![]() The Trusted Computing Group (TCG) is the nonprofit organization that publishes and maintains the TPM specification. Windows automatically provisions a TPM, but if the user reinstalls the operating system, user may need to tell the operating system to explicitly provision the TPM again before it can use all the TPM’s features. Before it can be used for advanced scenarios, a TPM must be provisioned. TPMs were originally designed to provide security and privacy benefits to a platform’s owner and users, but newer versions can provide security and privacy benefits to the system hardware itself. To realize the full benefit of a TPM, the OEM must carefully integrate system hardware and firmware with the TPM to send it commands and react to its responses. TPMs are passive: they receive commands and return responses. ![]() Some newer TPM implementations integrate TPM functionality into the same chipset as other platform components while still providing logical separation similar to discrete TPM chips. Although discrete TPM implementations are still common, they can be problematic for integrated devices that are small or have low power consumption. Such implementations allow the computer’s original equipment manufacturer (OEM) to evaluate and certify the TPM separate from the rest of the system. Historically, TPMs have been discrete chips soldered to a computer’s motherboard. The TPM helps with all these scenarios and more. Protecting data through encryption and decryption, protecting authentication credentials, and proving which software is running on a system are basic functionalities associated with computer security. The TPM is a cryptographic module that enhances computer security and privacy. This article offers a brief overview of the TPM, describes how it works, and discusses the benefits that TPM brings to Windows and the cumulative security impact of running Windows on a PC that contains a TPM. ![]() To achieve many of these security enhancements, Windows makes extensive use of the Trusted Platform Module (TPM). ![]() It places hardware-based security deeper inside the operating system than previous Windows versions had done, maximizing platform security while increasing usability. The Windows operating system improves most existing security features in the operating system and adds groundbreaking new security features such as Device Guard and Windows Hello for Business. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |