Trusted Computing - Key Concepts

Key Concepts

Trusted Computing encompasses six key technology concepts, of which all are required for a fully Trusted system, that is, a system compliant to the TCG specifications:

  1. Endorsement key
  2. Secure input and output
  3. Memory curtaining / protected execution
  4. Sealed storage
  5. Remote attestation
  6. Trusted Third Party (TTP)

Read more about this topic:  Trusted Computing

Famous quotes containing the words key and/or concepts:

    The key to the age may be this, or that, or the other, as the young orators describe; the key to all ages is—Imbecility: imbecility in the vast majority of men, at all times, and even in heroes, in all but certain eminent moments: victims of gravity, customs and fear. This gives force to the strong,—that the multitude have no habit of self-reliance or original action.
    Ralph Waldo Emerson (1803–1882)

    Once one is caught up into the material world not one person in ten thousand finds the time to form literary taste, to examine the validity of philosophic concepts for himself, or to form what, for lack of a better phrase, I might call the wise and tragic sense of life.
    F. Scott Fitzgerald (1896–1940)