
The BIOS also allows the system owner to clear and reset these keys.
13
The
chip’s cryptographic functions, trusted boot functions, and initializa-
tion and management functions are hardware based. The chip’s func-
tionality is established through the BIOS, and the chip uses its own
firmware and circuits for processing operations.
Final Comments
Tr usted hardware is the foundation for trusted systems. IBM’s ESS 2.0
chip provides stronger user authentication, device validation, and system
integrity, and therefore greater system trust. ESS 2.0 is based on open
standards for an integrated circuit chip that stores cryptographic keys,
digital certificates, and ...