology and recognizes InterVideo's continued leadership in the multimedia software market. The Powersville Concept Platform vision is a great step forward in the convergence of the living room and the den and should be widely adopted by OEMs and ODMs for its unique functionality and ease-of-use."
The Powersville Concept Platform demo with a customized version of WinDVD Recorder is being demonstrated at the San Jose Intel Developers Forum in InterVideo's booth (Booth Number 725).
WinDVD Recorder is a software product that combines the best of two popular InterVideo products: WinDVD, the world's most popular DVD-playing software, and WinDVR, a program that lets users watch and record TV programs with a PC. By combining the functionality of these two products and adding the ability to burn straight to a DVD, WinDVD Recorder enables a host of multimedia possibilities, such as watching DVDs, scheduling and recording favorite TV shows directly to DVD, burning DVDs directly from a camcorder, converting old home movies to DVD and much more.
Security?
http://www.tomshardware.com/business/20030220/idf_2003_2-06.html
GAK.
WinDVR is from InterVideo.
http://www.intervideo.com/jsp/Company.jsp
It requires a TunerBoard.
http://www.intervideo.com/jsp/Supported_TVTuner_Cards.jsp
D865GRH Software.
In addition to the Wave software the board also ships with
WinDVR Lite.
http://www.intel.com/design/motherbd/software/windvr.htm
Wave/Microsoft.
Click start registration.
http://register.wavesys.com
What is the significance (if any) to entering your Windows Registration Key?
How does Wave know if you've entered your correct Windows Registration Key?
Intel.
Re: Private Information Manager
http://pc.watch.impress.co.jp/docs/2003/0918/idf04_13.jpg
http://www.wave.com/products/ets_pim.html
Centrino.
IBM ThinkPad notebooks with Intel® Centrino mobile technology and the IBM Embedded Security Subsystem provide secure, easy wireless computing to increase productivity.
http://www.midrangesys.com/products/notebooks/centrino.htm
Wave Systems Corp. Lee, MA - Aug. 4, 2003 - today announced that the new Document Manager Vault and SmartSignature security software applications in Wave's EMBASSY® Trust Suite client software family work with the IBM Embedded Security Subsystem, a hardware and software-based security solution available on select ThinkPad notebooks and ThinkCentre desktops, to create more secure applications for the business user.
The IBM Embedded Security Subsystem is an example of IBM's ThinkVantage Technologies, a set of tools designed to help customers reduce their IT costs. ThinkVantage Technologies help customers manage their networks, secure their information assets, and simplify wireless deployment.
http://www.wave.com/news/press_archive/03/030804IBM.html
Springdale
Wave, which was showing off its wares in the exhibition area of the forum, will offer secure so-called "Embassy" services for notebooks, desktops and server machines when the silicon becomes available, the first likely to be with the introduction of Intel's Springdale chipset.
http://www.theinquirer.net/?article=7988
The first implementations of TPM appear to be slated for Intel's own motherboards using its Springdale chipsets, but whether third party motherboard vendors will implement it as yet remains unclear.
Atmel, Infineon, ST Micro and NatSemi can already provide TPM 1.1 silicon, and it will be built into some Intel desktop mobos and into the notebook reference design.
But in May, Intel will release its 865 TPM platform - that's Springdale, so it will be built into those products..
http://www.theinquirer.net/?article=7942
Update: Intel's Springdale appears in new PCs
IBM, Gateway, Dell, and Acer America were among the vendors introducing PCs with the new technologies. Most of the PCs will use Intel's Springdale chip set, now known as the 865G.
IBM's ThinkCentre S50 and M50 are designed for corporate customers considering enterprise-wide PC replacements or new deployments, said Dilip Bhatia, worldwide segment marketing manager for IBM.
http://www.infoworld.com/article/03/05/21/HNspringdale_1.html
HP Hops on 'Springdale' Bandwagon
Hopping on the 'Springdale' bandwagon, Hewlett-Packard Co. on Wednesday launched the d530 line of business desktop PCs featuring the new 865G chip set from Intel Corp.
The desktops also include as an option HP's new ProtectTools Embedded Security chip, which enhances data security and controls access to their networks. It was developed in conjunction with Infineon Technologies Inc.
http://www.eweek.com/article2/0,3959,1099374,00.asp
Infineon Helps Bring New Level of Security to Computer Networks; Provides Embedded Security Chip Solution for New HP Compaq Business Desktop PC
Infineon Technologies today announced that it provides the standards-based Embedded Security solution now available for HP's d530 series business desktop PC. The new HP ProtectTools Embedded Security chip enhances the security features of the desktop's native operating system and third-party security applications, bringing a new level of data protection and access control to networked computers.
Infineon worked closely with HP to integrate a Trusted Platform Module (TPM) compliant with specifications published by the Trusted Computing Group
http://www.eetimes.com/pressreleases/bizwire/77878
Wave System's EMBASSY Services Enable Secure Computing Using Trusted Platform Module From Infineon Technologies
http://www.wavesys.com/news/news_archive.html
Wave Systems Makes Enterprise Applications
More Secure Than Ever
IBM's Independent Software Vendor (ISV) Program Helps Wave Systems Create More Secure Applications for the Enterprise User
Wave Systems Corp. Lee, MA - Aug. 4, 2003 - today announced that the new Document Manager Vault and SmartSignature security software applications in Wave's EMBASSY® Trust Suite client software family work with the IBM Embedded Security Subsystem, a hardware and software-based security solution available on select ThinkPad notebooks and ThinkCentre desktops, to create more secure applications for the business user.
http://www.wave.com/news/press_archive/03/030804IBM.html
PRs related to Springdale and Centrino?
Intel Intel has several initiatives underway
Centrino (formerly Banias) Released March 12 of this year, it is a Pentium M processor and an 855 chipset with an Intel PRO/Wireless 2100 network connection. It will eventually incorporate a TPM and other security technology such as Checkpoint VPN-1® SecureClient™ and VeriSign's Personal Trust Agents.
LaGrande This technology is supposed to cordon off specific areas of hard -drive data, keyboard, display and interconnects within the PC 39 , but there is no hard information on it currently available to the public.
Springdale The Springdale chipset will reportedly contain a TPM.
http://www.giac.org/practical/GSEC/Chris_Hageman_GSEC.pdf
Berkshire Eagle Article today on Wave.
Lee firm's stock soars after Intel agreement
By Bill Carey
Berkshire Eagle Staff
Saturday, August 02, 2003 -
LEE -- Wave Systems Corp. has announced that chipmaker Intel Corp. will incorporate its "trusted computing" software in a future motherboard -- the part of a computer containing its internal workings.
The agreement with the Santa Clara, Calif.-based semiconductor giant was seen as another win for Wave Systems in the emerging trusted computing field.
Protects against hackers
The company's stock, traded on the Nasdaq National Market, has taken flight from under $1 a week ago to $3.70 at the market's close yesterday.
Trusted computing uses hardware and software residing on personal computers, servers and consumer devices to protect against hackers and viruses.
Earlier this year, Wave announced a licensing agreement with chipmaker National Semi-conductor Corp. to bundle its Embassy suite of applications on the latter company's Safekeeper chip module.
Similar to the agreement with National Semiconductor, Wave will receive what amounts to a royalty for each motherboard unit sold. Projected sales were not announced.
A motherboard is the internal chassis that contains a computer's circuitry and components, including the microprocessor, memory and input/output system.
Intel plans to introduce the new, security-enabled motherboard for desktop business computers in the fourth quarter.
'A critical requirement'
"Wave helps fill a critical requirement for trusted computing services," Michelle Johnston, an Intel spokeswoman, stated in Wave's announcement. "We believe the Embassy Trust Suite software will provide good value for our customers looking for trusted computing applications."
Wave was founded by Peter Sprague in 1988 and has spent well over $200 million developing its technology. Headed now by Sprague's son, Steven, the company is based at the Lee Corporate Center off Route 102.