Catálogo de publicaciones - libros
Título de Acceso Abierto
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Computer science
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No requiere | 2015 | Directory of Open access Books | ||
No requiere | 2015 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-1-4302-6583-2
ISBN electrónico
978-1-4302-6584-9
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2015
Cobertura temática
Tabla de contenidos
History of the TPM
Will Arthur; David Challener; Kenneth Goldman
■■■
Pp. 1-5
Basic Security Concepts
Will Arthur; David Challener; Kenneth Goldman
■■■
Pp. 7-22
Quick Tutorial on TPM 2.0
Will Arthur; David Challener; Kenneth Goldman
■■■
Pp. 23-37
Existing Applications That Use TPMs
Will Arthur; David Challener; Kenneth Goldman
Even though more than 1 billion TPMs are deployed in the market, and they exist on almost all commercial PCs and servers, very few people know about them. And many people who do know about TPMs are surprised to discover that many applications are written for them. There are also a large number of ways to easily write applications that take advantage of TPM 1.2 devices. Because TPM 2.0 devices are just beginning to appear on the market, it’s perhaps not surprising that not as many applications can use TPM 2.0 directly. The purpose of this book is to enable you to write programs that take advantage of all the features of TPM 2.0, both basic and advanced.
Pp. 39-50
Navigating the Specification
Will Arthur; David Challener; Kenneth Goldman
■■■
Pp. 51-69
Execution Environment
Will Arthur; David Challener; Kenneth Goldman
■■■
Pp. 71-76
TPM Software Stack
Will Arthur; David Challener; Kenneth Goldman
This book is primarily about TPM 2.0 devices. However, a TPM without software is like a car with a full tank of gas but no driver; it has great potential but isn’t going anywhere. This chapter, in preparation for the rest of the book, introduces you to the TPM’s “driver”, the TPM Software Stack (TSS). A good understanding of this topic will enable you to understand subsequent code examples in this book.
Pp. 77-96
TPM Entities
Will Arthur; David Challener; Kenneth Goldman
A TPM 2.0 is an item in the TPM that can be directly referenced with a handle. The term encompasses more than objects because the specification uses the word to identify a very specific subset of entities. This can be confusing, so this chapter briefly describes all of the entity types: permanent entities (hierarchies, the dictionary attack lockout mechanism, and PCRs); nonvolatile entities (NVRAM indexes), which are similar to permanent entities; objects (keys and data); and volatile entities (sessions of various types).
Pp. 97-104
Hierarchies
Will Arthur; David Challener; Kenneth Goldman
A is a collection of entities that are related and managed as a group. Those entities include permanent objects (the hierarchy handles), primary objects at the root of a tree, and other objects such as keys in the tree. NV indexes belong to a hierarchy but aren’t in a tree. Entities, other than permanent entities, can be erased as a group.
Pp. 105-118
Keys
Will Arthur; David Challener; Kenneth Goldman
As a security device, the ability of an application to use keys while keeping them safe in a hardware device is the TPM’s greatest strength. The TPM can both generate and import externally generated keys. It supports both asymmetric and symmetric keys. Chapter 2 covered the basic principles behind these two key types.
Pp. 119-135