Feature Summary
Key TPM Features |
Unique per-board RSA key |
Generates, stores and protects RSA keys: keys never leave the TPM chip un-protected | |
RSA asymmetric encryption and signing | |
SHA-1 hashing | |
Generates random numbers to 1-million bit random-ness (as tested by US NSA) | |
Chip is physically secure from physical tampering | |
What is the TPM Suite? | TPM Suite is Advantech-Innocore's software package to help the developer use the TPM chip and build security solutions needed to protect his intellectual property and investment in engineering resources |
Typical Applications of TPM
There are two principle applications of the TPM chip and supporting software:
Tie the application to the main board: the application will only run on a main-board configuration you determine. Various identifiers can be used including:
Hardware configuration available |
PCI devices |
Version of BIOS |
Version (model) of board |
Specific board-unique key – tie the application to an individual board or range of boards |
Key TPM Architecture Concepts:
Two key concepts in TPM architecture that allow the software architect to build strong security schemes are 1) Establishing Trust and 2) the use of Platform Configuration Registers.
Trust and Establishing Trust
All code run by the processor is checked before it is run. |
A digest is derived from the code to be run and stored in a platform configuration register (see below). |
The digest is used as the basis of establishing whether the code is trusted. |
If un-trusted, application booting can be halted. |
Trust starts at the system BIOS and proceeds through system extension ROMs, MBR, OS loader and application code. |
Platform Configuration Registers
24 in all, 8 for hardware use, 16 for software use; populated one-by-one as the system boots. |
Contain digests of key parts of the system, e.g. BIOS, PCI bus, Boot-disk MBR and partition table, OS loader, application software. |
Combined digests can be used to form the basis of an encryption/decryption key- pair which is used to encode your software: if the board configuration changes, so do the PCR values – consequently the encryption key changes and your application doesn’t run. |
Contents are difficult to reproduce without running exactly the same code. |
Package Contents
Libraries, drivers and developer resources |
Sample source code |
Sample precompiled binaries for Advantech-Innocore main boards. |
User manual describing key concepts, protection schemes and sample code. |
Support Requirements
Development machine: Advantech-Innocore DPX® Series motherboard with TPM |
Atmel AT97SC3203/4 TPM chip fitted |
Windows XP SP2 or Linux 2.6-based distribution |
Windows XP: Microsoft Visual C++ 6 or newer |
Linux 2.6: gcc 3.3 or higher. |
256MB RAM |
20MB disk space |
Other References
Trusted Computing Group Web Site: https://www.trustedcomputinggroup.org/home |
Atmel TPM Datasheet. |
Advantech-Innocore “Security Suite - Secure Boot Datasheet” |
OEM Customization and Product Development
我们网站向用户提供的cookie来增强您的用户体验,个性化内容,并向您展示有关我们优质产品的更多相关内容。
如果您同意我们使用cookie,请点击“接受所有cookie”。
或者,点击“管理cookie”以了解更多关于我们的隐私和cookie通知的信息,并选择您希望我们使用的cookie类型。