- What role do trust and the Trusted Platform Module play in embedded systems?
- Will TPMs based on the existing TPM 1.2 specification also support these other, non-PC applications? If not, will the TPM specification have to be modified?
- What kinds of use cases do you envision enabling via the addition of trusted computing technology to embedded systems?
Many Governments have recognized that hardware security is far superior to software-based security and have developed standards around smart cards and hardware tokens for authentication and other key security functions within the government networks.
As a result, Governments have acknowledged TCG's technology and Trusted Platforms as a security solution by specifying them in procurement practices. For example, in some branches of the United States Government, new computer purchases are required to include the Trusted Platform Module version 1.2. There is also a trend in some Government procurement to specify data protection and network access control solutions as defined by the Trusted Computing Group.
This Juniper Networks deployment has provided Bangchak Petroleum with a complete information security solution that has enabled it to comply with the ISO 27001 information security standard.
With UAC, St. Mary’s was able to roll out a wireless one-to-one computing program to support its cutting-edge science, technology, engineering and math curriculum with confidence that data privacy and network security would be maintained.
LJM Systems deployed Juniper’s SA4000 and IC4000 to provide the infrastructure for a secure intranet as well as an extranet that would enable staff and students to access St. Monica’s network from home and to differentiate their network and application access based on their role, whether remote or local.