From the Back Cover
The Trusted Computing Group’s (TCG) Trusted Platform Module (TPM) open standard, which facilitates hacker-safe computing at the hardware level, presents a possible solution to this quandary. Although PC designers don’t particularly need to see inside the TPM’s “black box, embedded engineers must become intimately familiar with its functionality to enable security measure customization that conserves space, memory, and power.
In this practical guide, expert author Steven Kinney cuts through the complexities of the lengthy TPM specification to provide a targeted, solid foundation for understanding the standard.
This book encapsulates everything readers need to know in order to take advantage of hardware security based on sound TCG standards. It introduces the TPM interface’s basic concepts, then discusses command compilation and execution in detail, focusing on the TPM key hierarchy and the specification itself. The author presents a methodology that allows developers to successfully integrate the TPM into an embedded design and to verify the TPM’s operation on a specific platform. Detailed real-world application examples throughout the book use the popular Atmel single-chip implementation of the TPM, which was created specifically for use in embedded designs.
Device drivers and useful tools are included on the accompanying CD-ROM.