TPM (Trusted Platform Module) is a technological chip which can be used by programmers and computer geeks to store artifacts which are used by the same professionals to authenticate the platform. In this case, the computer chip is considered as the microcontroller while the platform used by the professionals is the laptop or personal computer used. The artifacts in this case may range from the certificate, passwords, and encryption keys which are involved in the securing data in a computer. Essentially, TPM used to achieve Trusted Computing Solutions. In addition, TPM is also used for other purposes within the computing fraternity. It is used to store platform measurements which come handy in ensuring that the platform remains reliable (Perez, 2006). The TPM is involved in two basic processes within the computer chip. It is involved in authentication and attestation of the data. Authentication is the process which ensures that the platform proves that it is what it claims to be. If a particular platform claims to be A, it has to prove that it is A and not B. On the other hand, attestation is the process which helps to prove that a given platform is trustworthy and dependable and that its security has not been violated. The two processes above play a significant role in ensuring safe computing in all environments. There are different natures of hardware cryptographs which ensure that data stored in hardware is protected from external malice and software attack. A range of applications can be developed which stored secrets on the TPM. The applications make it hard for one to access information on a particular computer device without appropriate approval (Morris, 2011). For instance, if the device is stolen, the TPM applications in the device will prevent the thief from accessing the information in the gadget.
TPM attestation is important in achieving Trusted Computing Solutions. Trusted Computing Solutions is a technology which was created and endorsed by the Trusted Computing Group. The application ensures that a computer behaves in an expected manner. The behavior of this application is enforced by the computer software and hardware. For the computer to achieve the behavior wanted by the user, the hardware is loaded with a unique encryption key which is inaccessible to other people but the owner of the computer. The application has raised a number of controversies because the key not only protects the hardware for the owner but also against the owner. The issues raised against hardware are debatable because some users prefer it that way while others oppose it (Bajikar, 2002). Nevertheless, TPM attestation plays a significant role in achieving the Trusted Computing Solution. TPM attestation ensures that a user has higher security that those without the attestation keys. The security assurance provided by the TPM attestation is backed by non-exportability, isolation of the keys and anti-hammering of the hardware. In addition, with TPM attestation, there is a possibility of a management paradigm. This is where an administrator may define the set of devices which are used by used to access their resources. They also provide a guarantee that no other devices can be used to access the same resources (Strasser, 2008). The new entrance control model is crucial since it is attached to the hardware-bound user individuality. The TPM attestation has improved security in many sectors of the economy such as computing, e-commerce, and online banking, among others. It is clear that TPM attestation has significantly revolutionized security within the computing sector. It has also helped TPM to achieve the Trusted Group Solutions (Kinney, 2006).
There are a number of applications that supplement the TPM enhancements. Normally, the TPM is affixed in the motherboard of the server which reduced its culpability to physical damage and external software attack. Some applications such as the pre-boot environment use the services of the TPM to gather and accumulate exclusive requirements from the various issues within the boot course in order to generate a scheme fingerprint. The same fingerprint is left for a long period of time unless the pre-boot surrounding is altered or tampered with. The TPM enhancement requires the services of a number of supplemental applications. The first application is the processor. The extension of the processor to the IA-32 architecture paves way for the formation of the various implementation partitions (Bade, 2004). It also permits the co-existence of the typical and protected panel. In this setting, the software may run in isolation in the partition that is protected which is free from compromise by other software running in the platform. The process of accessing the hardware resources is elevated and supplemented by developments in the chipset and processor hardware. There are other enhancements of the processor which includes commands to supervise the confined implementation environment, event handling, and the directions to institute a safe stack. The second supplemental application is the chipset. The extensions to the chipset help to provide support to the crucial elements for the extra confined policy. The enhancements comprise the ability to implement memory safety strategy, to defend the channels connected to the graphics and input/output devices, and to interface with the Trusted Platform Module (Schellekens, 2008). The above are the two supplemental applications which are required by the TPM to enhance its security.
The third supplemental application is the keyboard and mouse. The development of the keyboard and mouse allows communiqué to take place among the input devices and applications that run within a confined division. The applications are allowed to run with no being observation or compromise by the unlawful software operating within the section. A personal computer cannot work without the two applications because they are involved in sending commands to the computer. The fourth application is the graphics. The graphics permits the applications operating within a secluded partition to send exhibit data to the graphics structure buffer (Catherman, 2003). The information is sent without much observation by an illegal software running within the platform. The graphics play a significant role in ensuring that there is proper display of information on the screen. It also provides an opportunity where one can input the security details of their secret software. The final supplemental application is the TPM v. 1.2 device. This application is also referred as the Fixed Token which bound and connected to the PC’s LPC bus. This application provides the hardware with the mechanism to store keys and other information to the platform. Also, the application provides the hardware mechanism where one can report the platform attestation. Most TPM functions are for the system integrity measurements and for the creation of the key (Pearson, 2003). On the system, the boot process takes place when the boot code that is loaded is measured and recorded using the TPM. When using a computer, there are safety guidelines which must be adhered to. This is to prevent the damages which may be caused on the TPM fixed into the gadget. Such guidelines include avoiding damaging the computer by using the appropriate power cables. This part has clearly addressed the supplemental applications for TPM enhancements (Schellekens, 2008).
References
Perez, R., Sailer, R., & van Doorn, L. (2006, July). vTPM: virtualizing the trusted platform module. In Proc. 15th Conf. on USENIX Security Symposium (pp. 305-320).
Morris, T. (2011). Trusted platform module. In Encyclopedia of Cryptography and Security (pp. 1332-1335). Springer US.
Bajikar, S. (2002). Trusted platform module (tpm) based security on notebook pcs-white paper. Mobile Platforms Group Intel Corporation, 1-20.
Strasser, M., & Stamer, H. (2008). A software-based trusted platform module emulator. In Trusted Computing-Challenges and Applications (pp. 33-47). Springer Berlin Heidelberg.
Kinney, S. L. (2006). Trusted platform module basics: using TPM in embedded systems. Newnes.
Bade, S., Dewkett, T., Kelley, N., Sutter, S., & Weber, H. (2004). U.S. Patent Application No. 10/902,711.
Schellekens, D., Wyseur, B., & Preneel, B. (2008). Remote attestation on legacy operating systems with trusted platform modules. Science of Computer Programming, 74(1), 13-22.
Catherman, R., Challener, D., & Nicholson, J. (2003). U.S. Patent Application No. 10/744,444.
Pearson, S., & Balacheff, B. (2003). Trusted computing platforms: TCPA technology in context. Prentice Hall Professional.
Schellekens, D., Wyseur, B., & Preneel, B. (2008). Remote attestation on legacy operating systems with trusted platform modules. Science of Computer Programming, 74(1), 13-22.