- What role do trust and the Trusted Platform Module play in embedded systems?
- Will TPMs based on the existing TPM 1.2 specification also support these other, non-PC applications? If not, will the TPM specification have to be modified?
- What kinds of use cases do you envision enabling via the addition of trusted computing technology to embedded systems?
Many Governments have recognized that hardware security is far superior to software-based security and have developed standards around smart cards and hardware tokens for authentication and other key security functions within the government networks.
As a result, Governments have acknowledged TCG's technology and Trusted Platforms as a security solution by specifying them in procurement practices. For example, in some branches of the United States Government, new computer purchases are required to include the Trusted Platform Module version 1.2. There is also a trend in some Government procurement to specify data protection and network access control solutions as defined by the Trusted Computing Group.
There are no results for the selected criteria.