Skip to main content

Intel's vPro Core CPUs Can Take SMS ''Poison Pill''

Along with the latest generation of new Intel Core Sandy Bridge chips comes a new revision of the vPro technology that gives an added layer of security.

To provide stronger defense against the problem of laptop theft and data loss, Intel this week also introduced Intel Anti-Theft Technology Ver. 3.0 (AT 3.0), included on all 2nd generation Intel Core and Core vPro processors.

Previous versions of Intel Anti-Theft Technology enabled authorized IT or service personnel to send a coded "poison pill" over the Internet to completely disable a lost or stolen computer and help prevent access to its encrypted data and deter theft. New Intel AT 3.0 enables the poison pill to be sent as an encrypted, authenticated SMS message by an authorized administrator over a 3G cellular network as well within moments after a missing laptop is turned on. When recovered, the PC can be similarly re-activated with another message. Its new Locator Beacon capability gives authorities the ability to pinpoint a missing laptop using GPS technology on select 3G modems.

Finally, the new Intel AT 3.0 standby protection feature helps protect encrypted PCs that go missing in the vulnerable standby state (S3). When awakened, the new standby protection feature can change normal procedure to require an encryption login, which is much more secure than the usual username and password.

New Intel Identity Protection Technology (IPT) supplements normal password procedures by generating a new six-digit numerical password every 30 seconds to help ensure only authorized access.

The 2nd generation Intel Core vPro processors also help make IT simpler with the new Host-Based Configuration feature that completely automates the process of setting up the vPro functions on even thousands of computers.

  • 4745454b
    Nice. I do hope this is all controlled by a separate chip so that you can't just format the OS and become the new admin.
    Reply
  • ceteras
    4745454bNice. I do hope this is all controlled by a separate chip so that you can't just format the OS and become the new admin.
    It's controlled by a separate chip, indeed, it's called a CPU, iirc.
    Reply
  • huron
    I know this has been around for awhile, but this is a really cool technology. Going to seriously look at using this (since we have it in our laptops) for our company.

    But for the SMS messages to work, wouldn't the computer need to be on a cellular network?
    Reply
  • KingArcher
    take out the 3G modem and poison pill never reaches its destination
    Pwn2Own :D
    Reply
  • mavroxur
    KingArchertake out the 3G modem and poison pill never reaches its destinationPwn2Own

    Integrate the 3G modem on the motherboard, and the thief gets owned.
    Reply
  • Marco925
    mavroxurIntegrate the 3G modem on the motherboard, and the thief gets owned.DESOLDER THE 3G Modem!!!! And the thief pwns
    Reply
  • existencenow
    Marco925DESOLDER THE 3G Modem!!!! And the thief pwnsMake a nice lil' thermit pack to go FIZZLE on all data if chassis is opened w/o both a phyiscal and multiple digital access keys :) risky but effective ! PWNT !
    Reply
  • Doesn't anyone sees the risk on personal liberties on this?
    Let's suppose you are against a government, you really cause troubles, so... puf, they turn off your PC or smartphone?
    If that was a consolidated technology, Egyptian revolution would never happen!
    Reply
  • Reynod
    Scarey if it gets into the wrong hands.

    I can see some embittered IT manager leaving a company a trainwreck the day after he leaves ...
    Reply
  • illo
    BlarisDoesn't anyone sees the risk on personal liberties on this?Let's suppose you are against a government, you really cause troubles, so... puf, they turn off your PC or smartphone?If that was a consolidated technology, Egyptian revolution would never happen!
    i want to strike you with a hammer. if YOUR laptop gets stolen YOU send the poison pill, work on your reading comprehension please.
    Reply