Protecting your identity and business data stored in the cloud requires strong authentication that is ideally rooted in hardware. Hardware-based authentication is widely regarded by security experts as a more effective approach than software-only authentication.
Intel has built tamper-resistant, two-factor authentication directly into the processors of PCs based on select 3rd generation Intel® Core™ vPro™ processors. Intel® Identity Protection Technology (Intel® IPT)1 helps prevent unauthorized access to your important personal and business accounts while reducing the cost of traditional hardware solutions. It also provides a simple way for web sites and businesses to validate that a user is logging in from a trusted PC.
Intel® IPT protects network and web site access points by providing enterprises with two ways to validate that a legitimate user—not malware—is logging in from a trusted platform. One option utilizes a one-time password (OTP), a unique, one-time use, six-digit number generated every 30 seconds from an embedded processor that is tamper-proof and operates in isolation from the operating system.1 Moreover, because the credential is protected inside the chipset, it cannot be compromised by malware or removed from the PC.
The second way Intel® IPT provides access point protection employs public key infrastructure (PKI). Enterprises already using PKI to protect their access points can further benefit from Intel IPT with PKI. This technology embeds a PKI certificate in the chipset, similar to the OTP credential. Providing hardware-level security, Intel IPT with PKI can help save enterprises the additional cost of supporting traditional smart card or token storage options.
In addition to protecting web site and network access points, Intel® IPT includes an encrypted I/O technology, protected transaction display. This technology works in conjunction with Intel IPT for OTP or PKI to confirm user presence, verify transactions, and protect a PC’s display from malware scraping by first creating a secure PIN input prior to the release of credentials.
1. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT)–enabled system, including a 2nd or higher generation Intel® Core™ processor, an enabled chipset, firmware, software, and participating web site. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.