• <More on Intel.com
Masthead Light

Intel® Identity Protection Technology (Intel® IPT)

Improve your level of security and prevent unauthorized access

An Added Layer of Hardware-based Security

Protecting your identity and business data stored in the cloud requires strong authentication that's ideally rooted in hardware. Hardware-based authentication is widely regarded by security experts as a more effective approach than software-only authentication.

Select PCs and other devices feature tamper-resistant, two-factor authentication built right into new Intel® Core™ vPro™ processors. Intel® Identity Protection Technology (Intel® IPT)1 helps prevent unauthorized access to your important personal and business accounts while reducing the cost of traditional hardware solutions. It also provides a simple way for web sites and businesses to validate that a user is logging in from a trusted PC.

How Does Intel® Identity Protection Technology Work?

Intel IPT with one-time password (OTP)

Intel IPT protects network and web site access points by providing enterprises with several ways to validate that a legitimate user—not malware—is logging in from a trusted platform. One option utilizes a one-time password (OTP), a unique, one-time-use, six-digit number generated every 30 seconds from an embedded processor. This tamper-proof solution operates in isolation from the operating system.1 Moreover, because the credential is protected inside the chipset, it cannot be compromised by malware or removed from the PC.

Get more details on Intel IPT with OTP >

Intel IPT with public key infrastructure (PKI)

The second way Intel IPT provides access point protection employs public key infrastructure (PKI). Enterprises already using PKI to protect their access points can further benefit from Intel IPT with PKI. This technology embeds a PKI certificate in the chipset, similar to the OTP credential. Providing hardware-level security, Intel IPT with PKI can help save enterprises the additional cost of supporting traditional smart card or token storage options.

Learn how Intel IPT with PKI enhances malware protection >

Protected transaction display

In addition to protecting web site and network access points, Intel IPT also features an encrypted I/O technology called protected transaction display. This technology creates a secure input window that allows users to enter data by means of mouse clicks instead of keystrokes. It works in conjunction with Intel IPT for OTP or PKI to confirm user presence, verify transactions, and protect a PC’s display from malware scraping by first creating a secure PIN input prior to the release of credentials.

Explore Intel IPT with protected transaction display >

Intel IPT with near field communication (NFC)

Available on select Intel-inspired Ultrabook™ devices, Intel IPT with NFC technology creates a two-factor authentication between an Ultrabook™ and an NFC-enabled credit or identity card. The credit or ID card is embedded with a chip that contains the user’s personal credit card or identity information and can be linked to the user’s Ultrabook. This can provide a safe and easy method for communicating information.  

See how NFC works >







Intel® Identity Protection Technology (Intel® IPT)

Tap-and-pay security

video icon

Jeff Kataoka demos a safer and faster online checkout experience using near field communication.

See the technologies in action >

Product and Performance Information


1. No system can provide absolute security under all conditions. Requires an Intel® Identity Protection Technology (Intel® IPT)–enabled system, including a 2nd or higher generation Intel® Core™ processor, an enabled chipset, firmware, software, and participating web site. Consult your system manufacturer. Intel assumes no liability for lost or stolen data and/or systems or any resulting damages. For more information, visit http://ipt.intel.com.