Examples of using Trusted computing in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Trusted Computing.
All OPTIGA™ TPM products comply with the Trusted Computing Group(TCG) standards.
Trusted Computing Group.
Features new to WindowsVista Windows Vista I/O technologies Trusted Computing.
Trusted Computing Group.
Both of these devices implement version 1.2 of the Trusted Computing Group TPM specification.
Trusted Computing Group.
We offer state-of-the-art sensors, trusted computing solutions, as well as protection devices.
Trusted Computing Management Server.
The proponents of this schemehave given it names such as"trusted computing" and"palladium".
The Trusted Computing Group.
The proponents of this schemehave given it names such as"trusted computing" and"palladium".
The Trusted Computing Alliance.
One potential way out of thisquagmire is the work being done by the Trusted Computing Group, or TCG.
Trusted Computing could be used to combat cheating in online games.
She is active in standards development andis on the board of directors of the Trusted Computing Group.
The so-called Trusted Computing is a back door for the NSA.
To accelerate strong security for IoT,the IoT Sub Group provides guidance on how Trusted Computing can be used for securing IoT.
Can the Trusted Computing Alliance withstand the industrialization test….
Our patents are foundational to modern Internet security and trusted computing, and result from years of internal research and development.
The Trusted Computing Group(TCG) estimates that more than 600 million PCs using a TPM were shipped until today.
The Infineon TCMS software enables enterprise customers to easily deploy and manage TPM-equipped PCs,enabling a fully“trusted computing” experience for the user.
Trusted Computing(sometimes more accurately called"Treacherous Computing") means a computer can only run"Trusted" Software.
The UV500 provide 256-bit AES Hardware-based encryption andsupport for the Trusted Computing Group(TCG) Opal 2.0 security policy standard.
The Trusted Computing Group has developed a number of specifications aimed at preventing cloning or corrupting of individual computers in a network.
The license grants Nokia worldwide access to Intertrust's broad portfolio ofinventions in the areas of digital rights management(DRM) and trusted computing.
The“base layer” of trusted computing, record-keeping and processing of transactions can be compared to the base layer of the TCP/IP/ andHTTP.
Currently I'm working on something Mike Hearn suggested, using the security features of modern processors,designed to support"Trusted Computing", to harden Bitcoin wallets.
Trusted Computing would allow companies to create a digital rights management(DRM) system which would be very hard to circumvent, though not impossible.
Further, they state that Trusted Computing will allow computers and servers to offer improved computer security over that which is currently available.