Ĭomputer programs can use a TPM to authenticate hardware devices, since each TPM chip has a unique and secret Endorsement Key (EK) burned in as it is produced.
The software in charge of hashing the setup determines the extent of the summary. One could use the hash to verify that the hardware and software have not been changed. Remote attestation: Creates a nearly unforgeable hash key summary of the hardware and software configuration.Facilities for the secure generation of cryptographic keys for limited uses.Part 4 – Supporting Routines (added in TPM 2.0).Part 1 – Architecture (renamed from Design Principles).Each part consists of a document that makes up the whole of the new TPM specification. When a new revision is released it is divided into multiple parts by the Trusted Computing Group. The group continues work on the standard incorporating errata, algorithmic additions and new commands, with its most recent edition published as 2.0 in November 2019.
On Apthe Trusted Computing Group announced a major upgrade to their specification entitled TPM Library Specification 2.0. TPM Main Specification Version 1.2 was finalized on March 3, 2011, completing its revision. Trusted Platform Module (TPM) was conceived by a computer industry consortium called Trusted Computing Group (TCG), It evolved into TPM Main Specification Version 1.2 which was standardized by International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) in 2009 as ISO/IEC 11889:2009. 7.1 2017 weak key generation controversy.