In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a microcontroller that can store secured information, as well as the general name of implementations of that specification. The TPM specification is the work of the TPM Work Group, under the auspices of the Trusted Computing Group. The current version of the TPM specification is 1.2 Revision 94, published on March 29 2006.
In a more general sense, the Trusted Platform Module is part of a broader move towards the controversial concept of Trusted Computing.
TPM microcontroller manufacturers
Trusted Platform Module microcontrollers are produced by:
What it does
Several manufacturers are producing microchips that will be built onto a PC or laptop's motherboard during manufacturing. A Trusted Platform Module offers facilities for secure generation of cryptographic keys, the abilities to limit the use of keys (to either signing / verification or encryption / decryption), as well as a hardware Random Number Generator. Its two most controversial features are remote attestation, binding and sealing. Remote attestation creates an unforgeable summary of the software on a computer, allowing a third party (such as a digital music store) to verify that the software has not been compromised. Sealing and binding allow to encrypt data in such a way that it may be decrypted only in the exact same state. The first feature is seen as a potential threat to privacy by many, while the second is often seen as a herald to DRM systems of unprecedented restrictiveness. Direct anonymous attestation improves privacy, but is still considered insufficient by some.
Uses
Microsoft's new desktop operating system Windows Vista will use this technology as part of the feature BitLocker Drive Encryption. BitLocker will encrypt the entire computer's volume for security. This is highly desirable since so many PCs and laptops are stolen and this would prevent a company's sensitive data from falling into the wrong hands. Pushing the security down to the hardware level in conjunction with software is a much better solution than just a simple system BIOS password or 3rd party software installed on the computer that can be compromised.
Currently this technology uses a separate chip for computers. In the future, this concept could be co-located on an existing motherboard chip in computers, not to mention any other device to secure it, such as a cell phone.
See also
- Trusted Computing
- Trusted Computing Group
- Cryptography
- Next-Generation Secure Computing Base (formerly known as Palladium)
External links