The Slides Look Like This:
Slide 1: TCG
Slide 2:
A picture of Hoover Dam and the slogans: open the gates … who are you … just trust me
Slide 3:
"Trusted Ecosystem" with TPM in the middle and all the happy catch phrases around it largely dived into TPM devices in a bubble in the middle, Applications and Services (grouped above), and Security and Trust Services (grouped below).
Slide 4
TPM software:
TPM<->TSS->CSP/CAPI Interface<->CAPI App
(and in parallel) TPM<>TSS<>PKS#11 interface<>PKS#11 App
(just bubble flow chart, "<" indicating arrows)
Slide 5
More TPM software layered above and adjacent to Slide 4;
Above = Applications (TPM management, File manager, Signatures, PIM)
And adjacent = Infrastructure (KTM, trusted third party)
Slide 6,7,8
Scans of the ESC kinda going through the TPM enabling process and in this case enabling a fingerprint ID step
Slide 9 (the meat)
Types of 3rd party hardened Apps:
File encrypt (Wave, IBM, Softex, HP, Infineon, ISC)
Single Secure logon (Wave, Softex, IBM, Cognizance)
Protected Info Repository (Wave, IBM, Softex)
Email integration (Outlook, Netscape, ISC)
Signature (MSFT, Wave, Adobe, Netscape)
Enterprise Logon (Cognizance, Wave Trust Server)
Remote Access (SecureID, ChecpointVPN-1)
Hardened PKI (VeriSign PTA, Checkpoint, RSA)
And that all folks.
(but who is Cognizance??)
Regards,
Dig Space
The above content is my opinion.