TPM

The Trusted Platform Module (TPM) is a hardware device that is basically a secure micro-controller (a chip) with added cryptographic functionality. The purpose of the Trusted Platform Module is to work with supporting software and firmware to prevent unauthorized access to a notebook computer and devices. The TPM contains a hardware engine to perform up to 2048-bit RSA encryption/decryption.

The TPM uses its built-in RSA engine during digital signing and key wrapping operations. Most modern computers have a TPM or you can purchase as a module if you build your own computer. Today software platforms including Microsoft BitLocker and many others automatically use a TPM to transparently encrypt your files.

The TPM Technical Specification

The TPM technical specification is an International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC) standard and was first proposed by the Trusted Computing Group (TCG) consortium in 2008 (see Trusted Platform Module Summary).

TPM 2.0

The TPM 2.0 library specification was released October, 2014. Changes and enhancements compared to the previous TPM version include support for additional cryptographic algorithms, enhancements to TPM applications, enhanced authorization mechanisms, simplified TPM management and additional platform security capabilities.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...