Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Other TPM features

Other TPM features

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter discusses many of the TPM's small but useful features that didn't fit well elsewhere in this book. Nothing in this chapter is critical for making use of theTPM; however, everything here serves a useful purpose in certain circumstances. We'll begin with the functions with the broadest applicability, including clearing the TPM of data, using the TPM's RNG, managing the TPM's internal configuration information, and creating an archive. Later in this chapter, we'll cover more specialpurpose features such as monotonic counters, delegation, and timing capabilities.

Chapter Contents:

  • 10.1 The smorgasbord
  • 10.2 Clearing the TPM
  • 10.2.1 Revoking trust in an EK
  • 10.2.2 Clearing user stories
  • 10.3 Random number generation
  • 10.3.1 Random number user stories
  • 10.4 TPM configuration
  • 10.4.1 Configuration in 1.2
  • 10.4.2 Configuration in 2.0
  • 10.4.3 Configuration user stories
  • 10.5 Monotonic counters
  • 10.5.1 Monotonic counter user stories
  • 10.6 Storing extra keys in the TPM
  • 10.6.1 Persistent key user stories
  • 10.7 Command auditing
  • 10.7.1 Command audit user stories
  • 10.8 Field upgrades
  • 10.9 1.2-exclusive features
  • 10.9.1 Temporarily deactivating the TPM
  • 10.9.2 Maintenance archives
  • 10.9.2.1 Maintenance archive user stories
  • 10.9.3 Delegation
  • 10.9.3.1 Delegation user stories
  • 10.9.4 Tickstamps
  • 10.9.4.1 Tickstamp user stories
  • 10.10 2.0-exclusive features
  • 10.10.1 Cryptographic primitives
  • 10.10.2 Clocks and attesting to local time

Inspec keywords: trusted computing

Other keywords: monotonic counters feature; timing capabilities; TPM archive; TPM features; delegation feature; trusted platform module; TPM internal configuration information; data clearing

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Other TPM features, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch10-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch10-2.gif

Related content

content/books/10.1049/pbpc013e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address