FACTOID # 10: The total number of state executions in 2005 was 60: 19 in Texas and 41 elsewhere. The racial split was 19 Black and 41 White.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Trusted Computing Group
TCG logo
TCG logo

The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative led by AMD, Hewlett-Packard, IBM, Infineon, Intel, Lenovo, Microsoft, and Sun Microsystems to implement trusted computing. Image File history File links Tcg_logo. ... Advanced Micro Devices, Inc. ... The Hewlett-Packard Company (NYSE: HPQ), commonly known as HP, is a very large, global company headquartered in Palo Alto, California, United States. ... Big Blue redirects here. ... Infineon Technologies is a German manufacturer of integrated circuits and related products. ... Intel Corporation (NASDAQ: INTC, SEHK: 4335), founded in 1968 as Integrated Electronics Corporation, is an American multinational corporation that is best known for designing and manufacturing microprocessors and specialized integrated circuits. ... Lenovo Group Limited, formerly known as Legend Group Limited, is the largest personal computer manufacturer in the Peoples Republic of China, and as of 2004 is the eighth largest in the world. ... Microsoft Corporation, (NASDAQ: MSFT, HKSE: 4338) is a multinational computer technology corporation with global annual revenue of US$44. ... Sun Microsystems, Inc. ... Trusted Computing Group, the creators of trusted computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ...

Contents

Overview

TCG's original major goal was the development of a Trusted Platform Module (TPM), a semiconductor intellectual property core or integrated circuit that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing features. TCG-compliant functionality has since been integrated directly into certain mass-market chipsets. In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a microcontroller that can store secured information, as well as the general name of implementations of that specification. ... In electronic design a semiconductor intellectual property core, IP block, or IP core is a reusable unit of logic, cell, or chip layout design and is also the property of one party. ... Integrated circuit showing memory blocks, logic and input/output pads around the periphery A monolithic integrated circuit (also known as IC, microchip, silicon chip, computer chip or chip) is a miniaturized electronic circuit (consisting mainly of semiconductor devices, as well as passive components) that has been manufactured in the surface... Trusted Computing Group, the creators of trusted computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ...


TCG also recently released the first version of their Trusted Network Connect (TNC) protocol specification, based on the principles of AAA, but adding the ability to authorize network clients on the basis of hardware configuration, BIOS, kernel version, and which updates that have been applied to the OS and anti-virus software, etc. [1]. As of Decenber 2006, almost one hundred fifty enterprises are members of TCG or follow its specifications. Trusted Network Connect or TNC is an open-architecture, by the Trusted Network Connect Sub Group (TNC-SG) of the Trusted Computing Group (TCG). ... In computer security, AAA stands for authentication, authorization and accounting protocol. ... Computer hardware is the physical part of a computer, including the digital circuitry, as distinguished from the computer software that executes within the hardware. ... BIOS, in computing, stands for Basic Input/Output System also incorrectly known as Basic Integrated Operating System. ... This article is about the operating system concept. ... An operating system (OS) is a computer program that manages the hardware and software resources of a computer. ... Anti-virus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software (malware). ...


Seagate has also developed a Full Disk encryption drive which can use the ability of the TPM to secure the key within the hardware chip.


Related projects

Chipmakers have developed varying implementations that integrate the TPM functions into a normal chipset. Intel's is called trusted execution technology . AMD's is called Secure Virtual Machine (SVM) [2]. Transmeta's is called Transmeta Security eXtensions (TSX). IBM uses two names, Embedded Security Subsystem and ThinkVantage Technology. Winbond Corporation uses SafeKeeper. Phoenix Technologies' BIOS for it is called Core Managed Environment (cME). Fujitsu calls it FirstWare Vault. Hewlett Packard calls it ProtectTools. Intel Corporation (NASDAQ: INTC, SEHK: 4335), founded in 1968 as Integrated Electronics Corporation, is an American multinational corporation that is best known for designing and manufacturing microprocessors and specialized integrated circuits. ... LaGrande Technology is a key component of Intels initiative of safer computing, aimed at giving user, especially in the business segment, a way to defend themselves against software-based attacks aimed at stealing sensitive information. ... Advanced Micro Devices, Inc. ... Transmeta NASDAQ: TMTA develops computing technologies with a focus on reducing power consumption in electronic devices. ... Big Blue redirects here. ... Phoenix Technologies Ltd (NASDAQ: PTEC) is a creator of computer BIOS software. ... For the district in Saga, Japan, see Fujitsu, Saga. ... HP redirects here. ...


Microsoft's initiative is called Next Generation Secure Computing Base (formerly Palladium). Owing to significant difficulties in creating a working implementation that third-party developers were interested in using, NGSCB is not being included with Microsoft's next major operating system release, Windows Vista. Instead, Vista will ship with a few technologies that can make use of a TPM chip, such as BitLocker Drive Encryption, and a new version of the Microsoft Cryptography API. [3] The Next-Generation Secure Computing Base (NGSCB), formerly known as Palladium (Pd), is Microsofts new trusted computing architecture. ... This article is 65 kilobytes or more in size. ... BitLockerâ„¢ Drive Encryption is a data protection feature integrated into Windows Vistaâ„¢ that provides encryption for the entire O/S volume. ... Also known as the Microsoft CAPI... It is the Microsoft standard interface for use by Microsoft operating systems and the software running on them to complete cryptographic operations. ...


Criticisms

The group has faced widescale opposition from the free software community on the grounds that the technology they're developing has a negative impact on the user's privacy and can create customer lock-in , especially if it's used to create DRM applications. It has received criticism from the GNU/Linux community, the FreeBSD community as well as the Hacker community in general. Significant backlash amongst the Trusted Computing Group was present during Richard Stallman's speech at the Hackers on Planet Earth conference in July 2006, in New York. Richard Stallman, and the Free Software Foundation have also criticized the group publicly in other speeches. The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable. Unix systems filiation. ... FreeBSD is a Unix-like free operating system descended from AT&T UNIX via the Berkeley Software Distribution (BSD) branch through the 386BSD and 4. ... Hackers are sometimes portrayed as mysterious and strange. ... Richard Matthew Stallman (nickname RMS) (born March 16, 1953) is an acclaimed software freedom activist, hacker, and software developer. ... Hackers of Planet Earth or HOPE is a conference series sponsored by the hacker magazine 2600 The Hacker Quarterly. ... The Free Software Foundation (FSF) is a non-profit corporation founded in October 1985 by Richard Stallman to support the free software movement (free as in freedom), and in particular the GNU project. ...


TCG Founders

  • AMD
  • Hewlett-Packard
  • IBM
  • Infineon
  • Intel Corporation
  • Microsoft
  • Sun Microsystems, Inc.

See also

Consumer Broadband and Digital Television Promotion Act The Consumer Broadband and Digital Television Promotion Act (CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA), and sometimes derisively called the Consume But Dont Try Programming Anything bill, is a proposed US law which would prohibit any kind of technology which can be...


External links


  Results from FactBites:
 
Trusted computing - Wikipedia, the free encyclopedia (2732 words)
Trusted computing (TC) refers to technology from the Trusted Computing Group (TCG) which is claimed to allow computers and servers to offer improved computer security and protection from computer viruses and the like.
It is possible that you trust your doctor and think he or she is a great person; it's equally possible that there is only one doctor in your town, so you are forced to trust him or her.
Critics of trusted computing are further concerned that they are not able to look inside trusted computing hardware to see if it is properly implemented or if there are backdoors which poses a serious risk to national security, company secrets, and privacy.
Trusted Computing Group - Wikipedia, the free encyclopedia (306 words)
The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is a controversial initiative led by AMD, Hewlett-Packard, IBM, Intel, Microsoft, Sony, and Sun Microsystems to implement trusted computing.
TCG's original major goal was the development of a Trusted Platform Module (TPM), a hardware intellectual property block or integrated circuit that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing features.
TCG also recently released the first version of their Trusted Network Connect (TNC) protocol specification, based on the principles of AAA, but adding the ability to authorize network clients on the basis of hardware configuration, BIOS, kernel version, and which updates that have been applied to the OS and anti-virus software, etc. [1].
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m