Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Provisioning: getting the TPM ready to use

Provisioning: getting the TPM ready to use

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Trusted Platform Modules: Why, when and how to use them — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Provisioning generally has two goals: setting up the necessary initial configuration and establishing trust in the TPM. TPMs today do not come ready to use. Every TPM, whatever the version, needs to have some initial values provisioned before the TPM can generate and use keys; without keys, none of the TPM's features work. What the initial values are varies from version to version. Provisioning can in some cases also determine who has permission to use certain TPM functionality.

Chapter Contents:

  • 5.1 Provisioning: what it means, and why it matters
  • 5.2 Basic steps of 1.2 TPM provisioning
  • 5.2.1 Setting up a 1.2 TPM
  • 5.2.1.1 Turning on the 1.2 TPM
  • 5.2.1.2 Testing to see if your 1.2 TPM is really on
  • 5.2.1.3 Creating an EK
  • 5.2.1.4 Taking ownership
  • 5.2.2 Establishing trust in a 1.2 TPM
  • 5.2.2.1 Establishing trust: high-and low-security approaches
  • 5.2.2.2 Trust beyond the EK: provisioning identities and other keys
  • 5.3 2.0 TPM provisioning and hierarchies
  • 5.3.1 Changing hierarchy authorizations
  • 5.3.2 Changing the hierarchy seeds
  • 5.3.3 Creating primary keys and objects
  • 5.4 Multiversion TPMs
  • 5.5 TPM provisioning user stories
  • 5.5.1 User stories: turning the TPM on
  • 5.5.2 User stories: establishing trust in the TPM
  • 5.5.3 User stories: taking ownership
  • 5.6 Remote verification of TPM keys
  • 5.6.1 Certification: 1.2 TPM keys and PKI
  • 5.6.2 Certification: the homegrown approach
  • 5.7 Provisioning-time key certification user stories

Inspec keywords: trusted computing; cryptography

Other keywords: the; TPM functionality; TPM provisioning; trust establishment; key generation

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Provisioning: getting the TPM ready to use, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch5-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch5-2.gif

Related content

content/books/10.1049/pbpc013e_ch5
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address