What Is A Trusted Platform Module (TPM)? Why Is It Important?
Có thể bạn quan tâm
- Home
- IT operations
By - Alexander S. Gillis, Technical Writer and Editor
What is a Trusted Platform Module (TPM) and why is it important?
A Trusted Platform Module (TPM) is a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys. A TPM helps prove a user's identity and authenticates their device. A TPM also helps provide security against threats like firmware and ransomware attacks.
A TPM is used for digital rights management (DRM) to protect Windows-based systems and to enforce software licenses. It can also store passwords, certificates or encryption keys. TPM chips can be used with any major operating system and work best in conjunction with other security technologies, such as firewalls, antivirus software, smart cards and biometric verification.
A TPM chip is located on a computer's motherboard as a dedicated processor. Cryptographic keys store Rivest-Shamir-Adleman (RSA) encryption keys specific to the host system for hardware authentication.
Each TPM chip contains an RSA key pair called the Endorsement Key (EK). The pair is maintained inside the chip and cannot be accessed by software. The Storage Root Key is created when a user or administrator takes ownership of the system. This key pair is generated by the TPM based on the EK and an owner-specified password.
A second key, called an Attestation Identity Key (AIK), protects the device against unauthorized firmware and software modification by hashing critical sections of firmware and software before they are executed. When the system attempts to connect to the network, the hashes are sent to a server that verifies they match expected values. If any of the hashed components have been modified, the match fails, and the system cannot gain entry to the network.
The term TPM is sometimes used in reference to the set of specifications applicable to TPM chips. The nonprofit Trusted Computing Group (TCG) publishes and maintains TPM specifications.
TPM uses and benefits
TPMs provide the following benefits:
- Generate, store and limit the use of cryptographic keys.
- Ensure platform integrity by using metrics that can detect changes to past configurations.
- Provide platform device authentication with TPM's RSA key.
- Mitigate firmware, ransomware, dictionary and phishing attacks.
- Protect digital media rights using DRM technology.
- Ensure software licenses are protected.
How does Windows use TPMs and why are they required?
Windows 7, 8, 10 and 11 all support Trusted Platform Modules. Microsoft combines the security features found in Windows with the benefits of TPMs to offer more practical security benefits. For example, Windows uses TPMs to provide the following security features:
- Windows Hello is a biometric identity and access control feature that supports fingerprint scanners, iris scanners and facial recognition technology that use TPMs. It uses both an EK and an AIK.
- Dictionary attack protection helps protect against a brute-force attack that breaks into a password-protected computer network by systematically entering every word in a dictionary as a password.
- BitLocker Drive Encryption encrypts logical volumes. It differs from Microsoft's Encrypting File System in that BitLocker can encrypt an entire drive, whereas EFS only encrypts individual files and folders. If the computer or hard disk is lost or stolen, when powered off, the data on the volume is kept private. BitLocker may still be susceptible to cold boot attacks, so two-factor authentication is also typically used.
- Virtual smart cards are based on TPMs and are similar to physical smart cards. They are used for authentication to external resources.
- Measured boot helps detect malware during boot sequences and ensures TPM measurements reflect the starting state of Windows and Windows configuration settings.
- Health attestation makes AIK certificates for TPMs, as well as parses measured boot data to evaluate device health.
- Credential guard uses virtualization-based security to isolate credentials. TPMs are used here to protect keys.
TPM 2.0 explained
TPM 2.0 was created by TCG to better improve Trusted Platform Modules with new features. For example, the new algorithm interchangeability feature enables TPMs to use different algorithms in case one does not work against specific threats. Prior to this, TPM 1.2 was limited to using Secure Hash Algorithm 1. Basic verification signatures were also improved with the added support of personal identification numbers and biometric and Global Positioning System data. Improved key management enables keys to now be handled for limited and conditional use.
The new and updated features of TPM 2.0 offer more flexibility, enabling the chip to be used in more resource-constrained devices. TPM 2.0 can run on new PCs on any version of Windows 10 for desktop and on Windows 11 devices that support TPMs.
Different types of TPM implementations
The following Trusted Platform Modules differ by how they are implemented:
- Discrete TPMs are specific and dedicated chips. This is potentially the most secure type of TPM, as they typically are less likely to have bugs and must also implement tamper resistance.
- Physical-based TPMs are integrated into the main central processing unit (CPU) and include security mechanisms that make it tamper-resistant.
- Firmware-based TPMs run in a CPU's trusted execution environment. These TPMs are almost as secure as physical TPM chips.
- Software-based TPMs do not provide additional security and run the risk of having bugs or being externally attacked.
- Virtual TPMs are provided by a hypervisor, which independently retrieves security codes from a virtual machine.
History of TPM
TCG developed TPMs and have updated them over time. One notable update was version 1.2, which became standardized as International Organization for Standardization/International Electrotechnical Commission 11889 in 2009. TCG continues to work on the standard, integrating new additions and features. Its most recent update, version 2.0, was released in 2019. This version adds new features to increase the security of TPM. Version 2.0 works for Windows 10 and only some versions of Windows 11.
Learn more about TPMs and how they augment protection in internet of things systems.
Continue Reading About Trusted Platform Module (TPM)
- Security boost in Windows 11 limits PC reuse
- Windows 10 vs. Windows 11 requirements force PC upgrades
- How does Microsoft BitLocker secure local, cloud resources?
- Microsoft Pluton chip will secure future Windows PCs
- Enable and disable vTPM on Hyper-V VMs with PowerShell cmdlets
Related Terms
What is a configuration management database? A configuration management database (CMDB) is a file -- usually in the form of a standardized database -- that contains all ... See complete definition What is a standard operating procedure (SOP)? A standard operating procedure is a set of step-by-step instructions for performing a routine activity. See complete definition What is enterprise architecture (EA)? An enterprise architecture (EA) is a conceptual blueprint that defines an organization's structure and operation. See complete definitionNew & Updated Definitions
- What is 5G New Radio (5G NR)?
5G New Radio, or 5G NR, is a globally accepted standard that delivers more responsive mobile experiences for a wide range of applications over fifth-generation wireless (5G) networks. See More.
- What is multi-access edge computing? Benefits and use cases
- What is 5G?
- What is a small cell in wireless networks?
- What is 6G? Overview of 6G networks & technology
- phase-locked loop (PLL)
- What is identity and access management? Guide to IAM
- What are AI agents? Types and examples
- What is time-sensitive networking (TSN) via 5G?
- Networking
- Security
- CIO
- HR Software
- Customer Experience
- What is multi-access edge computing? Benefits and use cases
Multi-access edge computing (MEC) is a network architecture concept that brings cloud computing capabilities and IT services ...
- What is 5G?
Fifth-generation wireless or 5G is a global standard and technology for wireless and telecommunications networks.
- What is a small cell in wireless networks?
A small cell is a type of low-power cellular radio access point or base station that provides wireless service within a limited ...
- What is identity and access management? Guide to IAM
No longer just a good idea, IAM is a crucial piece of the cybersecurity puzzle. It's how an organization regulates access to ...
- What is data masking?
Data masking is a security technique that modifies sensitive data in a data set so it can be used safely in a non-production ...
- What is antivirus software?
Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other ...
- What is a chief data officer (CDO)?
A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...
- What is user-generated content?
User-generated content (UGC) is published information that an unpaid contributor provides to a website.
- What is business process outsourcing (BPO)?
Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...
- What is compensation management?
Compensation management is the discipline and process for determining employees' appropriate pay, incentives, rewards, bonuses ...
- What is HR technology (human resources tech)?
HR technology (human resources tech) refers to the hardware and software that support an organization's human resource management...
- What is core HR (core human resources)?
Core HR (core human resources) is an umbrella term that refers to the essential, mandatory and fundamental tasks and functions of...
- What are virtual agents and how are they being used?
A virtual agent is an AI-powered software application or service that interacts with humans or other digital systems in a ...
- Customer acquisition cost (CAC): How to calculate and reduce it
Customer acquisition cost (CAC) is the cost associated with convincing a consumer to buy your product or service, including ...
- What is direct marketing?
Direct marketing is a type of advertising campaign that seeks to elicit an action (such as an order, a visit to a store or ...
Từ khóa » Chip Tpm
-
Trusted Platform Module Technology Overview (Windows)
-
Trusted Platform Module - Wikipedia
-
Trusted Platform Module (TPM) Summary | Trusted Computing Group
-
What Is A TPM, And Why Do I Need One For Windows 11? - PCMag
-
TPM Chip
-
What Is TPM 2.0 — The Chip You Need To Run Windows 11
-
What Is A Trusted Platform Module (TPM) Intel
-
How To Check If Your PC Has A Trusted Platform Module (TPM)
-
Why Windows 11 Is Forcing Everyone To Use TPM Chips - The Verge
-
What Is A TPM? And Here's Why You Need It For Windows 11
-
TPM-M R2.0|Motherboards|ASUS Global
-
What Is A TPM Chip And Why Does Windows 11 Require It?
-
Where To Buy A TPM 2.0 For Windows 11 | Tom's Hardware
-
What Is A TPM? All You Need To Know About Trusted Platform Module