answersLogoWhite

0


Best Answer
Platform Integrity

The primary scope of a TPM (in combination with other TCG implementations) is to assure the integrity of a platform. In this context "integrity" means "behave as intended" and a "platform" is generically any computer platform - not limited to PCs or just Windows: Start the power-on boot process from a trusted condition and extend this trust until the OS has fully booted and applications running.

Together with the BIOS, the TPM forms a Root of Trust: The TPM contains several PCRs (Platform Configuration Registers) that allow a secure storage and reporting of security relevant metrics. These metrics can be used to detect changes to previous configurations and derive decisions how to proceed. A good example can be found in Microsoft's BitLocker Drive Encryption (see below).

Therefore the BIOS and the Operating System have the primary responsibility to utilize the TPM to assure platform integrity. Only then can applications and users running on that platform rely on its security characteristics such as secure I/O "what you see is what you get", uncompromised keyboard entries, memory and storage operations.

[edit]Disk encryption

Full disk encryption applications, such as TrueCrypt, the dm-cryptfeature of modern Linux kernels and the BitLocker Drive Encryption feature of some Windowsoperating systems, can use this technology to protect the keys used to encrypt the computer's hard disks and provide integrity authenticationfor a trusted boot pathway (i.e. BIOS, boot sector, etc.). A number of third party full disk encryption products also support the TPM chip.

[edit]Password protection

Access to keys, data or systems is often protected and requires authentication by presenting a password. If the authentication mechanism is implemented in software only, the access typically is prone to 'dictionary attacks'. Since the TPM is implemented in a dedicated hardware module, a dictionary attack prevention mechanism was built in, which effectively prevents from guessing or automated dictionary attacks, while still allowing the user for a sufficient and reasonable number of tries. With this hardware based dictionary attack prevention, the user can opt for shorter or weaker passwords which are more memorable. Without this level of protection, only passwords with high complexity would provide sufficient protection.

[edit]Other uses and concerns

Almost any encryption-enabled application can in theory make use of a TPM, including:

Other uses exist, some of which give rise to privacyconcerns. The "physical presence" feature of the TPM addresses some of these concerns by requiring BIOS-level confirmation for operations such as activating, deactivating, clearing or changing ownership of the TPM by someone who is physically present at the console of the machine.[6][7]

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is trusted platform module used for?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does a trusted platform module (TPM) allow?

CAC authentication


Who developed the platform Integrity?

The platform of Integrity was developed by the Trusted Platform Group for computing. Integrity is just a small part of Trusted Platform Module. Integrity in this case means that it behaves as it was intended to.


Trusted platform module is required for newly issued computers and laptops?

False


The Purpose of the Trusted Platform Module is?

Store encryption keys that can be used to encrypt and decrypt secondary storage areas like the hard disk


Which chip on the motherboard does Windows Bitlocker Encryption use to secure the hard drive?

Trusted Platform Module Chip or TPM.


Which chip on the motherboard does window bit-locker encryption use to secure the hard drive?

It uses the trusted platform module (TPM).


A network administrator is looking for a technology that includes both hardware and software authentication Which technology could the administrator use?

Trusted Platform Module (TPM)


What does a trusted platform modul allow?

CAC authentication


What does tpm mean in computers?

A trusted platform module (TPM) is a chip that handles FDE (full-disk encryption) and other encryption-based security on a computer. It is primarily used in operating systems such as Windows 7 and 8 with the advent of BitLocker, which if enabled will disallow you from using the hard disk in another computer.


Where can you enable the trusted platfom module tpm option?

system bios


What hardware component is needed to set up Bit Locker Encryption so that you can authenticate the computer?

TPM (Trusted Platform Module) chip. The TPM chip holds the BitLocker encryption key (also called the startup key).


Businesses Insiders is a trusted and well known guest post services provider platform that is used by bloggers, SEO exerts, and other digital marketers?

Yes