Trusted Platform Module Basics: Using TPM in Embedded Systems

Other | September 1, 2006

byKinney, Steven L., Steven L. Kinney

not yet rated|write a review
  • Clear, practical tutorial style text with real-world applications
  • First book on TPM for embedded designers
  • Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
  • Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification
  • Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform


  • This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
  • The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide

Pricing and Purchase Info

$82.89 online
$107.55 list price (save 22%)
In stock online
Ships free on orders over $25

From the Publisher

Clear, practical tutorial style text with real-world applicationsFirst book on TPM for embedded designersProvides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standardsCovers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specifi...

Format:OtherDimensions:368 pages, 1 × 1 × 1 inPublished:September 1, 2006Publisher:NewnesLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0080465161

ISBN - 13:9780080465166

Customer Reviews of Trusted Platform Module Basics: Using TPM in Embedded Systems

Reviews

Extra Content

Table of Contents

Chapter 1: History of the Trusted Computing Group
Chapter 2: Cryptographic Basics
Chapter 3: Software vs. Hardware Based Security Models
Chapter 4: Hardware Design Considerations
Chapter 5: TPM Architectural Overview
Chapter 6: Root of Trust, the TPM Endorsement Key
Chapter 7: Key Hierarchy and Management
Chapter 8: Platform Configuration Registers
Chapter 9: TPM Command Message Overview
Chapter 10: TPM Intra Message Structures
Chapter 11: Anti-Replay Protection and Rolling Nonces
Chapter 12: Command Authorization
Chapter 13: Communicating with the TPM, Intel's Low Pin Count (LPC) Bus
Chapter 14: TPM LPC Base Address Definitions and Functionality
Chapter 15: TPM Sacred Seven Command Suite
Chapter 16: Compliance Vectors and Their Purpose
Chapter 17: TPM System Deployment Initialization
Chapter 18: Establishing a TPM Owner and Owner Authorized Command Suite
Chapter 19: TPM Cryptographic Command Suite
Chapter 20: TPM PCR Command Suite
Chapter 21: TPM Protection Profile
Chapter 22: Trusted Device Driver
Chapter 23: Trusted Device Driver Layer and Interface
Chapter 24: Sequential Command Examples
Chapter 25: Migrating to the 1.2 Version of the TPM
APPENDIX A: TPM Command List by Ordinal
APPENDIX B: TPM Error List by Return Code
APPENDIX C: SMBus, An Alternate Communication Model
APPENDIX D: Compliance Test Suite Source Code, C Source