Trusted Platform Module: Difference between revisions

Content deleted Content added
Spread: Fixed an absolutely unreadable sentence. I have doubts about the truth of the last sentence, but there is already a citation needed, so I am only changing wording.
FrescoBot (talk | contribs)
m Bot: link syntax/spacing and minor changes
Line 36:
With this hardware based dictionary attack prevention, the user can opt for shorter or weaker passwords which are more memorable. Without this level of protection, only passwords with high complexity would provide sufficient protection.
 
===Other uses and concerns ===
Almost any encryption-enabled application can in theory make use of a TPM, including:
*[[Digital rights management]]
Line 43:
Other uses exist, some of which give rise to [[privacy]] concerns. The "physical presence" feature of the TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of the TPM by someone who is physically present at the console of the machine.<ref name="TCPA">{{cite book|url=http://books.google.com/books?id=EWk2pLY7atgC|title=Trusted computing platforms:sds TCPA technology in context|author=Siani Pearson, Boris Balacheff|publisher=Prentice Hall|year=2002|isbn=0130092207}}</ref><ref name="SetPhysicalPresenceRequest">{{cite web|url=http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx|title=SetPhysicalPresenceRequest Method of the Win32_Tpm Class|publisher=[[Microsoft]]|accessdate=2009-06-12}}</ref>
 
The TPM is also known by the name of the (former) [[United States Senate|United States Senator]] [[Fritz Hollings|Ernest "Fritz" Hollings]]. The name, "Fritz chip" was coined by [[Ross J. Anderson (professor)|Professor Ross Anderson]], author of "Security Engineering" and Professor at the [[University of Cambridge]] <ref>{{cite web
| url = http://www.cl.cam.ac.uk/~rja14/tcpa-faq.html
| title = Trusted Computing FAQ
Line 73:
==Countries where TPM cannot be legally deployed==
 
*[[China|China]]<ref name="TCG_presentation_low_cost_strong_authentication_with_tpm">{{cite web
| url = http://www.trustedcomputinggroup.org/files/resource_files/346839FC-1A4B-B294-D00AFF9CB5A75CB4/TCG%20%20Seminar%20RSA%20Conference%202011%20Keynote.pdf
| title = Low Cost, Strong Authentication with TPM
Line 86:
| publisher = [[Microsoft TechNet]]
}}</ref>
*[[Russia|Russia]]<ref name="TCG_presentation_low_cost_strong_authentication_with_tpm"></ref><ref name="Technet"></ref><ref>{{cite web
| url = http://h18004.www1.hp.com/products/servers/proliantstorage/questionsanswers.html#8a
| title = HP Trusted Platform Module
Line 93:
| publisher = [[Hewlett-Packard]]
}}</ref>
*[[Belarus|Belarus]]<ref name="TCG_presentation_low_cost_strong_authentication_with_tpm"></ref>
*[[Kazakhstan|Kazakhstan]]<ref name="TCG_presentation_low_cost_strong_authentication_with_tpm"></ref>
 
==Spread==
Line 118:
{{Reflist|2}}
 
==External links ==
* [https://www.trustedcomputinggroup.org/home Trusted Computing Group]
** [https://www.trustedcomputinggroup.org/specs/TPM/ Specifications]