Intel® Developer Zone:
Business Client

Meshcentral.com - Going Global with 11 languages
By ylian-saint-hilaire (Intel)Posted 06/26/20142
I am happy to announce that Meshcentral is going global with the web site launching in a total of 11 languages. It’s always been the goal of Meshcentral to be a universal cloud management web site that cuts across devices, operating systems, architectures and form factors, highlighting and util...
Mesh Central meets Use Case Reference Designs
By Jacob Gauthier (Intel)Posted 06/24/20140
For a few years now I've been working on "Use Case Reference Designs" (UCRDs) for vPro, and AMT. The idea behind these is to take a technology like IDE Redirection (a feature on all computers that have AMT) and create a use case that can be used with it. For example, if you work on a help desk, I...
Meshcentral.com - Intel® AMT IDE Redirect support
By ylian-saint-hilaire (Intel)Posted 06/24/20140
It’s been a while since the last Meshcentral announcement, but we are making it up today with a powerful new feature. With huge help from Jacob Gauthier that has been working on Intel AMT Recovery OS and an expert on the topic, we are announcing: Meshcentral cloud Intel® AMT IDE Redirect. Allow...
One less Password for me - Big savings for IT (No Password VPN with Intel® IPT with PKI)
By Colleen Culbertson (Intel)Posted 06/20/20140
Less passwords but still secure!  That would be a better world, wouldn't it? Working for a large security conscious corporation (Intel), I have been frustrated having to reenter my VPN password every time I got dropped by my home cable network or from a conference or hotel's overburdened network...

Pages

Subscribe to Intel Developer Zone Blogs
Meshcentral - Introduction & Overview
By ylian-saint-hilaire (Intel)Posted 07/03/20140
  Site Links Main site: meshcentral.com Information site: info.meshcentral.com Developer blog: intel.com/software/ylian Overview Meshcentral is an open source project under Apache 2.0 license that allows administrators to remotely manage computers over the Internet using a single web port...
Providing Hardware-based Security to Java Applications by leveraging Intel® Identity Protection Technology and Java Cryptography Extensions
By Randal Templeton (Intel)Posted 06/18/20140
Introduction Intel® Identity Protection Technology with public key infrastructure (Intel® IPT with PKI) provides the capability to generate and store RSA private keys directly in hardware. The keys can then be used for cryptographic operations such as creating and verifying digital signatures....
Using Intel® C++ Composer XE for Multiple Simple Random Sampling without Replacement
By Eugeny Gladkov (Intel)Posted 06/04/20140
Introduction Random sampling is often used when pre- or post-processing of all records of the entire data set is expensive, as in the following examples. When the file of records or database is too large, retrieval cost for one record is too high. In further physical examination of the real-worl...
Intel® Digital Random Number Generator (DRNG) Software Implementation Guide
By John Mechalas (Intel)Posted 05/14/201418
Revision 2.0 May 15, 2014 Downloads Download Intel® Digital Random Number Generator (DRNG) Software Implementation Guide [PDF 975KB]Download Intel® Digital Random Number Generator software code examples Related Software Download Rdrand manual and library (Linux* and OS X* version)Download Rd...

Pages

Subscribe to

Intel Business Client Platforms
Whether you’re developing for unmanaged small business, or enterprise-level IT departments, 3rd Generation Intel® Core™ processor-based PC and mobile platforms are designed to help you meet the needs of your customers.

 

Intel® vPro™ Technology

Intel® Small Business Advantage

Manageability (Use Cases)
Remote management features make it easy to keep PCs running smoothly and more cost effectively.

 

 

Maintenance
State-of-the-art technology makes security, data backup, updates, and routine maintenance fully automatic.

 

Security
Hardware-assisted security features allow quick deployment of patches, and remote unlocking of encrypted drives, even when the PC is off.

Performance
The visibly smart 3rd generation Intel® Core™ vPro™ processor family means improved security, manageability, and cost-effectiveness.

Virtualization
Built-in security and virtualization capabilities provide a flexible foundation for computer models of today and tomorrow.

 


Technology Capabilities

Develop Software unlocking the detect, repair and protect capabilities of Intel® vPro™ Technology. Gain access to the tools, technical information and industry expert support to help you develop software for Intel's premier business platform.

  • SECURITY
  • Intel vPro platforms are loaded with features and technologies to deliver best in class security protection. Whether it's applying advanced encryption or remotely disabling a stolen/lost PC, systems equipped with Intel vPro technology are designed to keep your data safe. Explore the many options below to see which features/technologies might fit best into your products.


    Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)

    AES (Advanced Encryption Standard), an encryption standard adopted by the U.S. government is widely used across the software ecosystem to protect network traffic, personal data, and corporate IT infrastructure. AES-NI were designed to implement some of the complex and performance intensive steps of the AES algorithm using hardware and thus accelerating the execution of the AES algorithms.


    Learn More ›


    Intel® TXT

    Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS, virtual machine monitor, and operating system.

    Learn More ›


    DIGITAL RANDOM NUMBER GENERATOR

    User Manual for the Rdrand Library (Linux Version)

    User Manual for the Rdrand Library (Windows Version)

    Intel® Secure Key is Intel's name for its new Intel® 64 Architecture instruction RdRand and its underlying Digital Random Number Generator (DRNG) hardware implementation (old code name, Bull Mountain). Intel® Secure Key provides a processor-based RNG solution that is of high quality and performance, highly available, and secure.


    Learn More ›


    Intel® Identity Protection Technology (Intel® IPT)

    Intel has built two-factor authentication directly into the processors of select 2nd generation Intel® Core™ processor-based PCs, helping to prevent unauthorized access to important personal accounts. Intel IPT allows vendors to store their OTP algorithms inside the processor itself, in a secure chipset called Intel® Management Engine (Intel® ME). Intel's hardware solution eliminates the complexity and unstable nature of OTP software solutions, as well as the user-dependent problems of tokens.

    Download Intel® IPT Installer

    If you have a strong authentication solution or component to your application, take the next step in incorporating Intel® IPT by contacting us at jennifer.l.gilburg@intel.com.


    Intel® IPT Public Key Infrastructure (PKI)

    Intel® Identify Protection Technology (Intel® IPT) is meant to augment security features that allow for user identification and encryption by adding a hardware layer of protection. Intel® IPT with Public Key Infrastructure (PKI) acts as a hardware security module, similar to a Smart Card. However, it is as easy to manage as software PKI deployments. Intel® IPT with protected transaction display further protects PKI certificates with a PIN code entry generated in Intel’s protected audio vision path (PAVP) using Intel’s integrated graphics. Display and entry of the PIN code is handled by secure hardware, making PIN theft very difficult.

    Technology Overview
  • POWER EFFICIENT PERFORMANCE
  • At the heart of the many features and capabilities of Intel vPro systems are the latest Intel® Core™ vPro™ processors. These processors provide outstanding performance while still delivering power efficiency. Review the features below and visit the Parallel Programming Community for additional threading support.


    INTEL® HYPER-THREADING TECHNOLOGY

    Intel® Hyper-Threading Technology (Intel® HT Technology)1 uses processor resources more efficiently, enabling multiple threads to run on each core. Intel® HT Technology increases processor throughput, improving overall performance on threaded software. Intel HT Technology is available on Previous Generation Intel® Core™ processors, 2nd generation Intel® Core™ processor family, and Intel® Xeon® processor family.

    An Intel® processor and chipset combined with an OS and BIOS supporting Intel HT Technology allows you to:

    • Run demanding applications simultaneously while maintaining system responsiveness
    • Keep systems more secure, efficient, and manageable while minimizing impact on productivity
    • Provide headroom for future business growth and new solution capabilities
     

    Introduction to Hyper-threading ›

    1 Available on select Intel® Core™ processors. Requires an Intel® Hyper-Threading Technology (Intel® HT Technology) enabled system. Consult your PC manufacturer. Performance will vary depending on the specific hardware and software used. For more information including details on which processors support HT Technology, visit www.intel.com/content/www/us/en/architecture-and-technology/hyper-threading/hyper-threading-technology.html.


    TURBO BOOST

    Intel has optimized Intel® Turbo Boost Technology2 to provide even more performance when needed on 2nd Generation Intel® Core™ processor based systems. Intel® Turbo Boost Technology 2.0 automatically allows processor cores to run faster than the base operating frequency if it's operating below power, current, and temperature specification limits. Intel Turbo Boost Technology 2.0 is activated when the Operating System (OS) requests the highest processor performance state (P0).

    The maximum frequency of Intel Turbo Boost Technology 2.0 is dependent on the number of active cores. The amount of time the processor spends in the Intel Turbo Boost Technology 2.0 state depends on the workload and operating environment.

    Any of the following can set the upper limit of Intel Turbo Boost Technology 2.0 on a given workload:

    • Number of active cores
    • Estimated current consumption
    • Estimated power consumption
    • Processor temperature

    When the processor is operating below these limits and the user's workload demands additional performance, the processor frequency will dynamically increase until the upper limit of frequency is reached. Intel Turbo Boost Technology 2.0 has multiple algorithms operating in parallel to manage current, power, and temperature to maximize performance and energy efficiency. Note: Intel Turbo Boost Technology 2.0 allows the processor to operate at a power level that is higher than its rated upper power limit (TDP) for short durations to maximize performance.

    2 Intel® Turbo Boost technology requires a PC with a processor with Intel Turbo Boost capability. Intel Turbo Boost performance varies depending on hardware, software and overall system configuration. Check with your PC manufacturer on whether your system delivers Intel Turbo Boost technology. See www.intel.com/technology/turboboost for more information.

Whether you’re developing 3rd Generation Intel® Core™ processor-based applications for networked systems, or creating tools for smaller businesses, this is the place for all your technical content needs.

Need advice or help? Tap into a world of expertise through our forum.


Meshcentral - Introduction & Overview
By ylian-saint-hilaire (Intel)Posted 07/03/20140
  Site Links Main site: meshcentral.com Information site: info.meshcentral.com Developer blog: intel.com/software/ylian Overview Meshcentral is an open source project under Apache 2.0 license that allows administrators to remotely manage computers over the Internet using a single web port...
Providing Hardware-based Security to Java Applications by leveraging Intel® Identity Protection Technology and Java Cryptography Extensions
By Randal Templeton (Intel)Posted 06/18/20140
Introduction Intel® Identity Protection Technology with public key infrastructure (Intel® IPT with PKI) provides the capability to generate and store RSA private keys directly in hardware. The keys can then be used for cryptographic operations such as creating and verifying digital signatures....
Using Intel® C++ Composer XE for Multiple Simple Random Sampling without Replacement
By Eugeny Gladkov (Intel)Posted 06/04/20140
Introduction Random sampling is often used when pre- or post-processing of all records of the entire data set is expensive, as in the following examples. When the file of records or database is too large, retrieval cost for one record is too high. In further physical examination of the real-worl...
Intel® Digital Random Number Generator (DRNG) Software Implementation Guide
By John Mechalas (Intel)Posted 05/14/201418
Revision 2.0 May 15, 2014 Downloads Download Intel® Digital Random Number Generator (DRNG) Software Implementation Guide [PDF 975KB]Download Intel® Digital Random Number Generator software code examples Related Software Download Rdrand manual and library (Linux* and OS X* version)Download Rd...

Pages

Subscribe to

A Developer's Introduction to Business Client Technology

The following table will help you understand which technologies are present in which 3rd Generation Intel® Core™ processors, so you can more effectively help your customers manage and streamline their business needs.

Advanced Technologies 

Intel® Core™ i3

Intel® Core™ i5 

Intel® Core™ i7

Firmware 

SBT

SBT or AMT1

SBT or AMT1

Intel® SBA Software

Yes1

Yes1

Yes1

Intel® AES-NI

No

Yes

Yes

Intel® Secure Key

No

Yes

Yes

Intel® Anti-Theft

No

Yes

Yes1

Intel® VT 

Yes (Vt-x)

Yes (Vt-x & Vt-d)

Yes (Vt-x & Vt-d)

Intel® TXT

No

Yes

Yes

1 Certain SKUs may vary. Please check your specific systems at http://ark.intel.com

For the "Un-managed" Small Business

Intel® Small Business Advantage (SBA)
Bring streamlined maintenance and security solutions to your small business customers using

Manageability

Intel® AMT Software Development Kit
The building blocks and documentation needed to develop for Intel® AMT systems
Download ›

Intel® Setup and Configuration Software (Intel® SCS)
This package provides the newest tools to set up and configure Intel® AMT Devices.
Download ›

Open Manageability Developer Toolkit
Open source tools for management for computer that supports Intel® Active Management Technology (Intel® AMT). 
Download ›

Intel® vPro Platform Solution Manager
Allows you to launch plug-in applications to remotely manage your Intel vPro Technology based PC clients. 
Download ›

Security

Intel® AES New Instructions (Intel® AES-NI)
Intel® AES-NI is a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data in the Intel® Xeon® processor family and the 3rd Generation Intel® Core™ processor family.
Download ›

Intel® Secure Key
Intel Secure Key is the name for the Intel 64 and IA-32 Architectures instruction RDRAND and its underlying Digital Random Number Generator (DRNG) hardware implementation.

  • Implementation Guide
  • Code Examples
  • Case Studies

Download ›

Intel® Trusted Execution Technology

Intel® Trusted Execution Technology (Intel® TXT) is a hardware security solution that protects IT infrastructures against software-based attacks by validating the behavior of key components within a server or PC at startup.
Learn more ›

  • Static Security Analysis (SSA)
  • Static Security Analysis (SSA) examines source code to find errors and security weaknesses, allowing you to eliminate defects early in the development cycle and proactively harden your application against security breaches.
Download ›
Virtualization

Intel® Virtualization
Intel® Virtualization models can help enhances security and manageability for your Business Client Customers.
Learn more ›

Find all the latest documentation to help with your development projects. Technical guides, case studies, code samples, videos and thought-provoking blog posts–you'll find it all here.

Manageability

Welcome to Intel® Active Management Technology (AMT)
To learn more about Intel AMT and to download the latest Software Development Kit (SDK), visit:
Intel AMT Start Here Guide 
Intel AMT SDK Download 
Intel AMT SDK Documentation

Intel® vPro™ Technology Resource Kit
The Intel® vPro™ Technology Resource Kit is a downloader tool that is a compilation of tools, utilities, and supporting documentation to simply educate you and easily walk you through the implementation of Intel vPro technology.
Learn more ›

Intel® AMT: Known Issues and Best Practices
The Known Issues, Best Practices, and Workarounds, may be very useful to many of our vPro Developers.
Learn more ›

Security

Advanced Security Features of Intel® vPro™ Technology
Intel® vPro™ technology creates a powerful platform in which security and manageability go hand in hand. Since manageability is a crucial aspect of an enterprise’s network.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Introduction AES (Advanced Encryption Standard) is an encryption standard adopted by the U.S. government starting in 2001. It is widely used across the software ecosystem to protect network traffic.
Learn more ›

Intel® AES New Instructions (Intel® AES-NI)
Overview of Intel® AES-NI, a new encryption instruction set that improves on the Advanced Encryption Standard (AES) algorithm and accelerates the encryption of data.
Learn more ›

Securing the Enterprise with Intel® AES-NI
Learn why cryptography is hot in the marketplace today, especially in the enterprise.
Learn more ›

Intel® Advanced Encryption Standard Instructions (AES-NI)
Description of the six new instructions that make up the AES-NI instruction set and perform several compute intensive parts of the AES algorithm.
Learn more ›

Intel® Trusted Execution Technology
Intel® Trusted Execution Technology (Intel® TXT) provides a hardware- based root of trust to ensure that a platform boots with a known good configuration of firmware, BIOS and virtual machine monitor.
Learn more ›

Intel® System Defense and Agent Presence Overview
System Defense and Agent Presence are security toolsets built into Intel® Active Management Technology (Intel® AMT). The System Defense and Agent Presence toolsets are targeted at closing two gaps in in the Intrusion Detection System (IDS) methods currently employed by IT:

  • The time window between the identification of an OS/Agent vulnerability and completed deployment of a corresponding patch.
  • The time between an end-user tampering with an IDS agent and detection of and acting on the tampering.
Learn more ›

 

Virtualization

Virtualization HW technical brief
Intel® Virtualization Technology (Intel® VT) provides comprehensive hardware assists that boost virtualization software performance, improve application response times and provide greater reliability, security and flexibility.
Learn more ›

Virtualization: A Developer's Friend
The more developers use virtualization, the more they find new uses for it. Dis¬cover what you’re missing and how virtualization can help you get more done.
Learn more ›

Intel® Virtualization Technology: Flash* Animation
This animation provides an overview of Intel® Virtualization Technology.
Learn more ›

Intel® Virtualization Technology: Best Practices for Software Vendors
This series of articles functions as an aid to help software vendors tailor their applications for use with Intel VT.
Learn more ›

Business Client Developer Community

This is your community. We encourage you to participate in all ways that will help you, your fellow developers, and your customers. Whether it be asking and answering questions in our forums, reading writing or commenting on blogs, working toward becoming an Intel® Black Belt Software developer, your contribution is valued and valuable!


Build your Reputation

Intel® Black Belt Software Developers
Black belt status is awarded to software developers known for technical expertise, community leadership.
Learn more ›

Gael Hofemeier
Gael is an Application Engineer at Intel (since 2000) working primarily with Business Client Technologies.

Ylian Saint-Hilaire
A senior architect at Intel, Ylian Saint-Hilaire part of a path finding group and is currently researching new ways of using Intel platform technologies.

Javier Caceres
Javier is an Project & Product Manager working on Colombian industry since 2002. He has worked on many challenging projects like Windows Kernel Mode Drivers, Intel AMT SOL, and many, many more.

Are you an IT Manager?
Visit the Intel® vPro™ Expert Center
Become an Intel® Software Partner
As an Intel® Software Partner, software companies and individuals find resources to help them develop, optimize, and market commercially available applications running on Intel platforms and technologies.
Learn more ›
How to enable AMT remotely with ACUConfig on Linux and Windows?
By John Paul Adrian G.2
Hello! we are a physics department at a large German university where we deploy several hundred desktop PCs running both Windows and Linux. We use Intel AMT to perform maintenance and administration of these computers since it helps to minimize the amount of sneaker networking we have to do. All desktop PCs are DELL OptiPlex machines, ranging from 745 series machine through 755, 760, 760, 780 and up to current machines like the OptiPlex 9080, all these machines support Intel AMT. Now, in order to use AMT, we have to enable it on these machines first which is currently quite a chore. Someone, usually a student assistant, has to walk to the machine, reboot it, enter the MBEx menu and enable AMT. Then they need to plug in a USB device holding the configuration, load it and finally reboot the machine. Quite a lot of sneaker networking with just alone over 200 Linux desktops. I am therefore currently looking into the possibilty to enable and configure AMT completely remotely. I read thro...
Intel AMT: Remote Configuration with Integration in Active Directory
By Shan A.1
Hi, can someone please explain me, how to do remote configuration of Intel AMT PC, integrating it into Active Directory? Is it possible to do such a configuration with Intel SCS or Open MDTK? Thank you in advance! Alex.
PSM aborts connecting to vPro 9 client
By mcbsys10
Hi, Today I installed vPSM_1.0.0.11634 and tried to connect to a vPro 9 client. I got the following error:   Exception: Object reference not set to an instance of an object.      Source: HLAPI Stack Trace:    at HLAPI.Wireless.WirelessWSMAN.GetLinkPolicy()    at HLAPI.Wireless.WirelessManager.GetWiFiLinkPolicy()    at HLAPI.GeneralInfo.GeneralInfoManager.RemoveWirelessIfNotSupported(List`1& supportedFeatures)    at HLAPI.GeneralInfo.GeneralInfoManager.GetSupportedFeatures()    at Intel.Manageability.Impl.AMTInstanceManager.get_SupportedFeatures()    at Intel.Ucrd.vProPlatformSolutionManager.Controls.CtrlSystem.<>c__DisplayClasse.<ConnectEx>b__9() Details: Management station is a non-vPro Thinkpad using wired Ethernet. My WiFi reports "hardware radio switch is off." Client is a Lenovo M58p with vPro firmware version 9.0.2-build 1345. It's set up in small business mode or whatever the super-simple mode is called (no certificates). I can connect fine through the ...
Intel® vPro™ Platform Solution Manager Crashing on Connect
By George B.18
I am trying to use the Intel® vPro™ Platform Solution Manager to connect to a machine.  I enter all the machine data including IP address, username, and password, but when I press connect(or let it autoconnect) I see the following error and the program crashes. Exception: Object reference not set to an instance of an object.      Source: HLAPI Stack Trace:    at HLAPI.Wireless.WirelessWSMAN.GetLinkPolicy()    at HLAPI.Wireless.WirelessManager.GetWiFiLinkPolicy()    at HLAPI.GeneralInfo.GeneralInfoManager.RemoveWirelessIfNotSupported(List`1& supportedFeatures)    at HLAPI.GeneralInfo.GeneralInfoManager.GetSupportedFeatures()    at Intel.Manageability.Impl.AMTInstanceManager.get_SupportedFeatures()    at Intel.Ucrd.vProPlatformSolutionManager.Controls.CtrlSystem.<>c__DisplayClasse.<ConnectEx>b__9() I have not modified the source code, nor do I intend to. This is from a fresh download and install.  I have .NET 3.5 and 4.1 installed and enabled. In fact I am meet...
AMT KVM - No Port Open?
By Brian P.3
I'm confused about this mysterious port that isn't open after I provision a computer into CCM. In my provisioning profile, I enable KVM and all the other redirection options, and set an RFB password but apparently this is still half-baked after a provision. For example, if I try to connect to the machine via UltraVNC I get this: I don't get a prompt for a password or anything. Just a failed to connect error. But here's the thing. If I go into the Manageability Commander, I see this: If I click into this I get an option to enable the "standard port" 5900 for RFB. Once that is done, I can use UltraVNC Viewer to connect to the machine and get to the user consent screen. So why is this not enabled when I specify in the profile to enable KVM? I killed the firewall and I still couldn't access the machine so it doesn't seem like a networking port. What exactly is the port this is referring to... something on the AMT device itself? How do I open this "port" at provision-time? I'd rather n...
AMT - Password Issues
By Brian P.11
Hi, I've been tinkering with AMT lately and thinking about using it in our environment. I've made a little test environment just to try out host-based provisioning, but I'm having some weirdness and was hoping someone could explain this behavior. One thing I can't figure out is how to get into the MEBx after I've provisioned the device. I can log into the WebUI remotely using the Digest admin username and new password, but the MEBx doesn't seem to use this password...? I thought it was the same thing, however I've tried it multiple times and can't seem to get back into MEBx. Any ideas? Another weird issue I was having was that I could log into the WebUI only through Firefox and Chrome -- Internet Explorer (11) would prompt me for credentials but would not take them... similar to how MEBx seems to be responding. However, I managed to eventually get IE to do this right by using the FQDN in the address bar instead of the IP address. The reason I'm trying to get back into MEBx is to see...
MEI support under linux - which versions of AMT are supported?
By Alan B.2
There are widespread reports in various linux fora about errors with the mei module along the lines of: [  286.232029] mei_me 0000:00:03.0: timer: connect/disconnect timeout. [  286.232038] mei_me 0000:00:03.0: unexpected reset: dev_state = ENABLED (These are pastes from a DQ35JO system - This uses AMT 3.2) AMT is enabled and I can access the web interface on this board, so my suspicion is that the MEI module doesn't talk to older AMT firmware. Can anyone confirm? If this is true, what is the _oldest_ version of AMT supported by mei?   Directly related: On vPro chipsets such as the Q35, lm-sensors cannot access any information relating to fan speeds, motherboard temperature, PSU/ram/core voltages, etc. Given that lm-sensors is _the_ linux standard for onboard environmental monitoring (there are extensions for IPMI access), this really needs addressing properly (ie: if the informatio is available via mei then a lm-sensors extension should be worked on) Thanks Alan
Problem with webui
By ivan b.3
Hi all. Need your assist. I configured AMT via RCS server. When I deploying profile without ACL - I can successfully login to webUI(through default login "admin" and MEBx password). But when in profile settings  I chose "access control list" option and added my domain account  - I got   an error when connecting to webui This webpage is not available Less The webpage at http://host.domain.com:16992/index.htm? might be temporarily down or it may have moved permanently to a new web address. Error code: ERR_ACCESS_DENIED   Please help me to solve this problem 

Pages

Subscribe to Forums