Microsoft's Palladium: A New Security Initiative
Ziff Davis Media
ExtremeTech
HOME | MY EXTREMETECH | SIGN IN Already a Member? Sign in   Not a member? Join Now.
 
Home > Technology News > Microsoft's Palladium: A New Security Initiative
Microsoft Security

Microsoft's Palladium: A New Security Initiative

  TABLE OF CONTENTS
Palladium Clues May Lie In AMD Motherboard Design
•  Microsoft's Palladium: A New Security Initiative
    Introduction
    Compliant Hardware
    Privacy and Digital-Rights Management
"Palladium": Microsoft Revisits Digital-Rights Management
Microsoft's Palladium: Security for whom?
OPTIONS
save  Save this article
discuss  Discuss (98 posts)
 Print
 E-mail
 
In a move that seeks to extend Microsoft's newfound company-wide focus on security to future versions of the Windows operating system and to hardware products, Microsoft officials are discussing a new initiative, code-named Palladium.

Palladium involves new security components to be built into Windows, but it also depends heavily on hardware makers--including Intel and AMD--building in Palladium functionality to their products. While none of the new features and products will arrive this year, the effort appears to be a large-scale push toward a new breed of software- and hardware-driven security standards.

Mario Juarez is group product manager of the Palladium product team at Microsoft. Juarez's team falls under the Windows operating system group. "Palladium is a code name for a set of features for the Windows operating system," said Juarez. "It involves a new breed of hardware and applications in tandem with a rearchitecture of the Windows operating system. It's designed to give people greater security, personal privacy and system integrity."

ADVERTISEMENT

In addition to new core components in Windows that will move the Palladium effort forward, Microsoft is working with hardware partners to build Palladium components and features into their products. "The new hardware architecture involves some changes to CPUs which are significant from a functional perspective," says Juarez. "There will also be a new piece of hardware called for by Palladium that you might refer to as a security chip. It will provide a set of cryptographic functions and keys that are central to what we're doing. There are also some associated changes under the chipset, and the graphics and I/O system through the USB port--all designed to create a comprehensive security environment."

The approach outwardly seems to mimic that of the Trusted Computing Platform Alliance, whose specification was finalized in January 2001. TCPA calls for the creation of a "Trusted Platform Module"(TPM), a discrete cryptographic processor residing on the PC's motherboard that contains a unique digital signature.

Palladium, on the other hand, uses a PC's microprocessor to run some form of low-level encryption, and can also use a TPM-like module for additional encryption, according to Geoffrey Strongin, AMD's platform security architect.

  DISCUSSIONS
GoodOlMike: The sorriest thing is that a very complacent computer press and a large marketing budget will probably convince a lot of people to buy into this idiot box.
view full post
twistedtech: Better go stockpile all old legacy devices without any built in protection. If this ever does happen, those will probably become hot items.
view full post
AlfredM: I think a whole lot is being assumed here, esp. for info coming from a story that hasnt even been confirmed. I can't stand it when people jump to conclusions and assume the worst from the smallest bit of information.
view full post

"When you fire the system up," Juarez says, "you'll choose to run this particular 'secure processing environment' which we call the Trusted Operating System Root. You might think of this as a micro-kernel that manages trusted code in a way that's physically isolated from the rest of the system, so it's inherently impervious to things like viruses."

Via the Trusted Operating System Root, says Juarez, users will be able to create and deploy secure services through software agents. "You can create an environment where you determine what information about you gets revealed to others, such as personal information in an online transaction, or information about your hardware that needs to be revealed to a network you're operating with. We're trying to create this in such a way that there is no architectural limitation on what you can get these agents to do."

Cryptography is key to the effort with the software agents, Juarez says. "We're looking at the usual suspects there, including current deployments of public-key cryptography as well as some powerful symmetrical processing cryptography systems. However, we're going to try to approach cryptography in a new and powerful way."

    next >  
discuss Discuss this now (98 posts)

  RELATED ARTICLES
 •   Microsoft's Palladium: Security for whom?
 •   "Palladium": Microsoft Revisits Digital-Rights Management

  MOST RECENT
 •   Transmeta Jumps On Tablet PC Bandwagon
 •   Tablet PC Lives On, According to Raikes
 •   OpenSSH Hole Exposes Servers
 •   Microsoft Issues Second Wireless Networking Beta
 •   RIM Offers More Flavors of BlackBerry


TOP TIP more >  
Did I kill the PC I just built?
HOT STORIES   
•  ExtremeTech Syscheck: Security You Need Now
•  Optimize Windows XP
•  64-Bit CPUs: What You Need to Know
•  Exploiting/Protecting 802.11b Wireless Networks
•  Interconnect Conundrum
DOWNLOADS more >  
•  CookieCop 2: Download It Here
•  FindOrphans: Sweep Away the Scraps
•  DiskPie 2: Optimize your hard drive
TOP DISCUSSIONS more >  
•  Purchasing a laptop
•  Font help needed in Mandrake!
•  Open, Closed Source Security Equal?
•  So how is NeverWinter Nights?
•  Most prolific posters 6/17 - 6/23 2002
PCMag.com Career Center
PCMag.com Career Center Looking for employment in the
tech arena? Have a job opening to post?

Check out PCMag.com's
Career Center
Powered by Monster.com
NEWSLETTERS
Get ExtremeTech's FREE online newsletters.
ExtremeTech Daily
ExtremeTech Weekly
CTO: Core Technologies Online
ExtremeTech Security
Preferred e-mail format:  
   

View all newsletters >  


FREE ONLINE SEMINARS FOR IT PROFESSIONALS
6/18: Saving Time for AutoCAD Users
6/20: A Better Way to Deploy!

 
 
 
  ADVERTISING
  PARTNER SERVICES
Dell Home Systems
Click here for Micron PC
  
Shop Now! - Dell Home Solutions Center

Click here for Micron PC

  
Save on RAM upgrades! Get 10% off and free shipping at Crucial.com

Great Deal! Dell™ has an upgrade you won't want to miss!

Get Novell NetWare 6
Now your network is just a browser away.

Win $25,000 from Nvidia and Gateway

Novell Access and Security, protect your Network.

WIN fast, full throttle COLOR!

Dell Deals - Small Business Specials

Why buy Diskeeper when there's a defragmeter in Windows?

ExtremeTech: Customer Service - Contact Us - About - Advertise
Ziff Davis Media: About | Advertise | Newsletters | Magazine Subscriptions | eSeminars | Feedback

Baseline | CIO Insight | Computer Gaming World | Electronic Gaming Monthly | eWEEK | ExtremeTech | GameNOW

Microsoft Watch | Official US PlayStation Magazine | PC Magazine | Yahoo! Internet Life | Ziff Davis Smart Business

Privacy Policy | Terms of Use
Copyright (c) 2002: Ziff Davis Media Inc. All rights reserved. 
ExtremeTech is a trademark of Ziff Davis Publishing Holdings Inc.
Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis Media Inc. is prohibited.
For reprint information: click here.