TPM via Bluetooth®
cellphone and USB Drive

Nearly Impossible to Crack   
GIGABYTE Smart TPM provides the industries highest level of data protection with 2048 bit hardware encryption. A unique feature of GIGABYTE Smart TPM is
that it allows users to store their digital key on a USB thumb drive. In addition, GIGABYTE Smart TPM allows users to lock the protected data remotely using a Bluetooth® enabled mobile phone.


  Greening your PC via
Bluetooth® cellphone
 
AutoGreen technology can automatically save power for you simply by your bluetooth cell phone when you are away from your computer.
     Note: GIGABYTE Smart TPM motherboards do not include a Bluetooth® receiver; the addition of a 3rd party Bluetooth receiver is required.
TOP  



Data Security Has Never
Been This Easy
GIGABYTE   Ultra TPM   Motherboards
Setting a new standard for motherboard security
Plug & Play 2048 bit USB Key with
Hardware based TPM security
Setting a New Standard for Motherboard Security
In today's computing environment, security threats such as viruses, worms, trojan attacks, malicious hacking and data/identity theft, etc. are not only happening more frequently, but the cost to victims of such attacks are also on the rise. While software solutions are able to protect data to a certain degree, a higher level of security measures is needed to ensure you do not become the next victim.

That is where a hardware based solution such as TPM (Trusted Platform Module) technology can help. Trusted Platform Modules are hardware based security microcontrollers that store keys, passwords and digital certificates and protects this data from external software attacks and physical theft.

Recognizing the need to protect users against today's computing security threats, GIGABYTE is the first motherboard manufacturer to equip their motherboards with an onboard TPM Module from Infineon with a 2048 bit encryption key. But, they didn't stop there. GIGABYTE has paired their TPM module with a security software interface called GIGABYTE Ultra TPM, providing the Industry's highest level of data security through a hardware + software design.

In order to better understand GIGABYTE Ultra TPM and how it works, let's first get a crash course in how data security works.

Easy to Secure Your Data
With Infineon's TPM chip built-in, GIGABYTE provides TPM hardware-based encryption and decryption with digital signature keys to ensure a maximum level of data protection with 2048 bit encryption.GIGABTE Ultra TPM provides an added layer of security by allowing users to store their digital signature key on a USB thumb drive, so when they step away from their system, they can take the key with them, locking up their data and preventing unauthorized access while they are away. When making the portable user key, GIGABYTE Ultra TPM auto                                     deletes the user key in the hard drive, ensuring the maximum level of data protection.

Nearly Impossible to Crack
Most data security solutions, whether they are software or hardware based, rely on a process of encryption and decryption to secure digital data. Encryption takes your data and transforms it, making it unreadable to anyone that doesn't have a "key" to read it. The key basically tells how that information was transformed, and acts as a password for the data. Once you have the key, you are able to undo the encryption, a process called decryption, making the data readable again.

Key size basically determines the level of security; 1 bit keys being the least secure, all the way up to the 2048 bit key found in GIGABYTE's Ultra TPM. How secure is 2048 bit security? The number of possible combinations from a 2048 bit number is 22048, which is 3.23 x 10616. That is 3 followed by 616 zeros or
22048= 30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000
000000

That is how many possible different number combinations a 2048 bit key has. A computer capable of one million instructions per second would have to work for 1014 years to crack the key. Is it any wonder why this is considered military grade security!

The Benefits of GIGABYTE Ultra TPM
1. Security, manageability and flexibility that surpasses software-based encryption.
2. No password required. Users don't have to remember and keep entering their password. This also means there is no
    password for someone to crack.
    • Quick and effortless protection of data; plug in USB key to access data, or remove to safeguard.
    • Keeps data secure even when users are away from computer.
3. Optional backup of key stored in BIOS in case of misplaced key.
4. Very low CPU utilization. As all the encryption and decryption is done by the TPM, users are able to do other tasks     simultaneously.
While no security system is 100% secure, GIGABYTE Ultra TPM provides the industry's highest level of military grade security, and at the same time, makes it easy enough for anyone to use. Whether protecting important data at the office or ensuring your kids don't accidentally delete things off the home computer, GIGABYTE Ultra TPM has you covered. Think of it as your own personal 24/7 security force.
Hardware + Software vs Software Based Security
 
GIGABYTE Ulltra TPM
Hardware + Software
based Encryption
 
TPM Hardware based
Security
 
Software based
Encryption
  Platform authentication with
integrated security solution
  Platform authentication with
integrated security solution
  Low Level of security
Keys and secrets protected by
dedicated hardware
Keys and secrets protected
by dedicated hardware
Key can be deleted completely
from system offering the highest
level of security possible
   
  High protection against logical
attacks
  High protection against
logical attacks
  Low protection against
logical attacks
  Highest level of protection
against physical attacks
  High protection against
physical attacks
  No protection against
physical attacks
  Low CPU utilization   Low CPU utilization   CPU Intensive


TOP   




Smart Dual LAN
Blisteringly Fast and Seamless Connectivity
GIGABYTE Smart Dual LAN technology features intelligent LAN port auto-switching between the 2 physical Gigabit LAN chips, oering hassle free, zero downtime, high speed network connectivity. Experience blisteringly fast network data access of up to 2Gbps bandwidth transmission with Teaming enabled, and enjoy added power savings with Green Ethernet.
How Smart Dual LAN Works  
       
 
LAN Chip 1 encounters hardware failure, resulting network outage for LAN 1
   
       
Smart Dual LAN
With Smart Dual LAN, LAN Chip 2 automatically kicks in without requiring users to physically switch the network cable
 
Traditional Design
Users are required to reconnect the network by switching the network cable to LAN 2
 
  How Teaming Works  
     
 
Teaming can be explained with a simple
example of connecting two PCs via a LAN cable: without teaming the connection speed is limited to that of one LAN port; with teaming enabled the network bandwidth is effectively doubled to that of two LAN ports, i.e. up to 2 Gbps.
 
TOP  



Ultra Safe - DualBIOS™
Automated Dual Protection
Against BIOS Failure
What if the BIOS Fails?
Have you ever been in the middle of a BIOS update and then had it fail for some reason? Or how about executing some applications only to find out that you’ve been infected by some new virus that completely blows away your BIOS?
DualBIOS™ Benefits :
1. Repairs failed BIOS instantly
2. Fully automated without
    user intervention
3. Reduces service time
Without the BIOS working, the motherboard is basically not functional at all. Can you imagine the time and effort to get your motherboard fixed?
What might cause a BIOS Failure?
1. Power shut down during BIOS update process
2. Improper Overclocking settings
3. Virus attacks
4. Hardware Failure
 

How GIGABYTE DualBIOS™ Works?
GIGABYTE DualBIOS™ features two physical BIOS ROMs mounted on the motherboard. There is a second chip called the Backup BIOS that stores the factory default BIOS version on it. The way it works is fully automated without any user intervention. When you discover that you have a problem, all you need to do is shut the system down, and then boot up again. When there is a BIOS firmware failure detected, the Backup BIOS will first recover the Main BIOS file back to its factory default BIOS version, and everything is back to normal again. If the BIOS failure is due to hardware damage, the Backup BIOS will takeover and function as the Main BIOS.

Automatically recovers
Main BIOS data from the
Backup BIOS when the
Main BIOS has crashed
or failed
 

DualBIOS™ vs. Traditional single BIOS
 


TOP  
 





Ultra Safe-Housing Pin Headers
 
The GIGABYTE Safe-Housing Pin Headers are a user friendly feature that can prevent internal I/O connector pins such as USB, IEEE 1394 or IDE devices cables from being inserted incorrectly. The housing around the internal pin headers greatly reduces the likelihood of bent pins because the cable connector can only be attached one way...the correct way!
 
                              Prevent pin bending
                                     New, Better Design                                                                                   
                            Old Design

TOP  
 




Ultra Safe-Lockable SATA Cable Connectors
 
GIGABYTE "Lockable SATA cable connectors" compared to traditional SATA cables provide a better and firmer connection with the on-board SATA ports. The lockable SATA connector greatly reduces the chance of SATA cable disconnection due to vibration or accidental cable nudging. This prevents data corruption while hard drive or optical-drives are still functioning.
 
                              Prevent SATA cable loosening
                                              Lockable                                             Lockable                                           Not Lockable
                     Lockable SATA connector                                                                              Traditional SATA connector
                                                      Secure connection                                                                             Loose connection
               Press to unlock                                                                                   Easily loosen

TOP  
 

All intellectual property rights, including without limitation to copyright and trademark of this work and its derivative works are the property of, or are licensed to,
GIGA-BYTE TECHNOLOGY CO., LTD. Any unauthorized use is strictly prohibited.