Difference between revisions of "Embedded Security Subsystem"
(added some links) |
|||
Line 10: | Line 10: | ||
==Related Links== | ==Related Links== | ||
− | *[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage Technologies Embedded Security Subsystem page] | + | *[http://www.pc.ibm.com/us/think/thinkvantagetech/security.html IBMs ThinkVantage<sup>TM</sup> Technologies Embedded Security Subsystem page] |
− | *[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess& IBMs ThinkVantage Technologies Flash presentation - Embedded Security Subsystem] | + | *[http://www.pc.ibm.com/presentations/us/thinkvantage/56/index.html?shortcut=ess& IBMs ThinkVantage<sup>TM</sup> Technologies Flash presentation - Embedded Security Subsystem] |
*[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page] | *[http://www.research.ibm.com/gsal/tcpa/ IBM Research TCPA resources page] | ||
[[Category:R30]] [[Category:R31]] [[Category:R32]] [[Category:R40]] [[Category:R50]] [[Category:R50p]] [[Category:R51]] [[Category:R51p]] [[Category:T23]] [[Category:T30]] [[Category:T40]] [[Category:T40p]] [[Category:T41]] [[Category:T41p]] [[Category:T42]] [[Category:T42p]] [[Category:X23]] [[Category:X24]] [[Category:X30]] [[Category:X31]] [[Category:X40]] | [[Category:R30]] [[Category:R31]] [[Category:R32]] [[Category:R40]] [[Category:R50]] [[Category:R50p]] [[Category:R51]] [[Category:R51p]] [[Category:T23]] [[Category:T30]] [[Category:T40]] [[Category:T40p]] [[Category:T41]] [[Category:T41p]] [[Category:T42]] [[Category:T42p]] [[Category:X23]] [[Category:X24]] [[Category:X30]] [[Category:X31]] [[Category:X40]] |
Revision as of 02:44, 3 December 2004
The Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks confirming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:
- public key functions
- trusted boot functions
- initialization and management functions
The purpose of the whole thing is to keep the users sensitive data out of range from software based attacks (like viruses, internet attacks etc.). One way the chip offers to achieve this is by providing storage for keys along with the neccessary functions to handle them within itself, so that a i.e. a private key never has to leave the chip (can't be seen to any piece of software). Besides this there are more complex topics covered by the functionality of the chip. If you want to find out more about it you can find good documents on the IBM Research TCPA resources page.
Linux Support
A linux driver is available, but it's converage of functionality is unknown so far.