Trusted Platform Module Basics: Using TPM in Embedded Systems

Other | September 1, 2006

byKinney, Steven L., Steven L. Kinney

not yet rated|write a review
* Clear, practical tutorial style text with real-world applications

* First book on TPM for embedded designers

* Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards

* Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform
Module specification

* Presents a methodology to enable designers and
developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform

* Includes an accompanying CD-ROM that contains the full source code, which can be customized and used in embedded designs—an extremely useful tool and timesaver for embedded developers!

· This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
· The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
· CD-ROM includes source code which can be customized for different embedded applications

Pricing and Purchase Info

$82.89 online
$107.55 list price (save 22%)
In stock online
Ships free on orders over $25

From the Publisher

* Clear, practical tutorial style text with real-world applications * First book on TPM for embedded designers * Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards* Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Modul...

Format:OtherDimensions:368 pages, 1 × 1 × 1 inPublished:September 1, 2006Publisher:NewnesLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0080465161

ISBN - 13:9780080465166

Customer Reviews of Trusted Platform Module Basics: Using TPM in Embedded Systems

Reviews

Extra Content

Table of Contents

Chapter 1: History of the Trusted Computing Group
Chapter 2: Cryptographic Basics
Chapter 3: Software vs. Hardware Based Security Models
Chapter 4: Hardware Design Considerations
Chapter 5: TPM Architectural Overview
Chapter 6: Root of Trust, the TPM Endorsement Key
Chapter 7: Key Hierarchy and Management
Chapter 8: Platform Configuration Registers
Chapter 9: TPM Command Message Overview
Chapter 10: TPM Intra Message Structures
Chapter 11: Anti-Replay Protection and Rolling Nonces
Chapter 12: Command Authorization
Chapter 13: Communicating with the TPM, Intel's Low Pin Count (LPC) Bus
Chapter 14: TPM LPC Base Address Definitions and Functionality
Chapter 15: TPM Sacred Seven Command Suite
Chapter 16: Compliance Vectors and Their Purpose
Chapter 17: TPM System Deployment Initialization
Chapter 18: Establishing a TPM Owner and Owner Authorized Command Suite
Chapter 19: TPM Cryptographic Command Suite
Chapter 20: TPM PCR Command Suite
Chapter 21: TPM Protection Profile
Chapter 22: Trusted Device Driver
Chapter 23: Trusted Device Driver Layer and Interface
Chapter 24: Sequential Command Examples
Chapter 25: Migrating to the 1.2 Version of the TPM
APPENDIX A: TPM Command List by Ordinal
APPENDIX B: TPM Error List by Return Code
APPENDIX C: SMBus, An Alternate Communication Model
APPENDIX D: Compliance Test Suite Source Code, C Source