White Paper: Infineon Trusted Platform Module Security Conformance
ثبت نشده
چکیده
To insure that a Trusted Platform Module (TPM) has been manufactured according to high security standards, Trusted Computing Group (TCG) specifications are accomplished by conformance tests. Conformance describes the correct and secure implementation of a TPM according to the specification and the respective protection profile. Conformance with a protection profile and security target, which both define security properties on a more general level, is evaluated according to the Common Criteria evaluation scheme.
منابع مشابه
Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification
The Trusted Platform Module (TPM) is a device that can be used to enhance the security of web applications. However, the TPM has to be used in a proper manner in order to benefit from its security properties. A threat model will contribute towards developing a better understanding of how to use the TPM and serve as a reference for future work. In this paper, a web application scenario based on ...
متن کاملTrusted Firmware Services Based on TPM
How to build trusted firmware platform has been a research hot in computer security community. In this paper, a novel entrusted firmware services under UEFI framework are proposed, which exploits the high safety of Trusted Platform Module (TPM) root and uneditability of firmware for building the trusted platform in code modification checking, user identity authenticating, hard disk attestation ...
متن کاملIntegrating the Trusted Computing Platform into the Security of Cloud Computing System
Cloud computing has become one of the fastest growing fields in computer science. As the new computing service pattern of cloud computing develops rapidly, the security problem of cloud computing has become a hot research topic. Before the user passes important data or computing task to the cloud, the user of the cloud may want to verify the trusted status of the platform which actually carries...
متن کاملSecuring a Firm’s Computer Operating System: Trusted Platform Module
Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security features. We also discuss the applications and future of TPM. In ...
متن کاملResearch of Trusted Network Architecture in Wireless sensor Networks
Recently, there are many trust management solutions are proposed for wireless sensor networks. Current decentralized trust-management research focuses mainly on trust models and algorithms, whereas trust evaluation isn’t related with certainty specific application. But, in WSNs the trust management solutions should adapt to different application scenarios. In addition, potential merits of hardw...
متن کامل