Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

TPM concepts and functionality

TPM concepts and functionality

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This chapter discussed the concepts and functionality of trusted platform modules. TPMs are designed to have an owner: a single party, which could be a person for a consumer TPM or an entire IT department for an enterprise machine, who is responsible for configuring the TPM appropriately. The TPM owner is not equivalent to a root or administrator account in an OS; the owner cannot read secrets belonging to other TPM users, or use the owner password to bypass other access controls. The owner does, however, have a few useful unique powers compared to other users.

Chapter Contents:

  • 3.1 Ownership and authority
  • 3.2 Root keys and primary seeds
  • 3.2.1 TPM 1.2 root keys
  • 3.2.2 TPM 2.0 primary seeds and hierarchies
  • 3.2.2.1 The platform hierarchy
  • 3.2.2.2 The storage hierarchy
  • 3.2.2.3 The endorsement hierarchy
  • 3.2.2.4 Which hierarchy to use
  • 3.3 Non-root keys
  • 3.3.1 Root and non-root key relationships
  • 3.3.2 Externally created keys and the TPM
  • 3.4 Key certification
  • 3.5 Roots of trust for measurement
  • 3.6 Platform configuration registers
  • 3.7 Quotes
  • 3.8 NVRAM and key storage
  • 3.9 Utility functions
  • 3.10 Access control mechanisms
  • 3.11 Cryptographic algorithms
  • 3.12 Communicating securely with the TPM
  • 3.13 The TPM in action
  • 3.13.1 Possible TPM states
  • 3.13.2 Reboots, and why they matter
  • 3.13.3 Clearing: erasing your TPM

Inspec keywords: trusted computing

Other keywords: owner password; trusted platform modules; TPM; access controls

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

TPM concepts and functionality, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch3-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch3-2.gif

Related content

content/books/10.1049/pbpc013e_ch3
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address