
22
1.13.4
Intel® Identity Protection Technology
Intel® Identity Protection Technology (Intel® IPT) provides a simple way for websites and
enterprises to validate that a user is logging in from a trusted computer. This is accomplished
by using the Intel® Manageability Engine embedded in the chipset to generate a six-digit
number that, when coupled with a user name and password, will generate a One-Time
Password (OTP) when visiting Intel® IPT-enabled websites. Intel® IPT eliminates the need for
the additional token or key fob required previously for two-factor authentication.
For information about
Refer to
Intel® Identity Protection Technology
http://ipt.intel.com
1.13.5
Intel® Platform Trust Technology (PTT)
Intel® PTT is a hardware firmware based TPM 2.0 implementation integrated in Intel®
Management Engine (ME) for credential storage and key management. It provides a secure trust
element to meet Microsoft Windows* 10 requirements for TPM 2.0 and Measured Boot for
systems on which TPM 2.0 is required by Microsoft.
1.13.6
Intel® Software Guard Extensions (SGX)
Intel® Software Guard Extensions (Intel® SGX) provide applications the ability to create hardware
enforced trusted execution protection for their applications’ sensitive routines and data. Run-time
execution is protected from observation or tampering by any other software (including privileged
software) in a system.
1.13.7
Intel® Memory Protection Extensions (MPX)
Intel® Memory Protection Extensions (Intel® MPX) provides a set of hardware features that can be
used by software in conjunction with compiler changes to check that memory references
intended at compile time do not become unsafe at runtime due to buffer overflow or underflow.
1.13.8
Trusted Platform Module (discrete TPM)
Only available on the CD1IV128MK. The TPM version 2.0 component is specifically designed to
enhance platform security above-and-beyond the capabilities of today’s software by providing a
protected space for key operations and other security critical tasks. Using both hardware and
software, the TPM protects encryption and signature keys at their most vulnerable stages—
operations when the keys are being used unencrypted in plain-text form. The TPM shields
unencrypted keys and platform authentication information from software-based attacks.
NOTE
Support for TPM version 2.0 requires a UEFI-enabled operating system.
For information about
Refer to
Nuvoton NPCT650AAAYx
www.nuvoton.com