Trusted Computing - Key Concepts

Key Concepts

Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications:

  1. Endorsement key
  2. Secure input and output
  3. Memory curtaining / protected execution
  4. Sealed storage
  5. Remote attestation
  6. Trusted Third Party (TTP)

Read more about this topic:  Trusted Computing

Famous quotes containing the words key and/or concepts:

    The key to the age may be this, or that, or the other, as the young orators describe; the key to all ages is—Imbecility: imbecility in the vast majority of men, at all times, and even in heroes, in all but certain eminent moments: victims of gravity, customs and fear. This gives force to the strong,—that the multitude have no habit of self-reliance or original action.
    Ralph Waldo Emerson (1803–1882)

    Germany collapsed as a result of having engaged in a struggle for empire with the concepts of provincial politics.
    Albert Camus (1913–1960)