From the course: IoT Product Security
Unlock this course with a free trial
Join today to access over 23,100 courses taught by industry experts.
Trusted Platform Module: Part 1
From the course: IoT Product Security
Trusted Platform Module: Part 1
Hi, I'm Matthew Clark. And this is Lesson 4.7: Trusted Platform Module, Part 1. In this lesson, we'll introduce the trusted platform module. We'll compare the TEE and TPM, and talk about the architecture, roots of trust, and measured boot. The Trusted Computing Group created the trusted platform module, or TPM, and released it for use in 2003. The TCG defines the TPM functionality of both protected capabilities and shielded locations. It does not define the implementation of a TPM. Vendors are free to implement TPM in different ways as long as they meet the protected capabilities and shielded location requirements. TPMs are widely used today in nearly every computer for disk encryption. They're used in other applications, such as VPNs or other 802.1 X compatible solutions. And there's two types of TPM that we're really going to talk about; discrete or external chips, which are dedicated hardware or integrated chips, which are part of a system on chip. The TPMs that we will focus on…
Contents
-
-
-
-
-
Foundations of trust: Part 110m 23s
-
(Locked)
Foundations of trust: Part 29m 6s
-
(Locked)
Foundations of trust: Part 39m 5s
-
(Locked)
Foundations of trust: Part 411m 29s
-
(Locked)
Encryption8m 39s
-
(Locked)
Trusted execution environment7m 57s
-
(Locked)
Trusted Platform Module: Part 17m 49s
-
(Locked)
Trusted Platform Module: Part 27m 53s
-
(Locked)
Trusted Platform Module: Part 39m 46s
-
(Locked)
Trusted Platform Module: Part 412m 50s
-
(Locked)
Hardware security9m 57s
-
(Locked)
DICE: Part 17m 45s
-
(Locked)
DICE: Part 29m 40s
-
(Locked)
Module 14 review10m 7s
-
-
-
-