Trusted Platform Module (Tpm) Summary

TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely store artifacts used to lớn authenticate the platkhung (your PC or laptop).

Bạn đang xem: Trusted platform module (tpm) summary

TPM (Trusted Platsize Module) is a computer chip (microcontroller) that can securely store artifacts used to lớn authenticate the platsize (your PC or laptop). These artifacts can include passwords, certificates, or encryption keys. A TPM can also be used to store platsize measurements that help ensure that the platsize remains trustworthy. Authentication (ensuring that the platsize can prove sầu that it is what it claims khổng lồ be) và attestation (a process helping to prove that a platform is trustworthy & has not been breached) are necessary steps khổng lồ ensure safer computing in all environments.
Trusted modules can be used in computing devices other than PCs, such as mobile phones or network equipment.

Picture 1: Components of a TPM


The nature of hardware-based cryptography ensures that the information stored in hardware is better protected from external software attacks. A variety of applications storing secrets on a TPM can be developed. These applications make it much harder khổng lồ access information on computing devices without proper authorization (e.g., if the device was stolen). If the configuration of the platform has changed as a result of unauthorized activities, access lớn data & secrets can be denied and sealed off using these applications.

However, it is important to understand that TPM cannot control the software that is running on a PC. TPM can store pre-run time configuration parameters, but it is other applications that determine and implement policies associated with this information.Processes that need to secure secrets, such as digital signing, can be made more secure with a TPM. And mission critical applications requiring greater security, such as secure gmail or secure document management, can offer a greater level of protection when using a TPM. For example, if at boot time it is determined that a PC is not trustworthy because of unexpected changes in configuration, access to lớn highly secure applications can be blocked until the issue is remedied (if a policy has been phối up that requires such action). With a TPM, one can be more certain that artifacts necessary to sign secure email messages have sầu not been affected by software attacks. And, with the use of remote attestation, other platforms in the trusted network can make a determination, khổng lồ which extent they can trust information from another PC. Attestation or any other TPM functions vày not transmit personal information of the user of the platsize.

Xem thêm: 1 Khối Rác Bằng Bao Nhiêu Kg, Thu Phí Rác Thải Tính Theo Khối Lượng

These capabilities can improve sầu security in many areas of computing, including e-commerce, citizen-to-government applications, online banking, confidential government communications and many other fields where greater security is required. Hardware-based security can improve sầu protection for VPN, wireless networks, tệp tin encryption (as in Microsoft’s BitLocker) & password/PIN/credentials’ management. TPM specification is OS-agnostic, and software stacks exist for several Operating Systems.

TPMs (current version is 1.2) use the following cryptographic algorithms: RSA, SHA1, & HMAC.

The Trusted Computing Group (TCG) is an international de facto standards toàn thân of approximately 120 companies engaged in creating specifications that define PC TPMs, trusted modules for other devices, trusted infrastructure requirements, APIs and protocols necessary to operate a trusted environment. After specifications are completed, they are released khổng lồ the technology community and can be downloaded from the TCG Web Site.

Without standard security procedures & shared specifications, it is not possible for components of the trusted environment lớn interoperate, and trusted computing applications cannot be implemented to work on all platforms. A proprietary solution cannot ensure global interoperability & is not capable of providing a comparable level of assurance due to more limited access lớn cryptographic & security expertise and reduced availability for a rigorous Đánh Giá process. From the point of view of cryptography, for interoperability with the other elements of the platkhung, other platforms, and infrastructure, it is necessary for trusted modules to be able to use the same cryptographic algorithms, Although standard published algorithms may have weaknesses, these algorithms are thoroughly tested & are gradually replaced or improved when vulnerabilities are discovered. This is not true in the case of proprietary algorithms.

According lớn market retìm kiếm reports, over 100 million branded PCs & laptops with TPMs were sold in 2007. Server produces are beginning to ship, & a variety of applications based on TPM, such as secure email or file encryption, have sầu been implemented using TCG specifications. Trusted Network Connect (TNC) products that use TCG principles lớn enhance the security of communications are shipping, too. Draft specifications for storage (for hard drives) và thiết bị di động trusted modules (for điện thoại telephones) have been released.

Nổ hũ club online uy tín | link tải 567live app|W88 | ứng dụng qqlive download| tải mmlive apk | b52 club - Game đánh bài online hot nhất VN