Foxconn A74ML-K 3.0 English Manual. - Page 44

M Trusted Platform Module is a specification promoted by TCG. A Trusted Platform Mod

Page 44 highlights

3 TPM (Trusted Platform Module) is a specification promoted by TCG. A Trusted Platform Module offers facilities for secure generation of cryptographic keys. The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specification. The definition of the TPM architecture comes from the TC and the TPM Work Group defines the implementation of that architecture. Work group members should have a working knowledge of security in relation to the design and usage of cryptographic modules. Members should also have a working knowledge of cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols. This item is used to enable/disable the function of TCG/TPM support. 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105

3
37
TP
M (Trusted Platform Module) is a specification promoted by TCG. A Trusted Platform Mod
-
ule offers facilities for secure generation of cryptographic keys.
The TPM Work Group is chartered to create the Trusted Platform Module (TPM) specifica
-
tion. The definition of the TPM architecture comes from the TC and the TPM Work Group
defines the implementation of that architecture. Work group members should have a working
knowledge of security in relation to the design and usage of cryptographic modules. Members
should also have a working knowledge of cryptographic techniques including public-key cryp-
tography, cryptographic algorithms and protocols.
This item is used to enable/disable the function of TCG/TPM support.