From the course: IoT Product Security

Unlock this course with a free trial

Join today to access over 23,100 courses taught by industry experts.

Trusted Platform Module: Part 3

Trusted Platform Module: Part 3

From the course: IoT Product Security

Trusted Platform Module: Part 3

Hi, I'm Matthew Clark. And this is Lesson 4.9: Trusted Platform Module, Part 3. In this lesson, we'll continue our discussion of TPM keys, including the attestation identity key and the storage root key. And we'll take a look at TPM ownership. In Lesson 4.7, we discovered that the TPM has three roots of trust. A root of trust for measurement, which is used during the measured root process and is responsible for measuring the platform's integrity state and storing that data into shielded locations known as the PCR. The root of trust for storage, which is used to securely store the storage root key and platform configuration register data. And the root of trust for reporting, which is used for attestation of the measured boot. In Lesson 4.8, we learned that there are three main keys used by the TPM, the endorsement key, which is created by the manufacturer, which is a long-term non-migratable asymmetric key, which is certified by a trusted platform module entity or TPME. And this is…

Contents