InvestorsHub Logo
Followers 4
Posts 710
Boards Moderated 0
Alias Born 07/14/2006

Re: Tsunami07 post# 195534

Thursday, 07/08/2010 7:42:55 PM

Thursday, July 08, 2010 7:42:55 PM

Post# of 249905
AT&T, Verizon Bet on Embedded Devices

http://www.wirelessweek.com/Articles/2010/06/Carriers-Embedded-Devices-ATT-Verizon/

June 14, 2010

At a time when nine out of 10 Americans have a cell phone, the country's top two operators are getting creative about finding growth opportunities in an increasingly crowded wireless market.

AT&T and Verizon Wireless are betting heavily on embedded devices, from tried-and-true telematics solutions to wirelessly enabled dog collars. If their expectations hold true, the incremental revenue brought in by nontraditional cellular connections could be the next growth spurt for the wireless industry, helping to offset an inevitable slump in the rate of subscriber growth.

The head of AT&T's Emerging Device segment, Glenn Lurie, believes the addition of machine-to-machine (M2M) and wirelessly enabled devices could take the U.S. wireless penetration rate from about 90 percent to 500 percent. "There are a certain number of customers with a handset in their hand. This space is absolutely going to dwarf that," he says. "There are going to be a lot more connections and a lot more customers in the emerging device space than there are today in the current space of mobility."

===================================================================

The TPM provides a hardware basis, usually through an application specific integrated circuit (ASIC), for protecting computers. The TPM’s capabilities include trusted cryptography, protected storage, integrity management, and attestation through natively supporting public key infrastructure (PKI) authentication.

===================================================================

PKI security for embedded systems

May 2010

http://embedded-computing.com/pki-security-embedded-systems

Public Key Infrastructure (PKI) isn’t just for enterprise applications – a Machine-to-Machine (M2M) authentication strategy based on PKI can form the backbone of a secure embedded system.

===================================================================

Wave's EMBASSY:

The company offers EMBedded Application Security System (EMBASSY) Trust Suite, a set of applications and services that are designed to bring functionality and user value to trusted platform module (TPM) enabled products. The EMBASSY Trust Suite includes the EMBASSY Security Center, Trusted Drive Manager, Private Information Manager, and Key Transfer Manager. It also offers middleware and tools, which include TCG enabled toolkit that assists application developers writing new applications or modifying existing ones; and Wave TCG-Enabled Cryptographic Service Provider, which allows software developers to utilize the security of a TCG standards-based platform. In addition, the company offers EMBASSY Trust Server Applications comprising EMBASSY Key Management Server, a server application designed to provide corporate-level backup and transition of the TPM keys; EMBASSY Authentication Server that provides centralized management, provisioning, and enforcement of multifactor domain access policies; and EMBASSY Remote Administration Server, which provides centralized management and auditing of TPMs. Further, Wave Systems Corp. provides eSign Transaction Management Suite and broadband media distribution services. It sells its products to chip original equipment manufacturers (OEMs), PC OEMs, enterprise customers, and systems integrators.

===================================================================

Machine-to-Machine Market to Grow $19 Billion Over the Next Five Years: Report says

July 08, 2010

http://m2m.tmcnet.com/topics/m2mevolution/articles/91259-machine-to-machine-market-grow-19-billion-over.htm

Machine-to-Machine or “M2M” is one of the fastest growing technology areas offering strong revenue opportunity for network operators and technology suppliers- thanks to the emergence of end-user devices with M2M features.

===================================================================

Is M2M Connectivity the next big growth driver for mobile? "M2M forecast to surpass 100m units shipped annually soon after 2012"

"virtually any product "on the shelves at a Best Buy, Wal-Mart, Radio Shack or Costco would deliver a better consumer proposition if it was connected"."

http://www.telco2research.com/articles/EB_M2M-Embedded-Overview-Healthcare-Strategic-Options_Summary

M2M / Embedded Market Overview, Healthcare Focus, and Strategic Options

In the USA, AT&T shares an equally strong view of the market opportunity and in 2008 it established a dedicated Emerging Devices and National Resale business unit. Glen Lurie[3], its President, offers the view that "connectivity really expands so many aspects of everyone's life" and that virtually any product "on the shelves at a Best Buy, Wal-Mart, Radio Shack or Costco would deliver a better consumer proposition if it was connected".

===================================================================

Wave's EMBASSY/PKI/TPM:

HISTORY:2005

http://findarticles.com/p/articles/mi_m0EIN/is_2005_Nov_8/ai_n15783493/

Wave's Embassy software supports the next generation Trusted Computing security chip hardware called the Trusted Platform Module (TPM) 1.2. The computer industry has already shipped millions of PCs embedded with the Trusted Computing Group-standard TPM 1.1 chips and is now shipping next generation 1.2 TPM chips. Wave's Embassy platform supports both standards.

TPMs help enable secure services and applications. Wave has designed its Embassy technology to work with all commercially available TCG-compliant TPMs. Wave's Embassy platform is also compatible with the Microsoft Office(R) environment, and facilitates a variety of PC-related security and productivity tasks.

Wave demonstrates the hardening of standard Department of Defense PKI systems. Using TPMs, Wave will demonstrate issuing a standard, medium assurance certificate (X.509 version 3 PKI class 3) which is commonly used for network and application authentication. The TPM will bind the certificate to the hardware platform, creating a more tamper resistant certificate. This is the first time that fully certified (FIPS 140-2 L2) TPMs will be shown in this security capacity. Wave is working with External Certificate Authorities (ECA) approved by the DoD C.I.O. to more broadly disseminate this solution.

"Working with TPM security chip enabled PCs, Wave's Embassy software technology can strongly authenticate both the PC and the user in a government or enterprise network," said Steven Sprague, president and CEO, Wave Systems. "Network administrators can benefit from better authentication capabilities by using available biometrics, smart cards, passwords or the TPM, all tailored to specific security needs."

Beyond its importance to the DoD PKI environment, Wave's Embassy trusted computing solutions are also designed to solve the real world authentication and identity management problems facing federal, state and local government agencies.

===================================================================

>><<
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.