Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Trusted Platform Module

Index Trusted Platform Module

Trusted Platform Module (TPM, also known as ISO/IEC 11889) is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. [1]

116 relations: Advanced Encryption Standard, Advanced Micro Devices, Application software, Apress, Ars Technica, Atmel, Authentication, BitLocker, Blinding (cryptography), Boot sector, Booting, Broadcom Inc., Bus (computing), Central Intelligence Agency, Cheating in online games, Chipset, Chromebook, Cold boot attack, Common Criteria, Computer industry, Condé Nast, Cryptographic hash function, Defense Information Systems Agency, Dictionary attack, Digital rights management, Digital signature, Direct Anonymous Attestation, Disk encryption, Dm-crypt, Elliptic-curve cryptography, Erratum, Ethernet, Exclusive or, Free Software Foundation, Global surveillance disclosures (2013–present), GNU General Public License, Google, Hardware certification, Hardware security, Hardware security module, Hengzhi chip, HMAC, Hypervisor, IBM, Infineon Technologies, InstantGo, Intel, International Electrotechnical Commission, International Organization for Standardization, International standard, ..., Kernel-based Virtual Machine, Key (cryptography), Key derivation function, Key generation, Keystroke logging, Laptop, Lenovo, Linux Unified Key Setup, Low Pin Count, Micro-Star International, Microchip Technology, Microcontroller, Microsoft, Microsoft TechNet, Mobile phone, Motherboard, National Institute of Standards and Technology, National Semiconductor, New York City, Next-Generation Secure Computing Base, Nuvoton, Operating system, Oracle Corporation, Original equipment manufacturer, Password, PDF, PKCS 1, Power analysis, Privacy, PrivateCore, Protection Profile, Public-key cryptography, QEMU, Qualcomm, Random number generation, Rockchip, RSA (cryptosystem), Samsung, Secure cryptoprocessor, Security Technical Implementation Guide, Serial Peripheral Interface, SHA-1, SHA-2, Software license, Solaris (operating system), STMicroelectronics, Switzerland, Symmetric-key algorithm, Texas Instruments, Threat model, Triple DES, TrueCrypt, Trust anchor, Trusted Computing, Trusted Computing Group, Trusted execution environment, Trusted Execution Technology, Unified Extensible Firmware Interface, United States Department of Defense, VeraCrypt, Virtual machine, VMware, Winbond, Windows 8.1, Windows Vista, Xen. Expand index (66 more) »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Trusted Platform Module and Advanced Encryption Standard · See more »

Advanced Micro Devices

Advanced Micro Devices, Inc. (AMD) is an American multinational semiconductor company based in Santa Clara, California, that develops computer processors and related technologies for business and consumer markets.

New!!: Trusted Platform Module and Advanced Micro Devices · See more »

Application software

An application software (app or application for short) is a computer software designed to perform a group of coordinated functions, tasks, or activities for the benefit of the user.

New!!: Trusted Platform Module and Application software · See more »

Apress

Apress Media LLC is a publisher of information technology books, based in New York City.

New!!: Trusted Platform Module and Apress · See more »

Ars Technica

Ars Technica (a Latin-derived term that the site translates as the "art of technology") is a website covering news and opinions in technology, science, politics, and society, created by Ken Fisher and Jon Stokes in 1998.

New!!: Trusted Platform Module and Ars Technica · See more »

Atmel

Atmel Corporation is an American-based designer and manufacturer of semiconductors, founded in 1984.

New!!: Trusted Platform Module and Atmel · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Trusted Platform Module and Authentication · See more »

BitLocker

BitLocker is a full disk encryption feature included with Windows Vista and later.

New!!: Trusted Platform Module and BitLocker · See more »

Blinding (cryptography)

In cryptography, blinding is a technique by which an agent can provide a service to (i.e., compute a function for) a client in an encoded form without knowing either the real input or the real output.

New!!: Trusted Platform Module and Blinding (cryptography) · See more »

Boot sector

A boot sector is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware.

New!!: Trusted Platform Module and Boot sector · See more »

Booting

In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: Trusted Platform Module and Booting · See more »

Broadcom Inc.

Broadcom Inc. (formerly Avago Technologies) is a designer, developer and global supplier of products based on analog and digital semiconductor technologies within four primary markets: wired infrastructure, wireless communications, enterprise storage, and industrial & others.

New!!: Trusted Platform Module and Broadcom Inc. · See more »

Bus (computing)

In computer architecture, a bus (a contraction of the Latin omnibus) is a communication system that transfers data between components inside a computer, or between computers.

New!!: Trusted Platform Module and Bus (computing) · See more »

Central Intelligence Agency

The Central Intelligence Agency (CIA) is a civilian foreign intelligence service of the United States federal government, tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT).

New!!: Trusted Platform Module and Central Intelligence Agency · See more »

Cheating in online games

Cheating in online games is defined as the action of pretending to comply with the rules of the game, while secretly subverting them to gain an unfair advantage over an opponent.

New!!: Trusted Platform Module and Cheating in online games · See more »

Chipset

In a computer system, a chipset is a set of electronic components in an integrated circuit known as a "Data Flow Management System" that manages the data flow between the processor, memory and peripherals.

New!!: Trusted Platform Module and Chipset · See more »

Chromebook

A Chromebook is a laptop or tablet running the Linux-based Chrome OS as its operating system.

New!!: Trusted Platform Module and Chromebook · See more »

Cold boot attack

In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboot to restart the machine.

New!!: Trusted Platform Module and Cold boot attack · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

New!!: Trusted Platform Module and Common Criteria · See more »

Computer industry

The computer or information technology, or IT industry is the range of businesses involved in designing computer hardware and computer networking infrastructures, developing computer software, manufacturing computer components, and providing information technology (IT) services.

New!!: Trusted Platform Module and Computer industry · See more »

Condé Nast

Condé Nast Inc. is an American mass media company founded in 1909 by Condé Montrose Nast, based at One World Trade Center and owned by Advance Publications.

New!!: Trusted Platform Module and Condé Nast · See more »

Cryptographic hash function

A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.

New!!: Trusted Platform Module and Cryptographic hash function · See more »

Defense Information Systems Agency

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors.

New!!: Trusted Platform Module and Defense Information Systems Agency · See more »

Dictionary attack

In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.

New!!: Trusted Platform Module and Dictionary attack · See more »

Digital rights management

Digital rights management (DRM) is a set of access control technologies for restricting the use of proprietary hardware and copyrighted works.

New!!: Trusted Platform Module and Digital rights management · See more »

Digital signature

A digital signature is a mathematical scheme for presenting the authenticity of digital messages or documents.

New!!: Trusted Platform Module and Digital signature · See more »

Direct Anonymous Attestation

Direct Anonymous Attestation (DAA) is a cryptographic primitive which enables remote authentication of a trusted computer whilst preserving privacy of the platform's user.

New!!: Trusted Platform Module and Direct Anonymous Attestation · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Trusted Platform Module and Disk encryption · See more »

Dm-crypt

dm-crypt is a transparent disk encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD.

New!!: Trusted Platform Module and Dm-crypt · See more »

Elliptic-curve cryptography

Elliptic-curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields.

New!!: Trusted Platform Module and Elliptic-curve cryptography · See more »

Erratum

An erratum or corrigendum (plurals: errata, corrigenda) (comes from errata corrige) is a correction of a published text.

New!!: Trusted Platform Module and Erratum · See more »

Ethernet

Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).

New!!: Trusted Platform Module and Ethernet · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: Trusted Platform Module and Exclusive or · See more »

Free Software Foundation

The Free Software Foundation (FSF) is a 501(c)(3) non-profit organization founded by Richard Stallman on 4 October 1985 to support the free software movement, which promotes the universal freedom to study, distribute, create, and modify computer software, with the organization's preference for software being distributed under copyleft ("share alike") terms, such as with its own GNU General Public License.

New!!: Trusted Platform Module and Free Software Foundation · See more »

Global surveillance disclosures (2013–present)

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.

New!!: Trusted Platform Module and Global surveillance disclosures (2013–present) · See more »

GNU General Public License

The GNU General Public License (GNU GPL or GPL) is a widely used free software license, which guarantees end users the freedom to run, study, share and modify the software.

New!!: Trusted Platform Module and GNU General Public License · See more »

Google

Google LLC is an American multinational technology company that specializes in Internet-related services and products, which include online advertising technologies, search engine, cloud computing, software, and hardware.

New!!: Trusted Platform Module and Google · See more »

Hardware certification

Hardware certification is the process through which computer hardware is tested to ensure it is compatible with specific software packages, and operates as intended in critical situations.

New!!: Trusted Platform Module and Hardware certification · See more »

Hardware security

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.

New!!: Trusted Platform Module and Hardware security · See more »

Hardware security module

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing.

New!!: Trusted Platform Module and Hardware security module · See more »

Hengzhi chip

The Hengzhi chip (联想“恒智”安全芯片) is a microcontroller that can store secured information, designed by the People's Republic of China government and manufactured in China.

New!!: Trusted Platform Module and Hengzhi chip · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: Trusted Platform Module and HMAC · See more »

Hypervisor

A hypervisor or virtual machine monitor (VMM) is computer software, firmware or hardware that creates and runs virtual machines.

New!!: Trusted Platform Module and Hypervisor · See more »

IBM

The International Business Machines Corporation (IBM) is an American multinational technology company headquartered in Armonk, New York, United States, with operations in over 170 countries.

New!!: Trusted Platform Module and IBM · See more »

Infineon Technologies

Infineon Technologies AG is a German semiconductor manufacturer founded on 1 April 1999, when the semiconductor operations of the parent company Siemens AG were spun off to form a separate legal entity.

New!!: Trusted Platform Module and Infineon Technologies · See more »

InstantGo

InstantGo (formerly Connected Standby) is a Microsoft specification for Windows 8 hardware and software that aims to bring smartphone-type power management capabilities to the PC platform, as well as increasing physical security.

New!!: Trusted Platform Module and InstantGo · See more »

Intel

Intel Corporation (stylized as intel) is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley.

New!!: Trusted Platform Module and Intel · See more »

International Electrotechnical Commission

The International Electrotechnical Commission (IEC; in French: Commission électrotechnique internationale) is an international standards organization that prepares and publishes International Standards for all electrical, electronic and related technologies – collectively known as "electrotechnology".

New!!: Trusted Platform Module and International Electrotechnical Commission · See more »

International Organization for Standardization

The International Organization for Standardization (ISO) is an international standard-setting body composed of representatives from various national standards organizations.

New!!: Trusted Platform Module and International Organization for Standardization · See more »

International standard

International standards are standards developed by international standards organizations.

New!!: Trusted Platform Module and International standard · See more »

Kernel-based Virtual Machine

Kernel-based Virtual Machine (KVM) is a virtualization infrastructure for the Linux kernel that turns it into a hypervisor.

New!!: Trusted Platform Module and Kernel-based Virtual Machine · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: Trusted Platform Module and Key (cryptography) · See more »

Key derivation function

In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.

New!!: Trusted Platform Module and Key derivation function · See more »

Key generation

Key generation is the process of generating keys in cryptography.

New!!: Trusted Platform Module and Key generation · See more »

Keystroke logging

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored.

New!!: Trusted Platform Module and Keystroke logging · See more »

Laptop

A laptop, also called a notebook computer or just notebook, is a small, portable personal computer with a "clamshell" form factor, having, typically, a thin LCD or LED computer screen mounted on the inside of the upper lid of the "clamshell" and an alphanumeric keyboard on the inside of the lower lid.

New!!: Trusted Platform Module and Laptop · See more »

Lenovo

Lenovo Group Ltd. or Lenovo PC International, often shortened to Lenovo (formerly stylized as lenovo), is a Chinese multinational technology company with headquarters in Beijing, China and Morrisville, North Carolina.

New!!: Trusted Platform Module and Lenovo · See more »

Linux Unified Key Setup

In computing, the Linux Unified Key Setup or LUKS is a disk encryption specification created by Clemens Fruhwirth in 2004 and originally intended for Linux.

New!!: Trusted Platform Module and Linux Unified Key Setup · See more »

Low Pin Count

The Low Pin Count bus, or LPC bus, is a computer bus used on IBM-compatible personal computers to connect low-bandwidth devices to the CPU, such as the boot ROM, "legacy" I/O devices (integrated into a super I/O chip), and Trusted Platform Module (TPM).

New!!: Trusted Platform Module and Low Pin Count · See more »

Micro-Star International

MSI (Micro-Star International Co., Ltd, Chinese: 微星科技股份有限公司), stylized as MSi is a Taiwanese multinational information technology corporation headquartered in New Taipei City, Taiwan.

New!!: Trusted Platform Module and Micro-Star International · See more »

Microchip Technology

Microchip Technology is an American manufacturer of microcontroller, memory and analog semiconductors.

New!!: Trusted Platform Module and Microchip Technology · See more »

Microcontroller

A microcontroller (MCU for microcontroller unit, or UC for μ-controller) is a small computer on a single integrated circuit.

New!!: Trusted Platform Module and Microcontroller · See more »

Microsoft

Microsoft Corporation (abbreviated as MS) is an American multinational technology company with headquarters in Redmond, Washington.

New!!: Trusted Platform Module and Microsoft · See more »

Microsoft TechNet

Microsoft TechNet is a Microsoft web portal and web service for IT professionals.

New!!: Trusted Platform Module and Microsoft TechNet · See more »

Mobile phone

A mobile phone, known as a cell phone in North America, is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area.

New!!: Trusted Platform Module and Mobile phone · See more »

Motherboard

A motherboard (sometimes alternatively known as the mainboard, system board, baseboard, planar board or logic board, or colloquially, a mobo) is the main printed circuit board (PCB) found in general purpose microcomputers and other expandable systems.

New!!: Trusted Platform Module and Motherboard · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: Trusted Platform Module and National Institute of Standards and Technology · See more »

National Semiconductor

National Semiconductor was an American semiconductor manufacturer which specialized in analog devices and subsystems, formerly with headquarters in Santa Clara, California, United States.

New!!: Trusted Platform Module and National Semiconductor · See more »

New York City

The City of New York, often called New York City (NYC) or simply New York, is the most populous city in the United States.

New!!: Trusted Platform Module and New York City · See more »

Next-Generation Secure Computing Base

The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a cancelled software architecture designed by Microsoft which aimed to provide users of the Windows operating system with better privacy, security, and system integrity.

New!!: Trusted Platform Module and Next-Generation Secure Computing Base · See more »

Nuvoton

Nuvoton Technology Corporation is a Taiwan-based semiconductor company established in 2008.

New!!: Trusted Platform Module and Nuvoton · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Trusted Platform Module and Operating system · See more »

Oracle Corporation

Oracle Corporation is an American multinational computer technology corporation, headquartered in Redwood Shores, California.

New!!: Trusted Platform Module and Oracle Corporation · See more »

Original equipment manufacturer

An Original Equipment Manufacturer (OEM) is a company that produces parts and equipment that may be marketed by another manufacturer.

New!!: Trusted Platform Module and Original equipment manufacturer · See more »

Password

A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which is to be kept secret from those not allowed access.

New!!: Trusted Platform Module and Password · See more »

PDF

The Portable Document Format (PDF) is a file format developed in the 1990s to present documents, including text formatting and images, in a manner independent of application software, hardware, and operating systems.

New!!: Trusted Platform Module and PDF · See more »

PKCS 1

In cryptography, PKCS #1 is the first of a family of standards called Public-Key Cryptography Standards (PKCS), published by RSA Laboratories.

New!!: Trusted Platform Module and PKCS 1 · See more »

Power analysis

In cryptography, power analysis is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device (such as a smart card, tamper-resistant "black box", or integrated circuit).

New!!: Trusted Platform Module and Power analysis · See more »

Privacy

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively.

New!!: Trusted Platform Module and Privacy · See more »

PrivateCore

PrivateCore is a venture-backed startup located in Palo Alto, California that develops software to secure server data through server attestation and memory encryption.

New!!: Trusted Platform Module and PrivateCore · See more »

Protection Profile

A Protection Profile (PP) is a document used as part of the certification process according to ISO/IEC 15408 and the Common Criteria (CC).

New!!: Trusted Platform Module and Protection Profile · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: Trusted Platform Module and Public-key cryptography · See more »

QEMU

QEMU (short for Quick Emulator) is a free and open-source emulator that performs hardware virtualization.

New!!: Trusted Platform Module and QEMU · See more »

Qualcomm

Qualcomm is an American multinational semiconductor and telecommunications equipment company that designs and markets wireless telecommunications products and services.

New!!: Trusted Platform Module and Qualcomm · See more »

Random number generation

Random number generation is the generation of a sequence of numbers or symbols that cannot be reasonably predicted better than by a random chance, usually through a hardware random-number generator (RNG).

New!!: Trusted Platform Module and Random number generation · See more »

Rockchip

Rockchip (Fuzhou Rockchip Electronics Co., Ltd.) is a Chinese fabless semiconductor company based in Fuzhou, Fujian province.

New!!: Trusted Platform Module and Rockchip · See more »

RSA (cryptosystem)

RSA (Rivest–Shamir–Adleman) is one of the first public-key cryptosystems and is widely used for secure data transmission.

New!!: Trusted Platform Module and RSA (cryptosystem) · See more »

Samsung

Samsung is a South Korean multinational conglomerate headquartered in Samsung Town, Seoul.

New!!: Trusted Platform Module and Samsung · See more »

Secure cryptoprocessor

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

New!!: Trusted Platform Module and Secure cryptoprocessor · See more »

Security Technical Implementation Guide

A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs to enhance overall security.

New!!: Trusted Platform Module and Security Technical Implementation Guide · See more »

Serial Peripheral Interface

The Serial Peripheral Interface (SPI) is a synchronous serial communication interface specification used for short distance communication, primarily in embedded systems.

New!!: Trusted Platform Module and Serial Peripheral Interface · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: Trusted Platform Module and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: Trusted Platform Module and SHA-2 · See more »

Software license

A software license is a legal instrument (usually by way of contract law, with or without printed material) governing the use or redistribution of software.

New!!: Trusted Platform Module and Software license · See more »

Solaris (operating system)

Solaris is a Unix operating system originally developed by Sun Microsystems.

New!!: Trusted Platform Module and Solaris (operating system) · See more »

STMicroelectronics

STMicroelectronics is a French-Italian multinational electronics and semiconductor manufacturer headquartered in Geneva, Switzerland.

New!!: Trusted Platform Module and STMicroelectronics · See more »

Switzerland

Switzerland, officially the Swiss Confederation, is a sovereign state in Europe.

New!!: Trusted Platform Module and Switzerland · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: Trusted Platform Module and Symmetric-key algorithm · See more »

Texas Instruments

Texas Instruments Inc. (TI) is an American technology company that designs and manufactures semiconductors and various integrated circuits, which it sells to electronics designers and manufacturers globally.

New!!: Trusted Platform Module and Texas Instruments · See more »

Threat model

Threat modeling is a process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view.

New!!: Trusted Platform Module and Threat model · See more »

Triple DES

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

New!!: Trusted Platform Module and Triple DES · See more »

TrueCrypt

TrueCrypt is a discontinued source-available freeware utility used for on-the-fly encryption (OTFE).

New!!: Trusted Platform Module and TrueCrypt · See more »

Trust anchor

In cryptographic systems with hierarchical structure, a trust anchor is an authoritative entity for which trust is assumed and not derived.

New!!: Trusted Platform Module and Trust anchor · See more »

Trusted Computing

Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group.

New!!: Trusted Platform Module and Trusted Computing · See more »

Trusted Computing Group

The Trusted Computing Group is a group formed by AMD, Hewlett-Packard, IBM, Intel and Microsoft to implement Trusted Computing concepts across personal computers.

New!!: Trusted Platform Module and Trusted Computing Group · See more »

Trusted execution environment

A trusted execution environment (TEE) is a secure area of a main processor.

New!!: Trusted Platform Module and Trusted execution environment · See more »

Trusted Execution Technology

Intel Trusted Execution Technology (Intel TXT, formerly known as LaGrande Technology) is a computer hardware technology whose primary goals are.

New!!: Trusted Platform Module and Trusted Execution Technology · See more »

Unified Extensible Firmware Interface

The Unified Extensible Firmware Interface (UEFI) is a specification that defines a software interface between an operating system and platform firmware.

New!!: Trusted Platform Module and Unified Extensible Firmware Interface · See more »

United States Department of Defense

The Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces.

New!!: Trusted Platform Module and United States Department of Defense · See more »

VeraCrypt

VeraCrypt is an open-source utility used for on-the-fly encryption (OTFE).

New!!: Trusted Platform Module and VeraCrypt · See more »

Virtual machine

In computing, a virtual machine (VM) is an emulation of a computer system.

New!!: Trusted Platform Module and Virtual machine · See more »

VMware

VMware, Inc. is a subsidiary of Dell Technologies that provides cloud computing and platform virtualization software and services.

New!!: Trusted Platform Module and VMware · See more »

Winbond

Winbond Electronics Corporation is a Taiwan-based corporation founded in 1987 that produces semiconductors and several types of integrated circuits, most notably Dynamic RAM, Static RAM, microcontrollers, and personal computer ICs, namely Super I/O chips.

New!!: Trusted Platform Module and Winbond · See more »

Windows 8.1

Windows 8.1 (codenamed Blue) is a computer operating system released by Microsoft.

New!!: Trusted Platform Module and Windows 8.1 · See more »

Windows Vista

Windows Vista (codenamed Longhorn) is an operating system by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs and media center PCs.

New!!: Trusted Platform Module and Windows Vista · See more »

Xen

Xen Project (pronounced) is a hypervisor using a microkernel design, providing services that allow multiple computer operating systems to execute on the same computer hardware concurrently.

New!!: Trusted Platform Module and Xen · See more »

Redirects here:

Fritz chip, Fritz-chip, TPM Chip, Trusted platform module.

References

[1] https://en.wikipedia.org/wiki/Trusted_Platform_Module

OutgoingIncoming
Hey! We are on Facebook now! »