News Focus
News Focus
icon url

TonyMcFadden

01/31/04 4:38 AM

#27826 RE: keV #27825

So, in other words, you are once again make statements that have no bearing in fact, just unsubstantiated opinion.

But, if you CAN substantiate it (look the word up if you need to), then by all means do so, and THEN we can discuss this intelligently. (Something that is regrettably not currently possible)
icon url

Doma

01/31/04 5:08 AM

#27827 RE: keV #27825

Kev.......I'll Give you a Killer example!

Kev that is true for a software model only or the
current TCG mechanism.But if use Wave's TCG Premium
Utility Services you can now Recover your Password.
Do you think this service will be attractive to
IT Managers & Joe public & look good on our bottom line?
Maybe it's another reason for users to buy those $10-30 per TPM per year Premium Services??????????


SKS: Yes, I'll give you a killer example. So when you get your IBM Think Pad and you turn on your document management and you encrypt your whole hard disk, if you forget your password, it's a brick. There's no mechanism today in the TCPA implementation to recover the password. And you can all go out and buy the book that is published by Hewlett Packard on trusted computing, so you can read the interpretation of this specification. It's really good late night reading, especially if you have an insomnia problem. And what it will tell you is that, it is actually the responsibility of, it's not entirely clear, but either the chip manufacturer or the original motherboard manufacturer to be involved in the password recovery business. And last time I checked, calling National Semiconductor because you bought a box from your local computer store that was sent to them by Ingram Micro that was manufactured by three guys in Taiwan, would happened to be a National Semiconductor chip is not a great way to get customer service. And, so as an example, we're building the tools and infrastructure to do password recover on TCPA chips powered by the enterprise IT department. So you can instead call your enterprise IT manager and say, "Hey, gee, I forgot my password. Can you help me?" And, so we think those are the kind of utilities in trusted computing that are really critical to broad based deployment. That the first time your laptop becomes a brick, you're going to be pretty upset with this security stuff. And we have all had that experience. The first time you walk up to your car with your key and put it in the ignition and the key doesn't turn, because something broke in the lock - it's really annoying. And our tolerance level as individuals for these kinds of security systems to get in our way, eventually after the 75th false alarm from our home security system, we just turn it off and leave it off. And so it's very important for security to be easy to use, easy to manage and easy to deploy. And so the services of how do I backup and recover, how do I get an identity, how do I move - so I got a new computer, I've got my entire life set up on this previous computer - how do I move my security infrastructure - securely - from one computer to the other. And while that sounds simple, the context of 'move' is potentially the biggest breach of security. Because if I can come in and sit down at your machine and move yours to mine, then I've effectively stolen your identity and that's really something that you want to prevent against. So providing the mechanisms to allow trusted transfer of data from one TCPA chip to another, those are the tools and infrastructure that Wave with its Trust Assurance Network, our product, enables. And we're demonstrating some of those. We're demonstrating some of the applications that sit on top of those, like document signature, file encryption, content distribution and protection. Where we can show those applications, we'll just be one of the vendors in the application level. We think we can have really very strong market presence at the utility level in this market.


icon url

theguvna88

01/31/04 11:17 AM

#27844 RE: keV #27825

Give it a rest.