From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Trusted Platform Module: Part 1

Trusted Platform Module: Part 1

From the course: IoT Product Security

Trusted Platform Module: Part 1

Hi, I'm Matthew Clark. And this is Lesson 4.7: Trusted Platform Module, Part 1. In this lesson, we'll introduce the trusted platform module. We'll compare the TEE and TPM, and talk about the architecture, roots of trust, and measured boot. The Trusted Computing Group created the trusted platform module, or TPM, and released it for use in 2003. The TCG defines the TPM functionality of both protected capabilities and shielded locations. It does not define the implementation of a TPM. Vendors are free to implement TPM in different ways as long as they meet the protected capabilities and shielded location requirements. TPMs are widely used today in nearly every computer for disk encryption. They're used in other applications, such as VPNs or other 802.1 X compatible solutions. And there's two types of TPM that we're really going to talk about; discrete or external chips, which are dedicated hardware or integrated chips, which are part of a system on chip. The TPMs that we will focus on…

Contents