Sunday, October 16, 2016 12:25:24 PM
But when the words come directly from the Executive VP of Marketing for SFOR George Waller, I don't consider it to be a Rumor.
Again as I stated in Post 101265 watch the video, the link below begins at 42 minutes 45 seconds.
"Our Keystroke encrytion has been accepted by INTEL and INTEL is now we work with directly embedding it on to the Chip.
So when you use Keystroke Guard it literally embeds its key management process down on to INTEL chip and we are the only Keystroke technology that certified and WORKS DIRECTLY WITH INTEL."
Read the first Bullet on the Paper Shown in the video where he states the above quote. It works with INTEL Chips that have TMP (Trusted Platform Module Support)
To to further clarify IMO:
True many companies software is utilized the in same way for various programs, but SFOR is the only Keystroke technology that certified and WORKS DIRECTLY WITH INTEL."
rusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices. TPM's technical specification was written by a computer industry consortium called Trusted Computing Group (TCG). International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) standardized the specification as ISO/IEC 11889 in 2009.
Version 2.0 of TPM specification was published for public review on March 13, 2014 as a library specification that provides updates to the previously published main TPM specifications. Trusted Platform Module Library Specification Revision 01.16 was released in October 2014 as the latest TPM 2.0 release.
The United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by DISA STIGs and where such technology is available." The TPM is anticipated to be used for device identification, authentication, encryption, measurement, and device integrity.[9]
An example of use is Intel's Trusted Execution Technology (TXT). Intel's TXT is used to create a "chain of trust", and to remotely attest that a computer has a specified hardware setup and is using specified software.
Recent ZRFY News
- Partnership to Offer Enhanced Cybersecurity Solutions • AllPennyStocks.com • 05/22/2023 02:45:00 PM
NanoViricides Reports that the Phase I NV-387 Clinical Trial is Completed Successfully and Data Lock is Expected Soon • NNVC • May 2, 2024 10:07 AM
ILUS Files Form 10-K and Provides Shareholder Update • ILUS • May 2, 2024 8:52 AM
Avant Technologies Names New CEO Following Acquisition of Healthcare Technology and Data Integration Firm • AVAI • May 2, 2024 8:00 AM
Bantec Engaged in a Letter of Intent to Acquire a Small New Jersey Based Manufacturing Company • BANT • May 1, 2024 10:00 AM
Cannabix Technologies to Deliver Breath Logix Alcohol Screening Device to Australia • BLO • Apr 30, 2024 8:53 AM
Hydromer, Inc. Reports Preliminary Unaudited Financial Results for First Quarter 2024 • HYDI • Apr 29, 2024 9:10 AM