>>> Security implementations that rely on the TPM must also include "key escrow" services to securely back up and manage the unique keys associated with the TPM on each computer system. In this way, if something happens to the system, its full TPM-enabled identity can be restored. Without this capability, it would be impossible, for instance, to unencrypt files encrypted with the TPM key. Key escrow services are provided by public key infrastructure (PKI) systems that manage asymmetric key exchanges. <<<
Any questions now regarding why they co-branded ETS?
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.