| Table of ContentsPPT Slide Who We Are Security Research in IBM Topics covered Goal: A Secure System Research Design Goal #1 Research Design Goal #2 Practical Goals and Constraints Designing and Building a System What We Built 4758 Cryptographic Coprocessor 4758 Coprocessor Hardware 4758 Coprocessor Software Layer 2 Software Architecture The Kernel Communications,                    Host-to-Coprocessor Secure Persistent Storage Public Key Cryptography DES Random Number Generation The Application Layer Hindsight Implementation Issues Integration issues API Extensions to-date Summary of Services |