Intel DQ77KB Technical Product Specification - Page 40
Intel, Trusted Execution Technology, 11.1.5, Identity Protection Technology, 11.1.6, Intel - tpm
View all Intel DQ77KB manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 40 highlights
Intel Desktop Board DQ77KB Technical Product Specification 1.11.1.4 Intel® Trusted Execution Technology Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects systems against software-based attacks by validating the behavior of key components at startup against a known good source. It requires that Intel VT be enabled and the presence of a TPM. For information about Intel Trusted Execution Technology Refer to http://www.intel.com/content/www/us/en/architectureand-technology/trusted-execution-technology/malwarereduction-general-technology.html 1.11.1.5 Intel® Identity Protection Technology Intel® Identity Protection Technology (Intel® IPT) provides a simple way for websites and enterprises to validate that a user is logging in from a trusted computer. This is accomplished by using the Intel Manageability Engine embedded in the chipset to generate a six-digit number that, when coupled with a user name and password, will generate a One-Time Password (OTP) when visiting Intel IPT-enabled websites. Intel IPT eliminates the need for the additional token or key fob required previously for two-factor authentication. For information about Intel Identity Protection Technology Refer to http://ipt.intel.com 1.11.1.6 Intel Anti-Theft Technology Intel® Anti-Theft (Intel® AT) provides local, tamper-resistant defense that works like a poison pill that disables the computer and access to its data even if the operating system (OS) is reimaged, a new hard drive is installed, or the computer is disconnected from the network. NOTE No computer system can provide absolute security under all conditions. Intel AT requires the computer system to have an Intel® AT-enabled chipset, BIOS, firmware release, software, and an Intel AT-capable Service Provider/ISV application and service subscription. The detection (triggers), response (actions), and recovery mechanisms only work after the Intel® AT functionality has been activated and configured. Certain functionality may not be offered by some ISVs or service providers and may not be available in all countries. Intel assumes no liability for lost or stolen data and/or systems or any other damages resulting thereof. For information about Intel Anti-Theft Refer to http://antitheft.intel.com/welcome.aspx 40