Infineon Announces Trusted Platform Module to Enhance PC Security

May 31, 2005

In an effort to ensure safer computing, Infineon Technologies AG announced availability of its latest Trusted Platform Module (TPM) security microcontroller supporting the main specification 1.2 of the Trusted Computing Group (TCG) at the "Computex 2005" show in Taipei. Infineon is the world’s only supplier to offer an own comprehensive hardware and software solution compliant with the TCG’s 1.2 specification. Its TPM security solution features a secure chip hardware, a complete suite of embedded security and TPM system management utilities as well as application software, which simplify data protection through e. g. file and folder encryption protected with hardware-based key generation and storage. PC manufacturers benefit from Infineon’s TPM offering since it secures all core components of a security subsystem used for authenticity, integrity and confidentiality of data stored.

Integrated on to the motherboard of a stationary or mobile PC, the TPM helps to shield against unauthorized access to the data stored and improves the system integrity. Thus, it enables more secure data storage, online secure business information exchange and online commerce transactions while protecting privacy. As TPM comes in the industry’s smallest package, it is also suitable for integration on mainboards of mobile devices, such as handheld computers and PDAs.

“The TPM 1.2 specification is a sound hardware basis on which to build secure solutions to recognize and prevent unauthorized access to stored data on computers and networks,� said Thomas Rosteck, Senior Director and Product Line Manager Trusted Computing, Chip Card and Security ICs business unit at Infineon Technologies. “Pure software solutions are far from offering the security level of hardware. Infineon’s secure microcontrollers meet the toughest international requirements for security. Combined with its easy-to-use management and application software we are able to offer a secure solution to PC manufacturers and PC users. The company is committed to further contribute its best-in-class hardware security expertise to make PC and laptop computers trustworthy platforms for communication.�

Complete Hardware and Software Solution for Safer Computing; Technical details on Infineon’s TPM (SLB 9635 TT 1.2)

Infineon provides the highest possible performance for TPM systems comprising secure hardware and complete system software and application software. Infineon’s TPM solution is based on the company’s proven family of 16-bit security controllers which was developed for use in high-security chip card applications. To securely and reliably store keys and passwords, Infineon’s TPM offers state-of-the-art security features, such as an active shielding that sends a continuous stream of random data over the surface of the chip. Apart from active shielding, the chip features the true random number generator (RNG), hardware accelerated RSA crypto algorithms (named after its developers Rivest, Shamir, Adleman) with key lengths of up to 2,048 bit and hash algorithms (where a document, file or computer drive is assigned a unique, cryptographically protected checksum which can be used to recognize manipulation) required by the Trusted Computing Group specification.

Infineon’s new TPM compliant with TCG’s 1.2 specification offers 16K bytes of non-volatile memory capacity for user data. It contains also 50 percent more internal working memory, supporting the next-generation operating systems, such as Microsoft Longhorn.

Infineon’s TPM is expected to be compliant with one of the world’s strictest security evaluations conducted according to internationally accepted standards: the Common Criteria EAL 4+ (evaluation assurance level four plus).

In addition to the security controller hardware, Infineon provides computer manufacturers with a proven secure operating system inside the TPM and embedded applications to implement the subsystem. This includes host software API to integrate the TPM into the PC software environment and a TPM management application. In contrast to software solutions, keys and passwords are almost as safe as ones own thoughts once stored into the secure hardware environment of the TPM, where they can be controlled only by its primary user and system administrator. The TPM provides protected storage for secretes, automatically checks system integrity, and can authenticate the platform to third parties if authorized by the primary user.

Major computer manufacturers, such as HP Compaq with its business notebooks and desktops, are already using Infineon’s TPM management software which is also an integral part of the TPM v1.2 solution. It allows easy management of the TPM, provides integrated security applications like Personal Secure Drive encryption and supports secure e-mail correspondence, Wireless LAN security, Virtual Private Networks (VPN), and other use for security issues.

Starting July 2005, Infineon’s TPM compliant with TCG’s 1.2 specification will be available in sample quantities for integration into with desktop systems and notebooks. The TPM will be delivered in a green (lead-free) small low-profile TSSOP-28 package.

More information on Infineon’s TPM solution is available at: www.infineon.com/tpm

Infineon presents its Trusted Platform Module solution at the Computex 2005 show (May 31, to June 4, 2005, Taipei, Taiwan) at booth 722 in hall 1 at Taipei World Trade Center.

Explore further: IBM and Intel bring new security features to the cloud

Related Stories

IBM and Intel bring new security features to the cloud

September 9, 2014

IBM today announced that SoftLayer it will be the first cloud platform to offer its customers bare metal servers powered by Intel Cloud Technology that provides monitoring and security down to the microchip level.

Security chip that does encryption in PCs hacked

February 8, 2010

(AP) -- Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer-security ...

Trust Linux!

November 20, 2009

(PhysOrg.com) -- A team of researchers has implemented support for 'trusted computing' in a commercially available version of the open source operating system Linux, breaking new ground in the global drive toward more secure ...

Microsoft, TCG, Juniper Tie the NAC Knot

May 22, 2007

A lot of vendors selling a lot of components that have to agree on how to measure a lot of things have to come together to make an effective Network Access Control system.

Intel Outlines Latest vPro Platform

March 17, 2007

Intel, which is now gearing up to revamp the vPro platform, officially launched its business desktop platform in April and the technology began to ship to OEMs in September.

Recommended for you

A cataclysmic event of a certain age

July 27, 2015

At the end of the Pleistocene period, approximately 12,800 years ago—give or take a few centuries—a cosmic impact triggered an abrupt cooling episode that earth scientists refer to as the Younger Dryas.

New blow for 'supersymmetry' physics theory

July 27, 2015

In a new blow for the futuristic "supersymmetry" theory of the universe's basic anatomy, experts reported fresh evidence Monday of subatomic activity consistent with the mainstream Standard Model of particle physics.

Dense star clusters shown to be binary black hole factories

July 29, 2015

The coalescence of two black holes—a very violent and exotic event—is one of the most sought-after observations of modern astronomy. But, as these mergers emit no light of any kind, finding such elusive events has been ...

Image: Hubble sees a dying star's final moments

July 31, 2015

A dying star's final moments are captured in this image from the NASA/ESA Hubble Space Telescope. The death throes of this star may only last mere moments on a cosmological timescale, but this star's demise is still quite ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.