Intel DQ57TM Intel Desktop Board DQ57TML Technical Product Specification - Page 33
Trusted Platform Module TPM
View all Intel DQ57TM manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 33 highlights
Product Description Inside the firewall, this feature adapts Client Initiated Local Access (CILA); outside the firewall it uses Client Initiated Remote Access (CIRA). This service is triggered in the same manner as Intel RPAT. Many of the features of Intel AMT are available with Intel RPAT and Intel Fast Call for Help. These include Serial-over-LAN, IDE Redirection, KVM Redirection and PC Alarm Clock. NOTE Intel Remote PC Assist Technology requires a vPro technology-enabled computer that has an Intel Remote PC Assist Technology-enabled BIOS, a connection with a power source and the Internet. This service operates via a wired LAN connection only and requires a direct Internet connection (no proxy server) with the ability to connect to external Internet locations (locations outside the local network). A remote service provider supporting the Intel Remote PC Assist Technology must be used to perform remote management. The Intel® Remote PC Assist Wizard application and third party remote management software tools supporting Intel Remote PC Assist Technology must be deployed on the target computer running one of the supported operating systems in order to perform remote management operations. Use of the technology may require configuration by the purchaser. Intel Remote PC Assist Technology is not available in all geographies or on all computer systems. For information about The location of the Intel RPAT header Intel Remote PC Assist Technology Refer to Figure 11, page 45 http://www.intel.com/technology/product/remotepcassist.htm 1.15.2.6 Trusted Platform Module (TPM) The Nuvoton WPCT210 TPM version 1.2 revision 103 component is specifically designed to enhance platform security above-and-beyond the capabilities of today's software by providing a protected space for key operations and other security critical tasks. Using both hardware and software, the TPM protects encryption and signature keys at their most vulnerable stages-operations when the keys are being used unencrypted in plain-text form. The TPM is specifically designed to shield unencrypted keys and platform authentication information from software-based attacks. For information about Nuvoton TPM version 1.2 Refer to http://www.nuvoton-usa.com/ 33