InvestorsHub Logo
Followers 31
Posts 1459
Boards Moderated 0
Alias Born 09/08/2012

Re: goingUPagain post# 102830

Sunday, 10/16/2016 12:25:24 PM

Sunday, October 16, 2016 12:25:24 PM

Post# of 235027
INTEL RUMOR ?? A Rumor would be, if you or I stated that SFOR was working with INTEL.

But when the words come directly from the Executive VP of Marketing for SFOR George Waller, I don't consider it to be a Rumor.

Again as I stated in Post 101265 watch the video, the link below begins at 42 minutes 45 seconds.




"Our Keystroke encrytion has been accepted by INTEL and INTEL is now we work with directly embedding it on to the Chip.
So when you use Keystroke Guard it literally embeds its key management process down on to INTEL chip and we are the only Keystroke technology that certified and WORKS DIRECTLY WITH INTEL."

Read the first Bullet on the Paper Shown in the video where he states the above quote. It works with INTEL Chips that have TMP (Trusted Platform Module Support)

To to further clarify IMO:
True many companies software is utilized the in same way for various programs, but SFOR is the only Keystroke technology that certified and WORKS DIRECTLY WITH INTEL."

rusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices. TPM's technical specification was written by a computer industry consortium called Trusted Computing Group (TCG). International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) standardized the specification as ISO/IEC 11889 in 2009.

Version 2.0 of TPM specification was published for public review on March 13, 2014 as a library specification that provides updates to the previously published main TPM specifications. Trusted Platform Module Library Specification Revision 01.16 was released in October 2014 as the latest TPM 2.0 release.

The United States Department of Defense (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by DISA STIGs and where such technology is available." The TPM is anticipated to be used for device identification, authentication, encryption, measurement, and device integrity.[9]

An example of use is Intel's Trusted Execution Technology (TXT). Intel's TXT is used to create a "chain of trust", and to remotely attest that a computer has a specified hardware setup and is using specified software.