What is the Trusted Platform Module (TPM)?
TPM or Trusted Platform Module is an international standard for securing hardware using integrated cryptographic keys. TPM uses a microcontroller to store passwords, certificates, or cryptographic keys securely. The stored secret keys can then be used to authenticate the platform. TPM is often used in computers, mobile phones, and network equipment to ensure that the platform is accessed only after proper authorization. If the platform is breached or is not trustworthy for some reason, TPM can block access to the platform. And thus, it can protect the sensitive data and the cryptographic keys on the device from unauthorized third parties or attackers.
Various applications can be developed that can store secrets using TPM and use the TPM to ensure that the device is accessed only after proper authorization.
TPM was developed by the Trusted Computing Group (TCG) in 2003. TCG was formed in 1999 to implement the concept of Trusted Computing. Members of TCG include companies like Intel, AMD, IBM, Microsoft, and Cisco.
How does the TPM work? In this article, we would discuss that in detail.
In this article, we will discuss:
-
What is the Trusted Platform Module (TPM)?
-
How does the Trusted Platform Module (TPM) work?
-
What are the different types of Trusted Platform Module (TPM)?
-
Where is the Trusted Platform Module (TPM) used?
0 Comments