Search: Home Bugtraq Vulnerabilities Mailing Lists Jobs Tools Beta Programs
    Digg this story   Add to del.icio.us  
Software spec for trusted computing released
Published: 2006-02-13

SAN JOSE, Calif. -- The Trusted Computing Group published the interface specification for its latest trusted platform module on Monday, which will allow developers to write applications to take advantage of new features such as trusted storage.

The group plans to demonstrate applications using the trusted computing platform at the RSA Security Conference this week. As many as 50 million computers will ship with version 1.2 of the Trusted Platform Module in 2006, the group said in a statement. The Trusted Software Stack 1.2 is the application framework that allows programs to take advantage of the hardware's features.

Trusted computing is a controversial technology that integrated encryption hardware and data vaults into personal computers and media devices to better protect data from pirates and, in many cases, the owner of the computer or the device. Microsoft plans to incorporate many security features based on the Trusted Platform Module in its next-generation operating system, known as Vista, though questions remain just how the standards will apply to the software giant.

Trusted storage allows the hardware to be used to encrypt data stored on hard drives and other storage devices to protect them from tampering and theft.



Posted by: Robert Lemos
    Digg this story   Add to del.icio.us  
 
Comments Mode:
(un)trustworthy micro$oft 2006-02-14
assurbanipal







 

Privacy Statement
Copyright 2009, SecurityFocus