Hey there! Thanks for dropping by Theme Preview! Take a look around
and grab the RSS feed to stay updated. See you around!

After many months of deliberation, the Trusted Computing Group has finally announced that it has finalized the draft specifications for incorporating built-in encryption and security services directly into hard drives and other storage devices. Trusted Storage is part of a new generation of security protocols that are built directly into hardware, and includes devices such as Intel's Trusted Platform Module (TPM). While the Trusted Storage Group says that the specs for Trusted Storage may change slightly from the draft version, they are final enough for both hardware and software developers to start building devices and applications that support the specification right now. The official specs are referred to as "Version 1.0, Revision 0.9—draft" in accordance with traditional storage-related standards. 老域名出售

The new spec allows the creation of "trusted storage units" on hard drives and other media, where only approved applications are allowed to read and write data. These units are stored on hidden partitions that are not viewable by standard drive partitioning software. Data stored on the trusted partitions can only be accessed when the drive receives a signal from the CPU that it is authorized to access the data on the hard drive. The drive then responds with a signal that confirms that it is in fact the same hard drive that the computer believes it is accessing. The drives do not require that the computer in question have a TPM module on the motherboard, but if one is present it extends the "trust boundary" of the platform, providing additional security against tampering.

The new guidelines include built-in encryption and decryption, handled by hardware on the hard drive itself. Security functions in the specification include public-key encryption, digital signatures, hashing functions, and random number generation. Of course, these sorts of technologies are not new, and software-based encryption schemes have been around for a while now: some of the more interesting ones even have the concept of hidden partitions that can't easily be discovered by casual inspection. Still, the idea of creating hardware-based solutions such as Trusted Storage is to make such technologies more mainstream and acceptable for business users, who are often concerned about the leaking of confidential data. Data removed from a Trusted Storage unit by traditional means cannot be read on other computers.

The Trusted Storage specification was developed by 60 of the Trusted Computing Group's 175 member companies. Devices ranging from hard drives to optical storage that support Trusted Storage are expected to appear on the market in the upcoming months. IBM and Lenovo, two of the biggest promoters of the Trusted Computing Group, are expected to be among the first to release devices that support Trusted Storage. No other companies have as of yet announced support for the standard, but other members of the TCG such as Hitachi, Seagate, SanDisk, and Western Digital are likely to incorporate support into their products as well.


Both comments and pings are currently closed.

Comments are closed.