Here's how Palladium works
By Robert Lemos
Special to ZDNet
November 7, 2002, 5:21 AM PT
URL:
http://zdnet.com.com/2100-1104-964902.html
Computers that incorporate Palladium or the TCPA design should have a range of new functions, from preventing piracy to protecting corporate information. Several steps are involved, which are outlined below.
Prevent piracy
? Jeff wants to download the latest music CD.
? When Jeff tries to retrieve the music from a legitimate music site, the server checks to make sure his PC is trusted.
? Once his PC is OK'd, Jeff downloads the music, key parts of which are coded to his computer.
? Jeff can listen to the music, but if he tries to send it to someone else's PC, it won't play.
Protect corporate info
? Jeff wants to send the latest marketing plan to his employees, but wants to ensure the information isn't leaked.
? His e-mail software codes the message so it can only be opened on a trusted PC and restricts the message so it can't be forwarded or printed.
? The message is sent to employees.
? Employees can read the message, but their own trusted e-mail client won't let them forward or print it.
Limit Internet attacks
? An attacker who wants to take over Jeff's system may send Jeff a Trojan horse, a malicious program that appears to be benign.
? Thinking the program is a fun utility, Jeff runs the Trojan horse.
? The Trojan horse runs and perhaps accesses some unprotected data.
? As long as Jeff doesn't run the program in the PC's trusted environment, any protected data is still restricted.
Restrict applications
? Jeff writes a letter using a particular application, say Microsoft Word.
? Word could use the trusted PC's functions to encrypt the letter, blocking other applications from accessing it.
? Jeff decides to switch to another application, say Corel's WordPerfect.
? While WordPerfect can understand the format in which the letter is saved, it can't open the letter, because it is protected.