IBM Corp. builds security chip into NetVista that executes private-key functions

IBM Corp. builds security chip into NetVista that executes private-key functions

By William Jackson

GCN Staff

By embedding a security subsystem in the NetVista desktop system, IBM Corp. is promoting it as a secure end-point for public-key infrastructures.

The NetVista stores PKI credentials in hardware, providing smart-card functions for a specific computer. The security architecture comes from the Trusted Computing Platform Alliance, or TCPA, a consortium of 139 companies that released Version 1 of its specifications in October.

'We knew if we came up with something unique and nonstandard, nobody would use it,' said Clain Anderson, program director for marketing integration in IBM's personal systems group.

Although NetVista machines with security chips have been available for about a year, 'with the TCPA going public, we can talk about this more,' Anderson said. 'We're making a big splash out of it.'

Applications for the NetVista come from TCPA members DigitalPersona Inc. of Redwood City, Calif.; Entrust Technologies Inc. of Plano, Texas; Ensure Technologies Inc. of Ann Arbor, Mich.; and Intel Corp.

Private-key data can be stored in the security chip rather than on a hard drive where it might be vulnerable to hackers. The chip executes private-key functions for encrypting e-mail, documents and files, as well as signing them digitally.

The chip has several encryption interfaces, including the Microsoft Cryptography Application Programming Interface used by Internet Explorer, and the Public-Key Cryptography Standard 11 used by Netscape Navigator browsers.

It also supports several authentication technologies, including 128-character pass phrases, biometrics and proximity detectors.

The embedded security subsystem is available now on the NetVista S40p and A40p models.

The S40p, starting at $1,695, has an 866-MHz Pentium III processor, 20G hard drive and up to 512M of memory. The A40p has a 933-MHz Pentium III, 30G hard drive and up to 512M of memory, starting at $2,155.

Contact IBM at 888-746-7426.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.