Intel DQ77MK Specification page 35

Desktop board
Hide thumbs Also See for DQ77MK:
Table of Contents

Advertisement

®
1.11.1.4
Intel
®
Intel
Trusted Execution Technology (Intel
protects systems against software-based attacks by validating the behavior of key
components at startup against a known good source. It requires that Intel VT be
enabled and the presence of a TPM.
For information about
Intel Trusted Execution Technology
®
1.11.1.5
Intel
®
Intel
Identity Protection Technology (Intel
and enterprises to validate that a user is logging in from a trusted computer. This is
accomplished by using the Intel Manageability Engine embedded in the chipset to
generate a six-digit number that, when coupled with a user name and password, will
generate a One-Time Password (OTP) when visiting Intel IPT-enabled websites. Intel
IPT eliminates the need for the additional token or key fob required previously for
two-factor authentication.
For information about
Intel Identity Protection Technology
1.11.1.6
Intel Anti-Theft Technology
®
Intel
Anti-Theft (Intel
a poison pill that disables the computer and access to its data even if the operating
system (OS) is reimaged, a new hard drive is installed, or the computer is
disconnected from the network.
NOTE
No computer system can provide absolute security under all conditions. Intel AT
requires the computer system to have an Intel
release, software, and an Intel AT-capable Service Provider/ISV application and
service subscription. The detection (triggers), response (actions), and recovery
mechanisms only work after the Intel
configured. Certain functionality may not be offered by some ISVs or service
providers and may not be available in all countries. Intel assumes no liability for lost
or stolen data and/or systems or any other damages resulting thereof.
For information about
Intel Anti-Theft
Trusted Execution Technology
Refer to
http://www.intel.com/content/www/us/en/architecture-
and-technology/trusted-execution-technology/malware-
reduction-general-technology.html
Identity Protection Technology
Refer to
http://ipt.intel.com
®
AT) provides local, tamper-resistant defense that works like
®
Refer to
http://antitheft.intel.com/welcome.aspx
®
TXT) is a hardware security solution that
®
IPT) provides a simple way for websites
®
AT-enabled chipset, BIOS, firmware
AT functionality has been activated and
Product Description
35

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents