Download Book

Total Page:16

File Type:pdf, Size:1020Kb

Download Book ® BOOKS FOR PROFESSIONALS BY PROFESSIONALS Ruan Platform Embedded Security Technology Revealed Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applications’ secrets and users’ privacy in a secure, light-weight, and inexpensive way. Besides native built-in features, it allows third-party software vendors to develop applications that take advantage of the security infrastructures offered by the engine. Intel’s security and management engine is technologically unique and significant, but is largely unknown to many members of the tech communities who could potentially benefit from it. Platform Embedded Security Technology Revealed reveals technical details of the engine. The engine provides a new way for the computer security industry to resolve critical problems resulting from booming mobile technologies, such as increasing threats against confidentiality and privacy. This book describes how this advanced level of protection is made possible by the engine, how it can improve users’ security experience, and how third-party vendors can make use of it. It’s written for computer security professionals and researchers; embedded system engineers; and software engineers and vendors who are interested in developing new security applications on top of Intel’s security and management engine. It’s also written for advanced users who are interested in understanding how the security features of Intel’s platforms work. What You’ll Learn: • The cyber security challenges behind the creation of the embedded security and management engine, and the solutions it presents • The pros and cons of enforcing security in the embedded engine • Basic cryptography and security infrastructure of the engine • Security-hardening features of the engine • Handling dynamically loaded applications • How anonymous authentication works with enhanced privacy protection • Content protection at the hardware level • Secure boot with a hardware root of trust • Firmware-based TPM • Identity protection with a hardware-based, one-time password ISBN 978-1-4302-6571-9 53999 Shelve in Software Engineering/Software Development User level: Beginning–Advanced 9781430 265719 For your convenience Apress has placed some of the front matter material after the index. Please use the Bookmarks and Contents at a Glance links to access them. Contents at a Glance About the Author ���������������������������������������������������������������������������� xvii About the Technical Reviewer ��������������������������������������������������������� xix Acknowledgments �������������������������������������������������������������������������� xxi Introduction ���������������������������������������������������������������������������������� xxiii ■ Chapter 1: Cyber Security in the Mobile Age ����������������������������������1 ■ Chapter 2: Intel’s Embedded Solutions: from Management to Security ������������������������������������������������������������������������������������ 27 ■ Chapter 3: Building Blocks of the Security and Management Engine ������������������������������������������������������������������������������������������� 57 ■ Chapter 4: The Engine: Safeguarding Itself before Safeguarding Others ������������������������������������������������������������������������������������������� 89 ■ Chapter 5: Privacy at the Next Level: Intel’s Enhanced Privacy Identification (EPID) Technology ������������������������������������������������� 117 ■ Chapter 6: Boot with Integrity, or Don’t Boot ����������������������������� 143 ■ Chapter 7: Trust Computing, Backed by the Intel Platform Trust Technology ��������������������������������������������������������������������������������� 165 ■ Chapter 8: Unleashing Premium Entertainment with Hardware-Based Content Protection Technology ����������������������� 181 ■ Chapter 9: Breaking the Boundaries with Dynamically Loaded Applications �������������������������������������������������������������������������������� 199 v ■ CONTENTS AT A GLANCE ■ Chapter 10: Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft ������� 211 ■ Chapter 11: Looking Ahead: Tomorrow’s Innovations Built on Today’s Foundation �������������������������������������������������������������������� 227 Index ���������������������������������������������������������������������������������������������� 239 vi Introduction Malware, virus, e-mail scam, identity theft, evil maid, password logger, screen scraper… Cyber security concerns everyone. Computers can be your trusted friends or traitors. The Internet is a scary place. Going on the Internet is like walking the streets of a crime-ridden neighborhood. Cyber criminals work to steal your privacy, money, assets, and even identity. Cyber-attacks are intangible, invisible, and hard to detect. Due to the increasing popularity of mobile devices, the danger is several-fold worse today than it was seven years ago. Technologies that created the security problem as a side effect are supposed to resolve the problem. Prevention is the key—the potential loss and cost of dealing with incidents is simply too high to afford. However, it is more difficult to defend a castle than to build it. The mitigation against cyber-attacks is complicated and involves multiple layers of building blocks: • Algorithm: An algorithm is a set of mathematical calculations that realize a specific cryptographic functionality, such as encryption, digital signature, hashing, and so forth. • Protocol: A protocol is a set of rules and messages that govern the transmission of data between two entities. Security protocols are always built on cryptographic algorithms. • Application: An application is a computer program that accomplishes a specific task, such as authenticating a user to a protected database. Applications are built with algorithms and protocols as the backbone. Algorithms and protocols are often standardized and used across the industry for compatibility and interoperability. On the other hand, applications may be standardized, but in most cases they are invented and deployed by individual vendors to distinguish their products from competitors. Algorithms, protocols, and applications can be realized in software, hardware, or combinations of both. Security measures that are rooted in hardware are more robust than those rooted in software, because attacks against well-designed hardware-based protections not only require advanced expertise, but also cost significant resources. xxiii ■ INTRODUCTION Intel is committed to delivering state-of-the-art solutions for supporting a safe computing environment. The embedded engine built in most Intel platforms today is a major achievement of that effort. It features hardware implementations for standard algorithms and protocols, as well as innovative applications that are exclusively available on Intel products, including: • Privacy safeguard with EPID (enhanced privacy identification) • Strong authentication and secure transaction with IPT (identity protection technology) • Verified boot process • . and many more Thanks to these protections, users are largely shielded from dangers when they are surfing the Web. With peace of mind, people can enjoy all the good things that technologies have to offer. This book takes the readers through an extensive tour of the embedded engine, exploring its internal architecture, security models, threat mitigations, and design details of algorithms, protocols, and interesting applications. The journey begins now. xxiv CHAPTER 1 Cyber Security in the Mobile Age The number of new security threats identified every month continues to rise. We have concluded that security has now become the third pillar of computing, joining energy-efficient performance and Internet connectivity in importance. —Paul S. Otellini This book is an in-depth technical introduction to an embedded system developed and manufactured by Intel Corporation. The embedded system is not an independent product; it is a native ingredient inside most of Intel’s computer product portfolio, which includes servers, desktops, workstations, laptops, tablets, and smartphones. Although not well known to most end users, the embedded system plays a critical role in many consumer applications that people use every day. As such, its architecture, implementation, and security features are worth studying. Depending on the end product in which the embedded engine resides, the engine is denominated differently: • For the embedded system shipped with computing devices featuring Intel Core family microprocessors, it is called the management engine. • For the embedded system shipped with computing devices featuring the Intel Atom system-on-chip (SoC), it is called the security engine. Note that not all Atom platforms use the security engine introduced in this book. For the sake of convenience, this book refers to it as the security and management engine, the embedded engine, or simply the engine. 1 CHAPTER 1 ■ CYBER SECURITY IN THE MOBILE AGE Three Pillars of Mobile Computing In August 2010, Intel announced the acquisition of security giant McAfee. Paul S. Otellini, Intel’s president and CEO at the time, emphasized that “security has become the third pillar of computing” when commenting on the
Recommended publications
  • 1 Intel CEO Remarks Pat Gelsinger Q2'21 Earnings Webcast July 22
    Intel CEO Remarks Pat Gelsinger Q2’21 Earnings Webcast July 22, 2021 Good afternoon, everyone. Thanks for joining our second-quarter earnings call. It’s a thrilling time for both the semiconductor industry and for Intel. We're seeing unprecedented demand as the digitization of everything is accelerated by the superpowers of AI, pervasive connectivity, cloud-to-edge infrastructure and increasingly ubiquitous compute. Our depth and breadth of software, silicon and platforms, and packaging and process, combined with our at-scale manufacturing, uniquely positions Intel to capitalize on this vast growth opportunity. Our Q2 results, which exceeded our top and bottom line expectations, reflect the strength of the industry, the demand for our products, as well as the superb execution of our factory network. As I’ve said before, we are only in the early innings of what is likely to be a decade of sustained growth across the industry. Our momentum is building as once again we beat expectations and raise our full-year revenue and EPS guidance. Since laying out our IDM 2.0 strategy in March, we feel increasingly confident that we're moving the company forward toward our goal of delivering leadership products in every category in which we compete. While we have work to do, we are making strides to renew our execution machine: 7nm is progressing very well. We’ve launched new innovative products, established Intel Foundry Services, and made operational and organizational changes to lay the foundation needed to win in the next phase of our company’s great history. Here at Intel, we’re proud of our past, pragmatic about the work ahead, but, most importantly, confident in our future.
    [Show full text]
  • Usersguide Ghana-EB-1985WU.Pdf
    User's Guide Contents 2 Notations Used in This Guide Connecting to a USB Device or Camera.............................28 Disconnecting a USB Device or Camera.............................28 Connecting to a Document Camera.................................28 Connecting to External Output Devices..............................28 Introduction to Your Projector Connecting to an External Computer Monitor........................29 Connecting to External Speakers.................................29 Projector Features.......................................... 9 Installing Batteries in the Remote Control................... 31 Quick and Easy Setup............................................9 Flexible Connectivity............................................9 Remote Control Operation.......................................31 Connect with Computer.......................................10 Opening the Lens Cover . ............................. 33 Connect with Mobile Devices...................................11 Projector Parts and Functions ............................... 12 Projector Parts - Front..........................................12 Using Basic Projector Features Projector Parts - Rear...........................................13 Projector Parts - Base...........................................14 Turning On the Projector ................................... 35 Projector Parts - Control Panel.....................................15 Turning Off the Projector ................................... 37 Projector Parts - Remote Control...................................16
    [Show full text]
  • Widi" to WIRELESSLY CONNECT YOUR COMPUTER to a TV OR a MONITOR
    USING "WiDi" TO WIRELESSLY CONNECT YOUR COMPUTER TO A TV OR A MONITOR 1 Web location for this presentation: http://aztcs.org Click on “Meeting Notes” 2 SUMMARY "WiDi" is a robust technology that can wirelessly connect your "Windows.." computer to a TV or a monitor. "WiDi" is also known as "Intel Wireless Display". 3 TOPICS • "WiDi" Fundamentals • Using "WiDi" • Obtaining a Computer That Supports "WiDi" • Installing a "WiDi" Receiver For a TV or a Monitor 4 "WiDi" FUNDAMENTALS • "WiDi" stands for "Intel Wireless Display" • You can use "WiDi" to wirelessly connect a "Windows.." computer directly to a monitor or a TV set. This wirelessly-connected monitor or TV becomes an additional monitor for your computer. 5 "WiDi" FUNDAMENTALS (continued) • At the computer end, video and sound is transmitted by a WiDi- capable WiFi wireless networking adapter • At the TV or monitor end, either you need to add a "WiDi Receiver" or your "smart tv" may already have one in it 6 "WiDi" FUNDAMENTALS (continued) • If your Intel "Windows.." computer only has one monitor attached to it, "WiDi" cannot be used to connect this single monitor to your computer. 7 "WiDi" FUNDAMENTALS (continued) • At the computer end, you usually have to buy the computer with "WiDi" already designed into the computer: At the computer end, you usually cannot add in "WiDi" capability if this capability was not part of the computer when you purchased it. 8 "WiDi" FUNDAMENTALS (continued) • Warning: "WiDi" and other wireless technologies all have too much latency and unpredictability for
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Publisher Managing Editor Content Architect Cory Cox Stuart Douglas Biljana Badic
    Intel® Technology Journal | Volume 18, Issue 3, 2014 Publisher Managing Editor Content Architect Cory Cox Stuart Douglas Biljana Badic Program Manager Technical Editor Technical Illustrators Stuart Douglas David Clark MPS Limited Technical and Strategic Reviewers Valerio Frascolla Biljana Badic Erfan Majed Jan-Erik Mueller Shilpa Talwar Trevor Wieman Luis Castedo Ribas Kenneth Stewart Dauna Schaus John Aengus Markus Brunnbauer Steve Duffy Marcos Katz Pablo Puente Intel® Technology Journal | 1 Intel® Technology Journal | Volume 18, Issue 3, 2014 Intel Technology Journal Copyright © 2014 Intel Corporation. All rights reserved. ISBN 978-1-934053-64-5, ISSN 1535-864X Intel Technology Journal Volume 18, Issue 3 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4744. Requests to the Publisher for permission should be addressed to the Publisher, Intel Press, Intel Corporation, 2111 NE 25th Avenue, JF3-330, Hillsboro, OR 97124-5961. E-Mail: [email protected]. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought.
    [Show full text]
  • PC Technician Essentials PC Anatomy
    Motherboards Prepared & Presented by Professor Gupta Motherboard The primary component of a computer is the motherboard (sometimes called the "mainboard"). The motherboard is the hub which is used to connect all of the computer's essential components. Motherboards ■ Everything that makes a computer a computer must be attached to the motherboard. From the CPU to storage devices, from RAM to printer ports, the motherboard provides the connections that help them work together. ■ The motherboard is essential to computer operation in large part because of the two major buses it contains: the system bus and the I/O bus. Together, these buses carry all the information between the different parts of the computer. ■ Components: Socket 775 processor; Dual-channel DDR2 memory slots; Heat sink over North Bridge; 24-pin ATX v2.0 power connector; South Bridge chip; PCI slots; PCI Express x16 slot; PCI Express x1 slot; CMOS battery; Port cluster; SATA host adapter; Floppy drive controller; PATA host adapter; 4-pix ATX12 power connector; Mounting holes. Prepared & Presented by Professor Gupta 301-802- 9066 AT & ATX Motherboard form factor The term "form factor" is normally used to refer to the motherboard's geometry, dimensions, arrangement, and electrical requirements. In order to build motherboards which can be used in different brands of cases, a few standards have been developed: • AT baby/AT full format is a format used in the earliest 386 and 486 PCs. This format was replaced by the ATX format, which shape allowed for better air circulation and made it easier to access the components; • ATX: The ATX format is an upgrade to Baby-AT.
    [Show full text]
  • Rich Mobile Experience with Intel® Atom™ X5 and X7 Processors
    Platform Brief Intel® Atom™ Z8000 Processor Series Enjoy Rich, Personalized, and Secure Mobile Experiences Immerse yourself in rich experiences A tablet with the new Intel® Atom™ Z8000 Processor Series gives you performance you can experience from the moment you power it on. A powerful multi-core, multitasking processor with next-generation (Gen 8) Intel HD graphics1 provides support for up to three cameras, speech/ gesture/face analysis, and 1080p60 video encode/decode to turn your tablet into a play and work powerhouse you can use equally in real and Enjoy rich experiences imaginary worlds. with a tablet powered This next-generation SoC enables tablets with Intel® RealSense™ Technology. Intel RealSense Technology2 lets you enjoy 3D capture with by Intel® Atom™ Z8000 accurate depth details, and allows you to use your images in a digital Processor Series. virtual world. Intel’s hardware acceleration in the processor for Real Time Communications (RTC) and the VP8 video codec allow you to engage in high-quality, wideband voice and videoconferencing for immersive learning and collaboration. Platform Brief Intel® Atom™ Z8000 Processor Series Live without wires, worries, and passwords Tablets with the new Intel Atom Z8000 Processor Series let you live more freely by enabling your tablet manufacturer to give you more with less—with fewer wires, worries, and passwords. Intel powered tablets help simplify your life, so you can more easily enjoy the experiences you’ve grown to love from your tablet. Live Wire-free • Limit notifications to text messages Built-in security5,6,7 hardware in this from your close friends while you new processor, plus McAfee software, Intel® Wireless Display makes your watch a movie.
    [Show full text]
  • Intel 8080 Oral History
    Oral History Panel on the Development and Promotion of the Intel 8080 Microprocessor Participants: Steve Bisset Federico Faggin Hal Feeney Ed Gelbach Ted Hoff Stan Mazor Masatoshi Shima Moderated by: Dave House Recorded: April 26, 2007 Mountain View, California CHM Reference number: X4021.2007 © 2007 Computer History Museum Oral History Panel on Intel 8080 Microprocessor Dave House: Welcome to the video history of the MCS-80, or the 8080 microprocessor. We have with us today the team responsible for developing those products, and I'd like to start out, first of all, to introduce myself. I'm Dave House. I arrived just before the 8080 was introduced at Intel, so I was not part of the development team. But I'll be the MC today, and I'm going to ask some of the new members to our panel to introduce themselves and give their background. Ed Gelbach: I joined Intel in late, mid-1971. We had developed the microprocessor at that point. However, it was being used generally as a calculator type chip, and we were looking for ways to expand it. Prior to joining Intel, I worked for Texas Instruments for about ten years. And prior to that, I was at General Electric. House: And you grew up in? Gelbach: Southern California. House: Southern California beach boy. Gelbach: I graduated from USC [University of Southern California], and worked for TI [Texas Instruments] in Los Angeles predominantly. I moved to Texas for a short period of time, and then moved up here [Northern California] in 1971. House: Okay. Steve Bisset joined our team.
    [Show full text]
  • HP MP9 G2 Retail System
    QuickSpecs HP MP9 G2 Retail System Overview HP MP9 G2 Retail System FRONT/PORTS 1. Headphone Connector 4. USB 3.0 (charging) 2. Microphone or Headphone Connector 5. USB 3.0 (software selectable, default mode is microphone) 3. USB 3.0 Type-CTM 6. HDD indicator 7. Dual-State Power Button c04785658 — DA – 15369 Worldwide — Version 9 — January 2, 2017 Page 1 QuickSpecs HP MP9 G2 Retail System Overview REAR/PORTS 1. External antenna connector (antenna optional) 8. VGA monitor connector 2. Thumbscrew 9. DisplayPort (default, shown) or optional HDMI or serial 3. Padlock loop 10. (2) USB 3.0 ports (blue) 4. HP Keyed Cable Lock 11. (2) USB 3.0 ports (blue) allows for wake from S4/S5 with 5. External antenna connector (antenna optional) keyboard/mouse when connected and enabled in BIOS 6. Antenna cover 12. RJ-45 network connector 7. DisplayPort monitor connector 13. Power connector AT A GLANCE c04785658 — DA – 15369 Worldwide — Version 9 — January 2, 2017 Page 2 QuickSpecs HP MP9 G2 Retail System Overview Windows 10 IoT Enterprise for Retail (64-bit), Windows 10 Pro (64-bit), Windows Embedded 8.1 Industry Pro Retail (64- bit), Windows 8.1 Pro (64-bit), Windows Embedded Standard 7 (64-bit), Windows 7 Pro (32 & 64-bit), Windows Embedded POS Ready 7 (32 & 64-bit), FreeDOS UEFI BIOS developed and engineered by HP for better security, manageability and software image stability Intel® Q170 chipset Intel® 6th generation Core™ processors Intel® vPro™ Technology available with select processors Integrated Intel® HD Graphics Integrated Intel® i219LM
    [Show full text]
  • KNOW the LINGO – What Is WIDI?
    KNOW THE LINGO – WHAT IS WIDI? By: Joseph D. Cornwall, CTS-D Technology Evangelist—Lastar, Inc. Lingo is a term used to describe the language used by people who work in a particular area or who have a common interest. Technical lingo is a kind of shorthand that’s used to express concepts common to that specific topic or area of study. Technical lingo is important because it provides a very precise or unique “shorthand” description of a device, effect or concept. Unfortunately, if you aren’t comfortable and familiar with the lingo of a topic it can be a tall hurdle to communicate efficiently with folks who consider the jargon of their field to be “self-explanatory.” In this series of articles we’ll lift the veils of misunderstanding from the lingo of the A/V industry. WHAT IS WIDI? WiDi is a trade name for Intel® Wireless Display technology. Intel unveiled this A/V connectivity system at the January 2010 Consumer Electronics Show (CES). WiDi technology is now in its fourth generation, but both consumer and commercial industry awareness and acceptance of the technology remains low. Intel’s WiDi software is not supported by Apple Mac devices, but it is included in most Windows® 7 and nearly all Windows® 8.1 OS products—including tablets and phones. Apple and Android smartphones and tablets can connect to a WiDi receiver or WiDi-enabled display by using an app such as Intel’s Pair & Share or (for Android only) by using Intel’s TelePort Extender. WiDi creates a peer-to-peer direct connection between devices without the need for a wireless access point or router.
    [Show full text]
  • HP Proone 400 G1 All-In-One Business PC (21.5” Touch)
    QuickSpecs HP ProOne 400 G1 All-in-One Business PC (21.5” Touch) Overview HP ProOne 400 G1 All-in-One Business PC FRONT 1. Microphones (optional) 2. Webcam activity LED 3. Webcam (optional) 4. Power button 5. Speakers DA - 14876 North America — Version 4 — March 20, 2014 Page 1 QuickSpecs HP ProOne 400 G1 All-in-One Business PC (21.5” Touch) Overview HP ProOne 400 G1 All-in-One Business PC BACK 1. Stand 2. Security screw 3. Power connector LED indicator 4. Power connector 5. DisplayPort 6. RJ-45 Gigabit Ethernet port 7. (4) USB 2.0 ports 8. Security lock slot 9. Stereo audio line out 10. Serial RS-232 port 11. VESA mount DA - 14876 North America — Version 4 — March 20, 2014 Page 2 QuickSpecs HP ProOne 400 G1 All-in-One Business PC (21.5” Touch) Overview DA - 14876 North America — Version 4 — March 20, 2014 Page 3 QuickSpecs HP ProOne 400 G1 All-in-One Business PC (21.5” Touch) Overview HP ProOne 400 G1 All-in-One Business PC SIDE 1. Optical Disc Drive (optional) 2. Optical eject button 3. Optical activity LED 4. Hard Disc Drive activity LED 5. Media Card Reader activity LED 6. SD Media Card Reader (optional) 7. (2) USB 3.0 Ports, including 1 fast charging port 8. Microphone jack 9. Headphone jack DA - 14876 North America — Version 4 — March 20, 2014 Page 4 QuickSpecs HP ProOne 400 G1 All-in-One Business PC (21.5” Touch) Overview At A Glance Windows 7 or Windows 8.1 21.5 inch Touch diagonal widescreen WLED backlit LCD Integrated all-in-one form factor Intel® H81 Express chipset Intel 4th Generation Core™ processors Integrated Intel HD Graphics
    [Show full text]
  • History of Micro-Computers
    M•I•C•R•O P•R•O•C•E•S•S•O•R E•V•O•L•U•T•I.O•N Reprinted by permission from BYTE, September 1985.. a McGraw-Hill Inc. publication. Prices quoted are in US S. EVOLUTION OF THE MICROPROCESSOR An informal history BY MARK GARETZ Author's note: The evolution of were many other applica- the microprocessor has followed tions for the new memory a complex and twisted path. To chip, which was signifi- those of you who were actually cantly larger than any that involved in some of the follow- had been produced ing history, 1 apologize if my before. version is not exactly like yours. About this time, the The opinions expressed in this summer of 1969, Intel was article are my own and may or approached by the may not represent reality as Japanese calculator manu- someone else perceives it. facturer Busicom to pro- duce a set of custom chips THE TRANSISTOR, devel- designed by Busicom oped at Bell Laboratories engineers for the Jap- in 1947, was designed to anese company's new line replace the vacuum tube, of calculators. The to switch electronic sig- calculators would have nals on and off. (Al- several chips, each of though, at the time, which would contain 3000 vacuum tubes were used to 5000 transistors. mainly as amplifiers, they Intel designer Marcian were also used as (led) Hoff was assigned to switches.) The advent of assist the team of Busi- the transistor made possi- com engineers that had ble a digital computer that taken up residence at didn't require an entire Intel.
    [Show full text]