A new take on computer security

December 08, 2010

What if you were required to manually enter a password each time you wanted to use a program on your computer? This is exactly the kind of measure we, as technology users, should consider taking up in order to protect ourselves from a complex cyberspace, prey to attacks from all sides. The MEDEA+ Trusted Secure Computing project set out to develop a family of components and software able to efficiently secure our computing, communication and multimedia devices. The innovations developed in the project embrace integrity management, user identification/authentication, as well as privacy management.

In the IT jargon, a trusted security device is a piece of hardware component we all rely on for our computer's security. Current security and privacy methods are mainly based on specific add-on software or specially tailored protection hardware, but this project goes much further. "Protection mechanisms must be present in all system layers from basic hardware, to the basic input/output system (BIOS) and including the operating system" says Jean-Pierre Tual, the project's leader and Director of Industrial Relations at Gemalto. Moreover, the components developed in the project, have been designed in a way that make them compatible with future generations of online connected personal devices - this includes everything from personal digital assistants, TV set-top boxes, Internet services, professional radio, personal video recorders and mobile phones.

Keeping Europe ahead of the competition

Originally launched in mid-2007, the project had two main objectives: "to develop a family of embedded silicon components enforcing secure and trusted computing and to propose a European alternative to US- initiatives related to trusted computing standards while keeping interoperability with some already existing approaches. The TSC project established a solid industrial and academic partnership and the Consortium's ability to cover a wide variety of areas equally and comfortably enabled the project to reach its objectives with rather limited resources.

"It is very satisfying to now have more than ten different applications making full use of components for securing and enforcing privacy in numerous applications or services, pertaining to a large set of day to day activities, in both personal and professional areas" says Mr. Tual. Demonstrators were able to display, for example, direct transcoding of digital-rights information from Blue-ray to DVD recorders, file-transfer control in entertainment networks and anonymity management in a 3G mobile phone. Philips and Gemalto, some of the major industry players involved in the project have already included the new technology in their general offer.

90% of laptops already equipped

Millions of people are regularly downloading applications onto their smartphone. It is essential, whilst making the most of a selection of applications, to guarantee the safety of the vast amount of personal information that a smartphone is able to hold. For example, the mobile, anonymous, access-control services (MACCS) system developed by Orange and Gemalto enables mobile-phone users access to a higher level of security. This privacy enhancing solution also finds applications in other fields such as ticket-based services including transport or cultural and events. The corresponding market is expected to explode from 2011 onwards.

The exploitation of the project results in fact already well on its way: at the moment, about 90% of laptops are equipped with a trusted processor module (TPM), and TSC has helped STMicroelectronics, one of the main partners in the project, to maintain its leadership in a market in which European Union countries hold over a 70% market share. STMicroelectronics also plans to sell the new TPM solutions to most personal computer (PC) manufacturers from Asia and the USA and is expecting important return on investment linked to the boom of new Internet linked devices to come.

Taking the public sector on board

Interestingly, many partners in the project, mainly French and Spanish on their hand will exploit project results in their multilevel security systems targeting not only companies but also the public sector through e-government and e-services applications. The hardware modules developed by Bull, another project participant, will be used in the coming years for the delivery of electronic passports.

The MEDEA+ TSC project brought a decisive contribution in securing the competitive power of the European industry in a wide range of key industrial sectors (computer, mobile, professional radio, consumer sector) where security and trust are becoming a decisive appreciation factor for the users. In their own individual ways, The EUREKA Project's partners each made the most of the extraordinary results of this major project, and succeed in providing every type of consumer with improved trusted computing.
-end-


EUREKA

Related Computer Articles from Brightsurf:

UCLA computer scientists set benchmarks to optimize quantum computer performance
Two UCLA computer scientists have shown that existing compilers, which tell quantum computers how to use their circuits to execute quantum programs, inhibit the computers' ability to achieve optimal performance.

Digitize your dog into a computer game
Researchers from CAMERA at the University of Bath have developed motion capture technology that enables you to digitise your dog without a motion capture suit and using only one camera.

Stabilizing brain-computer interfaces
Researchers from Carnegie Mellon University (CMU) and the University of Pittsburgh (Pitt) have published research in Nature Biomedical Engineering that will drastically improve brain-computer interfaces and their ability to remain stabilized during use, greatly reducing or potentially eliminating the need to recalibrate these devices during or between experiments.

Computer-generated genomes
Professor Beat Christen, ETH Zurich to speak in the AAAS 2020 session, 'Synthetic Biology: Digital Design of Living Systems.' Christen will describe how computational algorithms paired with chemical DNA synthesis enable digital manufacturing of biological systems up to the size of entire microbial genomes.

Computer-based weather forecast: New algorithm outperforms mainframe computer systems
The exponential growth in computer processing power seen over the past 60 years may soon come to a halt.

A computer that understands how you feel
Neuroscientists have developed a brain-inspired computer system that can look at an image and determine what emotion it evokes in people.

Computer program looks five minutes into the future
Scientists from the University of Bonn have developed software that can look minutes into the future: The program learns the typical sequence of actions, such as cooking, from video sequences.

Computer redesigns enzyme
University of Groningen biotechnologists used a computational method to redesign aspartase and convert it to a catalyst for asymmetric hydroamination reactions.

Mining for gold with a computer
Engineers from Texas A&M University and Virginia Tech report important new insights into nanoporous gold -- a material with growing applications in several areas, including energy storage and biomedical devices -- all without stepping into a lab.

Teaching quantum physics to a computer
An international collaboration led by ETH physicists has used machine learning to teach a computer how to predict the outcomes of quantum experiments.

Read More: Computer News and Computer Current Events
Brightsurf.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com.