FACTOID # 16: In the 2000 Presidential Election, Texas gave Ralph Nader the 3rd highest popular vote count of any US state.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Trusted Platform Module

In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called "TPM chip", "Fritz chip" or "TPM Security Device" (Dell). The TPM specification is the work of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 103, published on July 9, 2007.[1] For the formal concept of computation, see computation. ... Specification may refer to several different concepts: Specification (standards) refers to specific standards Specificatio - a legal concept Specification (regression) refers to the practice of translating theory into a regression model Category: ... A secure cryptoprocessor is a dedicated computer for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. ... The German Lorenz cipher machine, used in World War II for encryption of very high-level general staff messages Cryptography (or cryptology; derived from Greek κρυπτός kryptós hidden, and the verb γράφω gráfo write or λεγειν legein to speak) is the study of message secrecy. ... A key is a piece of information that controls the operation of a cryptography algorithm. ... The Fritz-chip is a nickname for the hardware component of a software-execution monitoring system. ... This article is about the corporation Dell, Inc. ... TCG logo The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative led by AMD, Hewlett-Packard, IBM, Infineon, Intel, Lenovo, Microsoft, and Sun Microsystems to implement trusted computing. ... is the 190th day of the year (191st in leap years) in the Gregorian calendar. ... Year 2007 (MMVII) was a common year starting on Monday of the Gregorian calendar in the 21st century. ...

Contents

Overview

A Trusted Platform Module offers facilities for the secure generation of cryptographic keys, and limitation of their use, in addition to a hardware pseudo-random number generator. It also includes capabilities such as remote attestation and sealed storage. Remote attestation creates a nearly unforgeable hash key summary of the hardware and software configuration. The extent of the summary of the software is decided by the program encrypting the data . This allows a third party to verify that the software has not been changed. Sealing encrypts data in such a way that it may be decrypted only if the TPM releases the associated decryption key, which it only does for software that can provide the same password that was supplied when software "ownership" of the TPM was initially configured.[2] Binding encrypts data using the TPM endorsement key, a unique RSA key burned into the chip during its production, or another trusted key descended from it. The German Lorenz cipher machine, used in World War II for encryption of very high-level general staff messages Cryptography (or cryptology; derived from Greek κρυπτός kryptós hidden, and the verb γράφω gráfo write or λεγειν legein to speak) is the study of message secrecy. ... A key is a piece of information that controls the operation of a cryptography algorithm. ... For other uses, see Hardware (disambiguation). ... A random number generator is a computational or physical device designed to generate a sequence of elements (usually numbers), such that the sequence can be used as a random one. ... Logo of Trusted Computing Group, an initiative to implement Trusted Computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ... Logo of Trusted Computing Group, an initiative to implement Trusted Computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ... In cryptography, a cryptographic hash function is a hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. ... Logo of Trusted Computing Group, an initiative to implement Trusted Computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ... In cryptography, RSA is an algorithm for public-key cryptography. ...


A Trusted Platform Module can be used to authenticate hardware devices. Since each TPM chip has a unique and secret RSA key burned in as it is produced, it is capable of performing platform authentication. For example, it can be used to verify that a system seeking access is the expected system. In cryptography, RSA is an algorithm for public-key cryptography. ... For other uses of the terms authentication, authentic and authenticity, see authenticity. ...


Generally, pushing the security down to the hardware level in conjunction with software provides more protection than a software-only solution that is more easily be compromised by an attacker. However even where a TPM is used, the key is still vulnerable while a software application that has obtained it from the TPM is using it to perform encryption/decryption operations, as has been illustrated in the case of a cold boot attack. A key is a piece of information that controls the operation of a cryptography algorithm. ...


Uses

Disk encryption

Full disk encryption applications, such as the BitLocker Drive Encryption feature of Microsoft's Windows Vista and Windows Server 2008 operating systems, can use this technology to protect the keys used to encrypt the computer's operating system volume and provide integrity authentication for a trusted boot pathway (i.e. BIOS, boot sector, etc.) A number of third party full disk encryption products also support the TPM chip. BitLocker Drive Encryption is a data protection feature integrated into Microsofts Windows Vista operating system that provides encryption for the entire OS volume. ... Microsoft Corporation, (NASDAQ: MSFT, HKSE: 4338) is a multinational computer technology corporation with global annual revenue of US$44. ... Windows Vista (pronounced ) is a line of operating systems developed by Microsoft for use on personal computers, including home and business desktops, laptops, Tablet PCs, and media centers. ... Windows Server 2008 is the most recent release of Microsoft Windowss server line of operating systems. ... An operating system (OS) is a software that manages computer resources and provides programmers with an interface used to access those resources. ... An operating system (OS) is a software that manages computer resources and provides programmers with an interface used to access those resources. ... Introduction and Definition In the context of computer operating systems, volume is the term used to describe a single accessible storage area with a single filesystem, typically (though not necessarily) resident on a single partition of a hard disk. ... For other uses of the terms authentication, authentic and authenticity, see authenticity. ... For other uses, see Bios. ... A boot sector is a sector of a hard disc, floppy disc, or similar data storage device that contains code for bootstrapping programs (usually, but not necessarily, operating systems) stored in other parts of the disc. ...


Other uses

Almost any encryption-enabled application can in theory make use of a TPM, including:

These potential other uses have given rise to privacy concerns. Consequently, to address these concerns, the TPM chip cannot be enabled via software alone - a "physical presence request" operation is required, whereby a human sitting at the computer must acknowledge the request to activate the device via a prompt at BIOS level.[3] Furthermore, each application that uses the TPM must register a unique passphrase when it takes ownership of the TPM in order to prevent other applications from also making unauthorized use of the TPM while it's enabled.[4] Future operating systems are expected to have increased TPM support for additional cryptographic features. Digital rights management (DRM) is an umbrella term that refers to access control technologies used by publishers and copyright holders to limit usage of digital media or devices. ... A software license is a legal agreement which may take the form of a proprietary or gratuitous license as well as a memorandum of contract between a producer and a user of computer software. ... A password is a form of secret authentication data that is used to control access to a resource. ... Privacy is the ability of an individual or group to control the flow of information about themselves and thereby reveal themselves selectively. ... For other uses, see Bios. ...


TPM Hardware

Starting in 2006, many new laptop computers have been sold with a Trusted Platform Module chip built-in. In the future, this concept could be co-located on an existing motherboard chip in computers, or any other device where a TPM's facilities could be employed, such as a cell phone. Intel is planning to integrate the TPM capabilities into the southbridge chipset in 2008.[5] A motherboard is the central or primary circuit board making up a complex electronic system, such as a modern computer. ... Intel Corporation (NASDAQ: INTC, SEHK: 4335), founded in 1968 as Integrated Electronics Corporation, is an American multinational corporation that is best known for designing and manufacturing microprocessors and specialized integrated circuits. ... This article does not cite any references or sources. ...


Trusted Platform Module microcontrollers are currently produced by:

Atmel ATMEGA32 microcontroller Atmel AT90S2333 microcontroller Atmel Corporation (NASDAQ: ATML) is a manufacturer of semiconductors, founded in 1984. ... Broadcom Corporation is a leading American supplier of integrated circuits (ICs) for broadband communications. ... Infineon Technologies is a German manufacturer of integrated circuits and related products. ... Intel redirects here. ... Intel AMT web page available even when the computer is sleeping. ... STMicroelectronics is an international leading supplier of semiconductors. ... Winbond Electronics Corporation is a Taiwan-based corporation which was founded in 1987 and is a producer of semiconductors and several types of integrated circuits, most notably Dynamic RAM, Static RAM and microcontrollers. ...

See also

The German Lorenz cipher machine, used in World War II for encryption of very high-level general staff messages Cryptography (or cryptology; derived from Greek κρυπτός kryptós hidden, and the verb γράφω gráfo write or λεγειν legein to speak) is the study of message secrecy. ... The Hengzhi chip is a a microcontroller that can store secured information , designed by the Peoples Republic of China government and manufactured in China . ... The Next-Generation Secure Computing Base (NGSCB), formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial Trusted Computing concept on future versions of the Microsoft Windows operating system. ... Logo of Trusted Computing Group, an initiative to implement Trusted Computing Trusted Computing (commonly abbreviated TC) is a technology developed and promoted by the Trusted Computing Group (TCG). ...

References

  1. ^ Trusted Platform Module (TPM) Specifications. Trusted Computing Group.
  2. ^ TakeOwnership Method of the Win32_Tpm Class. Microsoft. Retrieved on 2008-05-27.
  3. ^ SetPhysicalPresenceRequest Method of the Win32_Tpm Class. Microsoft. Retrieved on 2008-05-20.
  4. ^ TakeOwnership Method of the Win32_Tpm Class. Microsoft. Retrieved on 2008-05-20.
  5. ^ Microsoft PowerPoint - GovSec Presentation_052505_v05.ppt

Microsoft Corporation, (NASDAQ: MSFT, HKSE: 4338) is a multinational computer technology corporation with global annual revenue of US$44. ... 2008 (MMVIII) is the current year, a leap year that started on Tuesday of the Anno Domini (or common era), in accordance with the Gregorian calendar. ... is the 147th day of the year (148th in leap years) in the Gregorian calendar. ... Microsoft Corporation, (NASDAQ: MSFT, HKSE: 4338) is a multinational computer technology corporation with global annual revenue of US$44. ... 2008 (MMVIII) is the current year, a leap year that started on Tuesday of the Anno Domini (or common era), in accordance with the Gregorian calendar. ... is the 140th day of the year (141st in leap years) in the Gregorian calendar. ... Microsoft Corporation, (NASDAQ: MSFT, HKSE: 4338) is a multinational computer technology corporation with global annual revenue of US$44. ... 2008 (MMVIII) is the current year, a leap year that started on Tuesday of the Anno Domini (or common era), in accordance with the Gregorian calendar. ... is the 140th day of the year (141st in leap years) in the Gregorian calendar. ...

External links

  • Trusted Computing Group
  • Device Authentication-The answer to attacks launched using stolen passwords?
  • LWN: OLS: Linux and trusted computing
  • GRC podcast: Trusted Platform Module (TPM) (TPM content starts 27 minutes 30 seconds in.)
  • TPM Setup (for Mac OS X)
  • Trusted Computing Group Bulletin on the Security of the Trusted Platform Module (TPM) February 2008
  • Take Control of TCPA

  Results from FactBites:
 
Solutions :: Trusted Platform Module FAQs | Wave Systems Corp. (707 words)
A Trusted Platform Module (TPM) is a microcontroller located on the motherboard of a PC that stores passwords, digital certificates and cryptographic keys.
TPMs can also be used to authenticate a PC as each chip is unique to the PC on which it is housed.
A. No. The TPM is meant to protect passwords, encryption keys, certificates and other sensitive data such as biometric information, maintaining privacy for each individual user who is enabled to use the TPM on that system.
Trusted Platform Module - Wikipedia, the free encyclopedia (458 words)
In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a microcontroller that can store secured information, as well as the general name of implementations of that specification.
The TPM specification is the work of the TPM Work Group, under the auspices of the Trusted Computing Group.
In a more general sense, the Trusted Platform Module is part of a broader move towards the controversial concept of Trusted Computing.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m