By Wilson • Aug 20th, 2010 • Category: Laptops, Mobile Computer News
Intel’s acquisition of McAfee shows that security on computers is still a major concern. As such, people will turn to software solutions of all kind to protect their data. For even more protection, though, there is a long-standing hardware solution to security concerns called Trusted Platform Module (TPM for short) as well that is available on many laptops, too
What is a Trusted Platform Module? In short, a TPM is a special chip that one can install on a computer’s motherboard so as to authenticate hardware. Stated differently, what TPM does is authenticate the computer being used to access the data thereon as opposed to authenticating the user.
The nature of this security chip ensures that information like keys, passwords and digital certificates stored within is made more secure from external software attacks and physical theft.
This effectively protects your computer from external hackers who may be using remote access to get to your data, as well as protects your data in the instance there is physical theft. So, all your passwords, keys and certificates – basically all cryptographic functions – are performed at the security chip level, and not software level, so that scalping of your data is negated.
Software functionality, too Trusted Platform Module has software functions built atop the chip, which further enhances security on web browsers, mail applications and other online-data dependent applications.
Confusing to those who do not understand the concept, the name is also used to describe these software functions that are dependent on the security chip. So if you here of TPM in a software sense, this is what is meant by it.
Computers with TPM TPM 1.2, the latest version of the Trusted Platform Module, ships natively on a number of laptops. Laptops with TPM 1.2 are available from a number of manufacturers, but HP has invested by far the most effort in this area.
Intel has put together an interesting white paper on TPM 1.2 and Trusted Platform Module in general if the concept interests you. It’s very technical and in-depth yet intriguing if you work in the field.
Tags for this article: cryptographic functions, security chip level, TPM, TPM 1.2, Trusted Platform Module
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.