Is there a restore concept in case of destruction or malfunction of the TPM?
Yes. The TPM hardware key typically is not used to store recoverable secrets; however, the TPM key is used to store intermediate keys, which are used to encrypt resources. Just as with any cryptographic keys, there are mechanisms to store and recover them. This is generally done with software; in the NGSCB architecture, the operating system will provide this function.