Intel BLKDQ45CB Product Guide - Page 20

Intel® Trusted Execution Technology(Intel® TXT

Page 20 highlights

Intel Desktop Board DQ45CB Product Guide • Intel Virtualization Technology (Intel® VT) for Directed I/O (Intel® VT-d) Intel VT-d provides additional performance, security and flexibility by providing the VMM with the following capabilities: ⎯ I/O device assignment: for flexibly assigning I/O devices to VMs and extending the protection and isolation properties of VMs for I/O operations. ⎯ DMA remapping: for supporting independent address translations for Direct Memory Accesses (DMA) from devices. ⎯ Interrupt remapping: for supporting isolation and routing of interrupts from devices and external interrupt controllers to appropriate VMs. ⎯ Reliability: for recording and reporting to system software DMA and interrupt errors that may otherwise corrupt memory or impact VM isolation. NOTE Intel VT requires the use of a processor with Intel VT support. Additionally, a thirdparty VMM may also be required. Intel® Trusted Execution Technology (Intel® TXT) Intel® Trusted Execution Technology (Intel® TXT) is a highly versatile set of hardware extensions to Intel® processors and chipsets that, with appropriate software, enhance the platform security capabilities. Intel TXT will provide a hardware-based security foundation that will help enable greater levels of protection for information stored, processed and exchanged on the PC. Intel Trusted Execution Technology capabilities include: • Protected execution and memory spaces where sensitive data can be processed out of view of any other software. • Sealed storage shields encryption keys and other data from attack while in use or stored. • Attestation enables a system to provide assurance that it has correctly invoked the Intel Trusted Execution Technology environment, as well as enable a verified measurement of the software running in the protected space. • Measured launch capability to help: ⎯ Reduce IT support costs with improved services ⎯ Enable decentralized or remote computing ⎯ Verify platform configuration with a higher level of assurance • Memory protection to help: ⎯ Enhance protection of system resources ⎯ Increase confidentiality and integrity of data ⎯ Improve assurance of data transfers and resources ⎯ Improve protection of sensitive information 20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86

Intel Desktop Board DQ45CB Product Guide
20
Intel Virtualization Technology (Intel
®
VT) for Directed I/O (Intel
®
VT-d)
Intel VT-d provides additional performance, security and flexibility by providing the
VMM with the following capabilities:
I/O device assignment: for flexibly assigning I/O devices to VMs and extending
the protection and isolation properties of VMs for I/O operations.
DMA remapping: for supporting independent address translations for Direct
Memory Accesses (DMA) from devices.
Interrupt remapping: for supporting isolation and routing of interrupts from
devices and external interrupt controllers to appropriate VMs.
Reliability: for recording and reporting to system software DMA and interrupt
errors that may otherwise corrupt memory or impact VM isolation.
NOTE
Intel VT requires the use of a processor with Intel VT support.
Additionally, a third-
party VMM may also be required.
Intel
®
Trusted Execution Technology
(Intel
®
TXT)
Intel
®
Trusted Execution Technology (Intel
®
TXT) is a highly versatile set of hardware
extensions to Intel
®
processors and chipsets that, with appropriate software, enhance
the platform security capabilities. Intel TXT will provide a hardware-based security
foundation that will help enable greater levels of protection for information stored,
processed and exchanged on the PC.
Intel Trusted Execution Technology capabilities include:
Protected execution and memory spaces where sensitive data can be processed out
of view of any other software.
Sealed storage shields encryption keys and other data from attack while in use or
stored.
Attestation enables a system to provide assurance that it has correctly invoked the
Intel Trusted Execution
Technology environment, as well as enable a verified
measurement of the software running in the protected space.
Measured launch capability to help:
Reduce IT support costs with improved services
Enable decentralized or remote computing
Verify platform configuration with a higher level of assurance
Memory protection to help:
Enhance protection of system resources
Increase confidentiality and integrity of data
Improve assurance of data transfers and resources
Improve protection of sensitive information