A new breakthrough in Microsoft antitrust case? Win10 and trusted computing separation

  
The SAIC's anti-monopoly investigation against Microsoft has seen a new breakthrough. Recently, a number of experts called for an interview with reporters: "Microsoft in the operating system bundled sales of trusted computing architecture alleged acts of violation of" antitrust ", Win10 operating system should be stripped trusted computing."

may Letter computing is a concept put forward by the FTCS (International Fault Tolerant Computing Conference) in the 1990s. It is a new computing model of active immunity with both computing and protection. At present, more than 200 companies around the world are promoting the development of trusted computing. Microsoft launched the Trusted Computing (TwC) program in 2002 and bundled it in Vista, Win8, and Win 10, but it was not bundled in XP and Win7.
In fact, in the EU's antitrust investigation against Microsoft, "bundling" is the main performance of Microsoft's abuse of market dominance to obtain monopoly interests. However, because the EU anti-monopoly investigation is aimed at Microsoft's market behavior before 2000, the EU mainly penalized Microsoft's behavior of bundling browsers and anti-virus software, and the trusted computing from 2002 did not enter the survey list.
At present, China's trusted computing products are also mature on Microsoft's XP and Windows7 systems. "But Microsoft monopolizes the PC market. After Windows 10 is bound with Microsoft's trusted computing, China's trusted computing industry will completely lose the opportunity to enter the market." Ni Guangnan, academician of the Chinese Academy of Engineering, said in an interview: "We should ask Microsoft to provide A version of Win10 that stripped out trusted computing can be fined Microsoft in the same way as the EU before it is available."
Moreover, Ni Guangnan stressed that the review of bundled trusted computing should even be in the bundled browser. In front of the behaviors of anti-virus software, "because this not only affects the industry, but also seriously threatens China's network security."
Confidence in Trusted Computing
"China's trusted computing was officially established in 1992 and began to scale. Application, has formed a trustworthy computing platform password scheme, trusted platform control module, trusted motherboard, trusted basic support software, trusted network connection and other aspects of independent innovation system." Recently, Chinese Academy of Engineering academician, network security authority Expert Shen Changxiang was introduced by an interviewer, compared to traditional firewalls, intrusion detection, and virus prevention. Such as passive defense network security systems, trusted computing can achieve the active defense of the computer system, with identification, status measurement, confidential storage and other functions, can provide a higher level of security protection, but also more support cloud computing, Internet of Things, etc. New information technology.

Copyright © Windows knowledge All Rights Reserved