In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a microcontroller that can store secured information, as well as the general name of implementations of that specification. The TPM specification is the work of the TPM Work Group, under the auspices of the Trusted Computing Group.
The current version of the TPM specification is 1.2 Revision 94, published on March 29 2006.
TPM microcontroller manufacturers
Trusted Platform Module microcontrollers are produced by:
How it works
Several manufacturers are producing microchips that will be built onto a PC or laptop's motherboard during manufacturing. A Trusted Platform Module offers facilities for secure generation of cryptographic keys, the abilities to limit the use of keys (to either signing / verification or encryption / decryption(, as well as a hardware Random Number Generator. Its two most controversial features are remote attestation, binding and sealing. Remote attestation allows a remote party (such as a digital music store) to obtain an unforgeable statement detailing what software currently runs on the machine in question. Sealing and binding allow to encrypt data in such a way that it may be decrypted only in the exact same state. The first feature is seen as a potential threat to privacy by many, while the second is often seen as a herald to DRM systems of unprecedented restrictiveness. Direct anonymous attestation improves privacy, but is still considered insufficient by some.
What the future holds
Microsoft's new desktop Operating System Vista will use this technology in conjunction with BitLocker. BitLocker will encrypt the entire computer's volume for security. This is highly desirable since so many PCs and laptops are stolen and this would prevent a company's sensitive data from falling into the wrong hands. Pushing the security down to the hardware level in conjuction with software is a much better solution that just a simple system BIOS password or 3rd party software installed on the computer that can be compromised. Computers are available now for purchase.
Currently this technology uses a seperate chip for computers. In the future, this concept could be co-located on an existing motherboard chip in computers not to mention any other device to secure it, such as a cell phone.
See also
External links