InvestorsHub Logo

Knuckboy

01/10/17 8:37 AM

#128125 RE: Jtech #128123

I think this ties together ACS and Intel connections previously brought forward.

Koog

01/10/17 9:41 AM

#128132 RE: Jtech #128123

Can any software do this? or does SFOR have special privileges?


Any software can do this. There are no special privileges, this is just another program that can utilize the Trusted Platform Module, like hundreds of others.

Gold49er

01/10/17 10:16 AM

#128136 RE: Jtech #128123

Answering Your TMP Question -"SFOR SPECIAL PRIVILEGES"

I see Koog added his 2 cent in on this so.......

I debated Koog on this a while back.

The answer to that Question it depends, if your Discussing Just "Keyboard Encryption".

Then yes as of Oct last year, if one believes the Statement From George Waller.

Our Keystroke Encryption has been accepted by Intel and Intel is... now we work with directly with embedding it on to the chip so when you use Keystroke Guard it literally embeds it's Key Management Process down on to Intel (stutter) Chip and we are the only Keystroke Encrypted technology that is Certified and that works directly with Intel.



Video with George Waller speaking.

Waller stated as much in the Video with one of its Many SMB's Goto 43 minutes 12 seconds into the Video.



Notes From myself:
The "Stutter" could be editing where "TMP" may have been edited out for some reason?

Right after George made that statement the Sound Stops if you listen about a couple of minutes later you can here Mark Kay say "it appears the sound has failed" at 45:53. This was a teleconference. As Heard at 53:00 when audio comes back.

But in other area's outside of Keystroke Encryption :

"TPM chips can be used with any major operating system and work best in conjunction with other security technologies such as firewalls, antivirus software, smart cards and biometric verification. "


A Trusted Platform Module (TPM) is a specialized chip on an endpoint device that stores RSA encryption keys specific to the host system for hardware authentication.


Each TPM chip contains an RSA key pair called the Endorsement Key (EK). The pair is maintained inside the chip and cannot be accessed by software. The Storage Root Key (SRK) is created when a user or administrator takes ownership of the system. This key pair is generated by the TPM based on the Endorsement Key and an owner-specified password.

A second key, called an Attestation Identity Key (AIK) protects the device against unauthorized firmware and software modification by hashing critical sections of firmware and software before they are executed. When the system attempts to connect to the network, the hashes are sent to a server that verifies that they match expected values. If any of the hashed components has been modified since last started, the match will fail, and the system can not gain entry to the network.

TPM chips can be used with any major operating system and work best in conjunction with other security technologies such as firewalls, antivirus software, smart cards and biometric verification.

The term TPM is sometimes used in reference to the set of specifications applicable to TPM chips.


http://whatis.techtarget.com/definition/trusted-platform-module-TPM