

The primary scope of TPM is to ensure the integrity of a platform. Security embedded in hardware provides more protection than a software-only solution.

Ĭomputer programs can use a TPM to authenticate hardware devices, since each TPM chip has a unique and secret Endorsement Key (EK) burned in as it is produced. Other Trusted Computing functions for the data to be decrypted (unsealed).Sealing: Similar to binding, but in addition, specifies the TPM state for the data to be decrypted (unsealed).Binding: Encrypts data using the TPM bind key, a unique RSA key descended from a storage key.
Acs technologies support software#
The software in charge of hashing the setup determines the extent of the summary. One could use the hash to verify that the hardware and software have not been changed.
Acs technologies support upgrade#
On April 9th, 2014 the Trusted Computing Group announced a major upgrade to their specification entitled TPM Library Specification 2.0. TPM Main Specification Version 1.2 was finalized on March 3, 2011, completing its revision. Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG), It evolved into TPM Main Specification Version 1.2 which was standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) in 2009 as ISO/IEC 11889:2009.
