Tag

TPM

1 views collected around this technical thread.

Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

ARM TrustZoneIoT SecuritySecure Boot
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
Architects' Tech Alliance
Architects' Tech Alliance
May 20, 2020 · Information Security

Introduction to Trusted Computing, TPM, Server OS, and RAID Fundamentals

This article provides an overview of trusted computing concepts such as TPM and TCM, explains server operating system basics, details RAID card principles, disk cache protection, and connections, and includes references and resources for further study.

Information SecurityRAIDServer OS
0 likes · 6 min read
Introduction to Trusted Computing, TPM, Server OS, and RAID Fundamentals