To realize the full benefit of a TPM, the OEM must carefully integrate system hardware and firmware with the TPM to send it commands and react to its responses. TPMs are passive: they receive commands and return responses. Some newer TPM implementations integrate TPM functionality into the same chipset as other platform components while still providing logical separation similar to discrete TPM chips. Although discrete TPM implementations are still common, they can be problematic for integrated devices that are small or have low power consumption. Such implementations allow the computer's original equipment manufacturer (OEM) to evaluate and certify the TPM separate from the rest of the system. Historically, TPMs have been discrete chips soldered to a computer's motherboard. The TPM helps with all these scenarios and more. Protecting data through encryption and decryption, protecting authentication credentials, and proving which software is running on a system are basic functionalities associated with computer security. The TPM is a cryptographic module that enhances computer security and privacy. This article offers an overview of the TPM, describes how it works, and discusses the benefits that TPM brings to Windows and the cumulative security impact of running Windows on a device with a TPM. To achieve many of these security enhancements, Windows makes extensive use of the Trusted Platform Module (TPM). The Windows operating system places hardware-based security deeper inside many features, maximizing platform security while increasing usability.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |