Key Concepts
Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications:
- Endorsement key
- Secure input and output
- Memory curtaining / protected execution
- Sealed storage
- Remote attestation
- Trusted Third Party (TTP)
Read more about this topic: Trusted Computing
Famous quotes containing the words key and/or concepts:
“The key to the age may be this, or that, or the other, as the young orators describe; the key to all ages isImbecility: imbecility in the vast majority of men, at all times, and even in heroes, in all but certain eminent moments: victims of gravity, customs and fear. This gives force to the strong,that the multitude have no habit of self-reliance or original action.”
—Ralph Waldo Emerson (18031882)
“Germany collapsed as a result of having engaged in a struggle for empire with the concepts of provincial politics.”
—Albert Camus (19131960)