InvestorsHub Logo
Followers 24
Posts 471
Boards Moderated 0
Alias Born 07/21/2003

Re: howard_b_golden post# 43936

Tuesday, 06/15/2004 1:05:11 PM

Tuesday, June 15, 2004 1:05:11 PM

Post# of 249983
howard_b_golden I would respectfully offer this. "In order to realize this security model fully, hardware must also be nexus-aware, and processors must include the Secure Software Component (SSC), also known as the Trusted Platform Module (TPM). These hardware modules can perform cryptographic operations and store cryptographic keys. The Trusted Computing Group (TCG), in which Intel and Microsoft are major partners, has already generated and approved the standards for this module."
http://www.intel.com/cd/ids/developer/asmo-na/eng/97003.htm?page=4

Where are you proposing the cryptographic keys be stored?
Without a TPM how can they be passed from PC to PC in a trusted manner? How is the attestation being done so that PC2 knows that the iCard info from PC1 hasn't been altered? Isn't it absolutely essential that I be able to attest that both the information and the source are trusted?

Regards,
Cricket


Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.