Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

Trusted Computing

Index Trusted Computing

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. [1]

78 relations: Advanced Micro Devices, Anti-competitive practices, ARM architecture, Backup, BIOS, BitLocker, Cheating in online games, Classmate PC, Computer, Computer hardware, Computer security, Computer virus, Copy protection, Dell, Dell OptiPlex, Digital rights management, Direct Anonymous Attestation, Electronic Frontier Foundation, Emulator, End user, Fair use, Free software, Free Software Foundation, Gemalto, Gentoo Linux, Grid computing, Hardware restriction, Hewlett-Packard, IBM, Intel, International Data Corporation, Internet Explorer, John Walker (programmer), Lenovo, Linux kernel, Malware, Mandatory access control, Memory protection, Microsoft, Microsoft Windows, Mobile device management, Next-Generation Secure Computing Base, One Laptop per Child, Open-source model, OpenOffice.org, Operating system, PrivateCore, Product bundling, Proof-of-space, Public interest, ..., Public-key cryptography, Richard Stallman, Ross J. Anderson, RSA (cryptosystem), Samsung, Samsung Knox, Scare quotes, Security policy, Security-Enhanced Linux, Server (computing), Software, Subscriber identity module, Tamper resistance, ThinkPad, Trusted Computing, Trusted Computing Group, Trusted Network Connect, Trusted Platform Module, Trusted system, United States Army, United States Department of Defense, Vendor lock-in, Whistleblower, Windows 7, Windows 8, Windows RT, Windows Vista, X86. Expand index (28 more) »

Advanced Micro Devices

Advanced Micro Devices, Inc. (AMD) is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets.

New!!: Trusted Computing and Advanced Micro Devices · See more »

Anti-competitive practices

Anti-competitive practices are business, government or religious practices that prevent or reduce competition in a market (see restraint of trade).

New!!: Trusted Computing and Anti-competitive practices · See more »

ARM architecture

ARM, previously Advanced RISC Machine, originally Acorn RISC Machine, is a family of reduced instruction set computing (RISC) architectures for computer processors, configured for various environments.

New!!: Trusted Computing and ARM architecture · See more »

Backup

In information technology, a backup, or the process of backing up, refers to the copying into an archive file of computer data so it may be used to restore the original after a data loss event.

New!!: Trusted Computing and Backup · See more »

BIOS

BIOS (an acronym for Basic Input/Output System and also known as the System BIOS, ROM BIOS or PC BIOS) is non-volatile firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.

New!!: Trusted Computing and BIOS · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: Trusted Computing and BitLocker · See more »

Cheating in online games

Cheating in online games is defined as the action of pretending to comply with the rules of the game, while secretly subverting them to gain an unfair advantage over an opponent.

New!!: Trusted Computing and Cheating in online games · See more »

Classmate PC

The Classmate PC, formerly known as Eduwise, is Intel's entry into the market for low-cost personal computers for children in the developing world.

New!!: Trusted Computing and Classmate PC · See more »

Computer

A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Trusted Computing and Computer · See more »

Computer hardware

Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.

New!!: Trusted Computing and Computer hardware · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Trusted Computing and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Trusted Computing and Computer virus · See more »

Copy protection

Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons.

New!!: Trusted Computing and Copy protection · See more »

Dell

Dell (stylized as DELL) is an American multinational computer technology company based in Round Rock, Texas, United States, that develops, sells, repairs, and supports computers and related products and services.

New!!: Trusted Computing and Dell · See more »

Dell OptiPlex

OptiPlex is a line of desktop computers from Dell aimed at the corporate, government and education markets.

New!!: Trusted Computing and Dell OptiPlex · See more »

Digital rights management

Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

New!!: Trusted Computing and Digital rights management · See more »

Direct Anonymous Attestation

Direct Anonymous Attestation (DAA) is a cryptographic primitive which enables remote authentication of a trusted computer whilst preserving privacy of the platform's user.

New!!: Trusted Computing and Direct Anonymous Attestation · See more »

Electronic Frontier Foundation

The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California.

New!!: Trusted Computing and Electronic Frontier Foundation · See more »

Emulator

In computing, an emulator is hardware or software that enables one computer system (called the host) to behave like another computer system (called the guest).

New!!: Trusted Computing and Emulator · See more »

End user

In product development, an end user (sometimes end-user) is a person who ultimately uses or is intended to ultimately use a product.

New!!: Trusted Computing and End user · See more »

Fair use

Fair use is a doctrine in the law of the United States that permits limited use of copyrighted material without having to first acquire permission from the copyright holder.

New!!: Trusted Computing and Fair use · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: Trusted Computing and Free software · See more »

Free Software Foundation

The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License.

New!!: Trusted Computing and Free Software Foundation · See more »

Gemalto

Gemalto is an international digital security company providing software applications, secure personal devices such as smart cards and tokens, and managed services.

New!!: Trusted Computing and Gemalto · See more »

Gentoo Linux

Gentoo Linux (pronounced) is a Linux distribution built using the Portage package management system.

New!!: Trusted Computing and Gentoo Linux · See more »

Grid computing

Grid computing is the collection of computer resources from multiple locations to reach a common goal.

New!!: Trusted Computing and Grid computing · See more »

Hardware restriction

A hardware restriction (sometimes called hardware DRM) is content protection enforced by electronic components.

New!!: Trusted Computing and Hardware restriction · See more »

Hewlett-Packard

The Hewlett-Packard Company (commonly referred to as HP) or shortened to Hewlett-Packard was an American multinational information technology company headquartered in Palo Alto, California.

New!!: Trusted Computing and Hewlett-Packard · See more »

IBM

The International Business Machines Corporation (IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries.

New!!: Trusted Computing and IBM · See more »

Intel

Intel Corporation (stylized as intel) is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley.

New!!: Trusted Computing and Intel · See more »

International Data Corporation

International Data Corporation (IDC) is a provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets.

New!!: Trusted Computing and International Data Corporation · See more »

Internet Explorer

Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995.

New!!: Trusted Computing and Internet Explorer · See more »

John Walker (programmer)

John Walker is a computer programmer, author and co-founder of the computer-aided design software company Autodesk.

New!!: Trusted Computing and John Walker (programmer) · See more »

Lenovo

Lenovo Group Ltd. or Lenovo PC International, often shortened to Lenovo (formerly stylized as lenovo), is a Chinese multinational technology company with headquarters in Beijing, China and Morrisville, North Carolina.

New!!: Trusted Computing and Lenovo · See more »

Linux kernel

The Linux kernel is an open-source monolithic Unix-like computer operating system kernel.

New!!: Trusted Computing and Linux kernel · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Trusted Computing and Malware · See more »

Mandatory access control

In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.

New!!: Trusted Computing and Mandatory access control · See more »

Memory protection

Memory protection is a way to control memory access rights on a computer, and is a part of most modern instruction set architectures and operating systems.

New!!: Trusted Computing and Memory protection · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Trusted Computing and Microsoft · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Trusted Computing and Microsoft Windows · See more »

Mobile device management

Mobile device management (MDM) is an industry term for the administration of mobile devices, such as smartphones, tablet computers, laptops and desktop computers.

New!!: Trusted Computing and Mobile device management · See more »

Next-Generation Secure Computing Base

The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a cancelled software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity.

New!!: Trusted Computing and Next-Generation Secure Computing Base · See more »

One Laptop per Child

One Laptop per Child (OLPC) is a non-profit initiative established with the goal of transforming education for children around the world; this goal was to be achieved by creating and distributing educational devices for the developing world, and by creating software and content for those devices.

New!!: Trusted Computing and One Laptop per Child · See more »

Open-source model

The open-source model is a decentralized software-development model that encourages open collaboration.

New!!: Trusted Computing and Open-source model · See more »

OpenOffice.org

OpenOffice.org (OOo), commonly known as OpenOffice, is a discontinued open-source office suite.

New!!: Trusted Computing and OpenOffice.org · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Trusted Computing and Operating system · See more »

PrivateCore

PrivateCore is a venture-backed startup located in Palo Alto, California that develops software to secure server data through server attestation and memory encryption.

New!!: Trusted Computing and PrivateCore · See more »

Product bundling

In marketing, product bundling is offering several products or services for sale as one combined product or service package.

New!!: Trusted Computing and Product bundling · See more »

Proof-of-space

Proof-of-space (PoSpace), also called proof-of-capacity (PoC), is a means of showing that one has a legitimate interest in a service (such as sending an email) by allocating a non-trivial amount of memory or disk space to solve a challenge presented by the service provider.

New!!: Trusted Computing and Proof-of-space · See more »

Public interest

Public interest is "the welfare or well-being of the general public".

New!!: Trusted Computing and Public interest · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Trusted Computing and Public-key cryptography · See more »

Richard Stallman

Richard Matthew Stallman (born March 16, 1953), often known by his initials, rms—is an American free software movement activist and programmer.

New!!: Trusted Computing and Richard Stallman · See more »

Ross J. Anderson

Ross John Anderson, FRS, FREng (born 15 September 1956) is a researcher, writer, and industry consultant in security engineering.

New!!: Trusted Computing and Ross J. Anderson · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Trusted Computing and RSA (cryptosystem) · See more »

Samsung

Samsung is a South Korean multinational conglomerate headquartered in Samsung Town, Seoul.

New!!: Trusted Computing and Samsung · See more »

Samsung Knox

Samsung Knox is an enterprise mobile security solution pre-installed in most of Samsung's smartphones, tablets, and wearables.

New!!: Trusted Computing and Samsung Knox · See more »

Scare quotes

Scare quotes (also called shudder quotes,Pinker, Steven. The Sense of Style: The Thinking Person's Guide to Writing in the 21st Century. Penguin (2014) sneer quotes, and quibble marks) are quotation marks a writer places around a word or phrase to signal that they are using it in a non-standard, ironic, or otherwise special sense.

New!!: Trusted Computing and Scare quotes · See more »

Security policy

Security policy is a definition of what it means to be secure for a system, organization or other entity.

New!!: Trusted Computing and Security policy · See more »

Security-Enhanced Linux

Security-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including United States Department of Defense–style mandatory access controls (MAC).

New!!: Trusted Computing and Security-Enhanced Linux · See more »

Server (computing)

In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".

New!!: Trusted Computing and Server (computing) · See more »

Software

Computer software, or simply software, is a generic term that refers to a collection of data or computer instructions that tell the computer how to work, in contrast to the physical hardware from which the system is built, that actually performs the work.

New!!: Trusted Computing and Software · See more »

Subscriber identity module

A subscriber identity module or subscriber identification module (SIM), widely known as a SIM card, is an integrated circuit that is intended to securely store the international mobile subscriber identity (IMSI) number and its related key, which are used to identify and authenticate subscribers on mobile telephony devices (such as mobile phones and computers).

New!!: Trusted Computing and Subscriber identity module · See more »

Tamper resistance

Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or others with physical access to it.

New!!: Trusted Computing and Tamper resistance · See more »

ThinkPad

ThinkPad is a line of laptop computers and tablets developed by Lenovo.

New!!: Trusted Computing and ThinkPad · See more »

Trusted Computing

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.

New!!: Trusted Computing and Trusted Computing · See more »

Trusted Computing Group

The Trusted Computing Group is a group formed by AMD, Hewlett-Packard, IBM, Intel and Microsoft to implement Trusted Computing concepts across personal computers.

New!!: Trusted Computing and Trusted Computing Group · See more »

Trusted Network Connect

Trusted Network Connect (TNC) is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group (TNC-WG) of the Trusted Computing Group (TCG).

New!!: Trusted Computing and Trusted Network Connect · See more »

Trusted Platform Module

Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys.

New!!: Trusted Computing and Trusted Platform Module · See more »

Trusted system

In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy.

New!!: Trusted Computing and Trusted system · See more »

United States Army

The United States Army (USA) is the land warfare service branch of the United States Armed Forces.

New!!: Trusted Computing and United States Army · See more »

United States Department of Defense

The Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces.

New!!: Trusted Computing and United States Department of Defense · See more »

Vendor lock-in

In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services, unable to use another vendor without substantial switching costs.

New!!: Trusted Computing and Vendor lock-in · See more »

Whistleblower

A whistleblower (also written as whistle-blower or whistle blower) is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct within an organization that is either private or public.

New!!: Trusted Computing and Whistleblower · See more »

Windows 7

Windows 7 (codenamed Vienna, formerly Blackcomb) is a personal computer operating system developed by Microsoft.

New!!: Trusted Computing and Windows 7 · See more »

Windows 8

Windows 8 is a personal computer operating system developed by Microsoft as part of the Windows NT family of operating systems.

New!!: Trusted Computing and Windows 8 · See more »

Windows RT

Windows RT is a discontinued mobile operating system developed by Microsoft.

New!!: Trusted Computing and Windows RT · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Trusted Computing and Windows Vista · See more »

X86

x86 is a family of backward-compatible instruction set architectures based on the Intel 8086 CPU and its Intel 8088 variant.

New!!: Trusted Computing and X86 · See more »

Redirects here:

Endorsement key, Remote attestation, Sealed storage, Treacherous Computing, Treacherous computing, Trusted Computing Platform, Trusted computing.

References

[1] https://en.wikipedia.org/wiki/Trusted_Computing

OutgoingIncoming
Hey! We are on Facebook now! »