Intel DC53427HYE Technical Product Specification - Page 38

Intel, Trusted Execution Technology, 11.1.5, Identity Protection Technology, 11.1.6, Intel - firmware

Page 38 highlights

Intel NUC D53427RKE Technical Product Specification 1.11.1.4 Intel® Trusted Execution Technology Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects systems against software-based attacks by validating the behavior of key components at startup against a known good source. It requires that Intel VT be enabled and the presence of a TPM. For information about Intel Trusted Execution Technology Refer to http://www.intel.com/content/www/us/en/architectureand-technology/trusted-execution-technology/malwarereduction-general-technology.html 1.11.1.5 Intel® Identity Protection Technology Intel® Identity Protection Technology (Intel® IPT) provides a simple way for websites and enterprises to validate that a user is logging in from a trusted computer. This is accomplished by using the Intel Manageability Engine embedded in the chipset to generate a six-digit number that, when coupled with a user name and password, will generate a One-Time Password (OTP) when visiting Intel IPT-enabled websites. Intel IPT eliminates the need for the additional token or key fob required previously for two-factor authentication. For information about Intel Identity Protection Technology Refer to http://ipt.intel.com 1.11.1.6 Intel Anti-Theft Technology Intel® Anti-Theft (Intel® AT) provides local, tamper-resistant defense that works like a poison pill that disables the computer and access to its data even if the operating system (OS) is reimaged, a new hard drive is installed, or the computer is disconnected from the network. NOTE No computer system can provide absolute security under all conditions. Intel AT requires the computer system to have an Intel® AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription. The detection (triggers), response (actions), and recovery mechanisms only work after the Intel® AT functionality has been activated and configured. Certain functionality may not be offered by some ISVs or service providers and may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For information about Intel Anti-Theft Refer to http://antitheft.intel.com/welcome.aspx 38

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Intel NUC D53427RKE Technical Product Specification
38
1.11.1.4
Intel
®
Trusted Execution Technology
Intel
®
Trusted Execution Technology (Intel
®
TXT) is a hardware security solution that
protects systems against software-based attacks by validating the behavior of key
components at startup against a known good source.
It requires that Intel VT be
enabled and the presence of a TPM.
For information about
Refer to
Intel Trusted Execution Technology
and-technology/trusted-execution-technology/malware-
reduction-general-technology.html
1.11.1.5
Intel
®
Identity Protection Technology
Intel
®
Identity Protection Technology (Intel
®
IPT) provides a simple way for websites
and enterprises to validate that a user is logging in from a trusted computer.
This is
accomplished by using the Intel Manageability Engine embedded in the chipset to
generate a six-digit number that, when coupled with a user name and password, will
generate a One-Time Password (OTP) when visiting Intel IPT-enabled websites.
Intel
IPT eliminates the need for the additional token or key fob required previously for
two-factor authentication.
For information about
Refer to
Intel Identity Protection Technology
1.11.1.6
Intel Anti-Theft Technology
Intel
®
Anti-Theft (Intel
®
AT) provides local, tamper-resistant defense that works like
a poison pill that disables the computer and access to its data even if the operating
system (OS) is reimaged, a new hard drive is installed, or the computer is
disconnected from the network.
NOTE
No computer system can provide absolute security under all conditions. Intel AT
requires the computer system to have an Intel
®
AT-enabled chipset, BIOS, firmware
release, software, and an Intel AT-capable Service Provider/ISV application and
service subscription. The detection (triggers), response (actions), and recovery
mechanisms only work after the Intel
®
AT functionality has been activated and
configured. Certain functionality may not be offered by some ISVs or service
providers and may not be available in all countries. Intel assumes no liability for lost
or stolen data and/or systems or any other damages resulting thereof.
For information about
Refer to
Intel Anti-Theft