Embedded Systems Conference to highlight Trusted Computing
Sep 8, 2004 — by LinuxDevices Staff — from the LinuxDevices Archive — viewsDevelopers attending next week's Embedded Systems Conference in Boston will have the opportunity to see Trusted Computing components and applications in action, and learn how to design secure systems and devices using Trusted Computing specifications, in a special Embedded Security Seminar hosted by the Trusted Computing Group.
The Trusted Computing Group (TCG) is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies — including hardware building blocks and software interfaces — across multiple platforms, peripherals, and devices. As embedded devices, smart sensors and other intelligent controllers become pervasive on wired and wireless networks, security is increasingly critical, the group says.
On Monday, Sept. 13, at the Embedded Security Seminar, TCG will host a panel session and four classes focused on implementations of TCG specifications. Technologists from Arcom, Atmel, IBM, Intel, Safenet, and Wave Systems will discuss challenges and solutions for security in embedded systems. On Tuesday and Wednesday the TCG booth (#1227) will host demonstrations of Trusted Computing hardware and applications suitable for embedded systems:
- Atmel — which is shipping Trusted Platform Module (TPM) chips that store passwords, digital keys, and certificates on systems — will demonstrate Windows and Linux development environments and working gaming systems incorporating TPMs.
- IBM's Pervasive Computing division and Arcom will show the Arcom VIPER single-board computer, an XScale-based embedded controller with an add-on module supporting a Trusted Platform Module (TPM) chip. The system demonstrates an RFID application with integrated Trusted Computing software.
- Intel's demonstration incorporates platform authentication and platform configuration reporting with network access over a wireless 802.11a/b/g link. A client platform with a Trusted Platform Module (TPM) and 802.11b wireless interface connects to a wireless access point which in turn connects to a RADIUS server to verify the client credentials.
This article was originally published on LinuxDevices.com and has been donated to the open source community by QuinStreet Inc. Please visit LinuxToday.com for up-to-date news and articles about Linux and open source.