Intel Virtualization Technology; Intel Trusted Execution Technology; Intel Fast Call For Help; Trusted Platform Module (Tpm) - Intel DQ67SW Product Manual

Desktop board
Hide thumbs Also See for DQ67SW:
Table of Contents

Advertisement

Intel Desktop Board DQ67SW Product Guide
®
Intel
Virtualization Technology
Intel VT is a processor technology that enables a platform to run multiple operating
systems and applications as independent machines, allowing one computer system to
function as multiple "virtual" systems. It also provides the "assisted hardware
virtualization" required by some operating systems for backward compatibility, such as
Windows XP Mode for Microsoft Windows 7.
NOTE
Intel VT requires an Intel processor that supports Intel VT.
®
Intel
Trusted Execution Technology
Intel TXT helps protect the platform against software-based attacks and preserves the
confidentiality and integrity of the data created and stored on the system. It
accomplishes this by using a measured launch and leveraging Intel VT to produce a
protected environment for the execution of sensitive applications.
NOTE
Intel TXT requires an Intel processor that supports Intel TXT.
®
Intel
Fast Call for Help
Intel Fast Call for Help supplies remote maintenance connectivity for the Enterprise
user inside or outside the corporate firewall. Coupled with your enterprise's
Management Presence Server, it provides both reactive and proactive maintenance.
Inside the firewall, this feature adapts Client Initiated Local Access (CILA); outside the
firewall it uses Client Initiated Remote Access (CIRA).
Many of the features of Intel AMT are available with Intel Fast Call for Help. These
include Serial-over-LAN, IDE Redirection, KVM Remote Control, and PC Alarm Clock.
For more information about Intel Fast Call for Help, go to
us/articles/fast-call-for-help-overview/.

Trusted Platform Module (TPM)

The Nuvoton* WPCT210 TPM 1.2, revision 103 component on Intel Desktop Board
DQ67SW is designed to enhance platform security above-and-beyond the capabilities
of today's software by providing a protected space for key operations and other
security critical tasks. Using both hardware and software, the TPM protects encryption
and signature keys at their most vulnerable stages—operations when the keys are
being used unencrypted in plain-text form. The TPM is specifically designed to shield
unencrypted keys and platform authentication information from software-based
attacks.
For information about enabling and activating the TPM, refer to the Trusted Platform
Module (TPM) Quick Reference Guide included with the board.
28
http://software.intel.com/en-

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents