ACS & SFOR Keystroke Technology into Intel's hardw
Post# of 82672
The below links are directly from ACS (Advanced Cyber Security) and Intel's websites. ACS (which is using Strikeforce' technology) Keystroke encryption is integrated into Intel's Trusted Platform Module AND chip!!!
First ACS' website:
https://docs.wixstatic.com/ugd/5870e3_af261a2...07e37f.pdf
The key paragraph is here:
KTLS™ (Keystroke Transport Layer Security) protocol is currently
integrated in to Intel’s TPM for enterprise endpoint desktop deployments. If Intel (or other) TPM is available for mobile devices KTLS™ protocol can be
deployed.
If a TPM (Trusted Platform Module) chip is available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a TPM Master Key Pair (RSA 2048 public key cryptosystem), which resides on the TPM chip (and never leaves it).
• The encrypted Session Key is stored in secure memory shared by all KTLS™
system components. The TPM Master Key Pair is generated by the TPM chip
every time the computer is powered up. This can be accessed via the NULL
hierarchy.
• If a TPM chip is not available for access to the KTLS™ system components, the Session Key is encrypted/decrypted by a Storage Master Key (AES 256 Key) comprised of a combination of a hard coded part and a randomly generated part.
Now from Intel's website:
https://www.intel.com/content/www/us/en/busin...dware.html
Preparing for new standards
Security compliance standards are becoming ever more stringent. New requirements like those in the General Data Protection Regulation (GDPR) are compelling organizations to continue to improve their security posture and be prepared for audits. Deploying hardware-based security technology like the Intel® Authenticate Solution data encryption will help organizations prepare for these new rules, increasing their ability to meet compliance deadlines while diminishing the likelihood of financial penalties.
Putting security into the silicon
Grounding authentication into the silicon of the hardware itself renders most Trojan-horse attacks ineffective, as stealing a user’s password or breaking through the security software won’t be enough for a hacker to enter the system. Comprehensive authentication needs to be anchored in processing —farther from sight, further from reach—below the software layer, where code is too easily manipulated. This process includes securing in hardware the moment when the user is authenticated and granted access to network services and data . While no security setup is wholly foolproof, adding MFA hardware layers such as those provided with the Intel® Authenticate Solution makes intrusions far less likely to succeed.