• <More on Intel.com

Intel® Identity Protection Technology (Intel® IPT) with Protected Transaction Display

Intel® Identity Protection Technology (Intel® IPT) with Protected Transaction Display

Secure transaction authorization

An encrypted, secure I/O technology embedded into 3rd generation Intel® Core™ processors, Intel® Identity Protection Technology (Intel® IPT)1 with protected transaction display enables businesses and web sites to confirm user presence, verify transactions, and create secure PIN input prior to the release of credentials, thus eliminating risk from screen scrapers or keyloggers.

Video: Understanding the business value of Intel® IPT with PKI/protected transaction display >

Secure transaction authorization

A recent security threat has emerged, wherein malware hijacks a user session and attempts to log in to a corporation from a user’s PC. Intel® Identity Protection Technology (Intel® IPT) with protected transaction display validates user presence by requiring input on a secure PIN pad displayed only to the user. This PIN pad is created by the graphics hardware within the processor, making it invisible to the operating system. The user inputs their PIN number using mouse clicks, and the coordinates are passed to the chipset for verification. Malware cannot replicate the mouse clicks, since the PIN pad is not exposed to the operating system. See the demo.

Protection below the operating system

Intel® IPT with protected transaction display enables the PC to display information to the user and to collect the user’s information with the assurance that the operating system cannot monitor or tamper with the transaction. Because the display screen is part of the integrated graphics within the processor, it is never exposed to the software layer, only to the user sitting physically in front of the screen. This embedded security capability when enabled by an enterprise or web site prevents malware from scraping a PC’s display by verifying a human presence at the PC, helping to reduce many of the most sophisticated attacks on users’ accounts, Internet businesses, and financial institutions.

Product and Performance Information

open

1. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT)–enabled system, including a 2nd or higher generation Intel® Core™ processor, an enabled chipset, firmware, software, and participating web site. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.