Trusted Computing

PDF DownloadA Trusted Computing hardware identifier may be able to tell whether a device has started up securely, but not whether the programs on it are trustworthy. For that, the operating system (OS) must follow the Trusted Computing specification, which won’t include guidelines for the OS until the next release.

What is it? A specification to increase network security by building unique hardware IDs into computing devices.

Where did it come from? The Trusted Computing Platform Alliance (TCPA), a group formed by Compaq, HP, IBM, Intel and Microsoft in October 1999. Its first specification, released in September 2001, is currently at version 1.1b. The next version, 1.2, will incorporate the guidelines for operating-system support.

Primer Reference: Inside a Trusted PCHow does it work? A processor with a unique identifier and storage capabilities, called the Trusted Platform Module (TPM), is built into a computing device during manufacturing. When the device is turned on, the TPM queries the system to ensure the computer is running in a trusted state (see diagram, left).

The overall specification requires that the TPM be able to:

  • determine and announce whether the computer is running only the expected software and is free from viruses, keyboard snoopers and similar programs.
  • authenticate the platform to third parties. In a corporate environment, this means identifying the hardware of each device that logs onto the corporate network.
  • encrypt files so that they can be opened only on that platform.

Does this mean I don’t need biometrics? Unfortunately, no. If an unauthorized party can boot up your computer, say, by stealing your passwords, trusted computing provides no extra protection.

What’s available today? IBM is currently shipping the first computers with a TCPA-compliant hardware module called the Embedded Security Subsystem. It’s available as a $25 option (or less, if you buy more than one) on many ThinkPad notebooks and NetVista Desktops. These computers provide two of the key benefits of Trusted Computing: the ability to remotely verify identification, and the ability to encrypt files that can only be decrypted on that computer.

But there are no commercially available network products that can query the remote computer and determine its identity; at this point, you’ll have to roll your own. IBM representatives predict several vendors will release commercial systems by year’s end.

Wait, doesn’t Microsoft do this? Well, sort of. Palladium, Microsoft’s security initiative, has many of the same goals as Trusted Computing. Publicly, Microsoft has stated that Palladium is not an implementation of the TCPA spec. That may be, but Palladium requires a hardware module called the “Security Support Component (SSC)”—which sounds very similar to a Trusted Platform Module—and will likely only appear on motherboards in response to an industrywide standard.

For its part, TCPA claims it is operating system-agnostic, but members admit that without operating system support, they can only ensure a trusted state through boot-up. Given that Windows is—and will likely continue to be—the dominant OS going forward, the groups need one another if they want to realize their respective visions.

This sounds scary. The thought of Microsoft at the helm of datasecurity and system integrity has sparked fears that Microsoft would prevent other vendors’ programs from running on Palladium-equipped systems, prevent users from ripping CD tracks or other exercises of fair use, or arbitrarily revoke your license to run programs on your computer. For its part, Microsoft has continually denied that Palladium could even be used to enforce software licensing, but the fears persist.

Whatever Palladium turns out to be, it won’t be soon. Originally scheduled for release as early as 2004, most published reports have Palladium pushed back to 2006 or later.

Think your company’s computers are too trusting? Take our Quiz to help gauge the right level of security for you.