![]() ![]() During the boot process of a system, the boot code that is loaded (including firmware and the operating system components) can be measured and recorded in the TPM. The most common TPM functions are used for system integrity measurements and for key creation and use. Help ensure platform integrity by taking and storing security measurements. Use TPM technology for platform device authentication by using the TPM’s unique RSA key, which is burned into it. Generate, store, and limit the use of cryptographic keys. Some of the key advantages of using TPM technology are that you can: The chip includes multiple physical security mechanisms to make it tamper-resistant, and malicious software is unable to tamper with the security functions of the TPM. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. ![]() This topic for the IT professional describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |