
Trusted Platform Module Basics
Using TPM in Embedded Systems
- 1st Edition - July 25, 2006
- Imprint: Newnes
- Author: Steven L. Kinney
- Language: English
- Paperback ISBN:9 7 8 - 0 - 7 5 0 6 - 7 9 6 0 - 2
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 4 6 5 1 6 - 6
Clear, practical tutorial style text with real-world applications First book on TPM for embedded designers Provides a sound foundation on the TPM, helping designers take ad… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quote- Clear, practical tutorial style text with real-world applications
- First book on TPM for embedded designers
- Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
- Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification
- Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform
- This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
- The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
PRIMARY MARKET: industry training/self-education of embedded developers, computer engineers, software engineers, hardware engineersSECONDARY MARKET: Graduate-level embedded systems/computer engineering students at colleges and universities
Chapter 1. History of the Trusted Computing Group Chapter 2. Cryptographic BasicsChapter 3. Software vs. Hardware Based Security ModelsChapter 4. Hardware Design ConsiderationsChapter 5. TPM Architectural OverviewChapter 6. Root of Trust, the TPM Endorsement KeyChapter 7. Key Hierarchy and ManagementChapter 8. Platform Configuration RegistersChapter 9. TPM Command Message OverviewChapter 10. TPM Intra Message StructuresChapter 11. Anti-Replay Protection and Rolling Nonces Chapter 12. Command AuthorizationChapter 13. Communicating with the TPM, Intel’s Low Pin Count (LPC) BusChapter 14. TPM LPC Base Address Definitions and FunctionalityChapter 15. TPM Sacred Seven Command SuiteChapter 16. Compliance Vectors and Their PurposeChapter 17. TPM System Deployment Initialization Chapter 18. Establishing a TPM Owner and Owner Authorized Command SuiteChapter 19. TPM Cryptographic Command Suite Chapter 20. TPM PCR Command Suite Chapter 21. TPM Protection Profile Chapter 22. Trusted Device Driver Chapter 23. Trusted Device Driver Layer and Interface Chapter 24. Sequential Command Examples Chapter 25. Migrating to the 1.2 Version of the TPMAPPENDIX A: TPM Command List by OrdinalAPPENDIX B: TPM Error List by Return Code APPENDIX C: SMBus, An Alternate Communication ModelAPPENDIX D: Compliance Test Suite Source Code, C Source
- Edition: 1
- Published: July 25, 2006
- Imprint: Newnes
- No. of pages: 368
- Language: English
- Paperback ISBN: 9780750679602
- eBook ISBN: 9780080465166
SK
Steven L. Kinney
Affiliations and expertise
Senior Software Design Engineer, Atmel Corporation, Colorado Springs, CO, USA.Read Trusted Platform Module Basics on ScienceDirect