What is a TPM?
The TPM is a microcontroller that stores keys, passwords and digital certificates. It typically is affixed to the motherboard of a PC. It potentially can be used in any computing device that requires these functions. The nature of this silicon ensures that the information stored there is made more secure from external software attack and physical theft. Security processes, such as digital signature and key exchange, are protected through the secure TCG subsystem. Access to data and secrets in a platform could be denied if the boot sequence is not as expected. Critical applications and capabilities such as secure email, secure web access and local protection of data are thereby made much more secure. TPM capabilities also can be integrated into other components in a system.
A TPM or Trusted Platform Module is a chip that is integrated into your systems motherboard that stores information such as passwords, keys and certificates. The nature of this chip ensures that the information stored within is secure from external attack and physical theft. For further information visit the Trusted Computing Group TPM FAQs Website.
A TPM is a microchip designed to provide basic security-related functions, primarily involving encryption keys. The TPM is usually installed on the motherboard of a desktop or portable computer, and communicates with the rest of the system by using a hardware bus. Computers that incorporate a TPM have the ability to create cryptographic keys and encrypt them so that they can be decrypted only by the TPM. This process, often called “wrapping” or “binding” a key, can help protect the key from disclosure. Each TPM has a master wrapping key, called the Storage Root Key (SRK), which is stored within the TPM itself. The private portion of a key created in a TPM is never exposed to any other component, software, process, or person. Computers that incorporate a TPM can also create a key that has not only been wrapped, but is also tied to specific hardware or software conditions. This is called “sealing” a key. When a sealed key is first created, the TPM records a snapshot of configuration valu
TPM stands for Technical Protection Measure. This term describes technologies that allow music, publishing and video companies to secure and protect their content from unauthorised use. TPMs can be used to allow a limited degree of private copying, where such copying can be considered as part of the normal or ‘fair’ use of the work. The Impact on technology industries section contains more information about TPM technology and its applications.