Dell Wyse 3010 Wyse ThinOS Version 8.5 and ThinOS Lite 2.5 Operating System Re - Page 25

Trusted Platform Module version 2.0

Page 25 highlights

Figure 5. Details For the list of known issues about the Dual Network Interface (NIC), see Known issues. Trusted Platform Module version 2.0 Wyse 5070 thin client supports disk encryption and decryption through Trusted Platform Module (TPM) version 2.0. • Measured boot-SHA1(Secure Hash Algorithm 1) is used to produce a hash value for ThinOS image, and extend the integrity measurement into Platform Configuration Registers inside TPM-TPM_PCR16. This is used to generate disk encryption/decryption key. • Disk encryption/decryption key - Disk C with user data and Disk B with system libraries are encrypted. - Prestored KeyStub and TPM_PCR16 are used to generate disk encryption and decryption keys through TPM. The actual implementation is based on TPM-unseal operation. - If the key is modified, the key fails to verify the specific disk partition. The disk partition is formatted to make the partition valid. The following screenshot displays the event log ThinOS 8.5_107 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92

Figure 5. Details
For the list of known issues about the Dual Network Interface (NIC), see
Known issues
.
Trusted Platform Module version 2.0
Wyse 5070 thin client supports disk encryption and decryption through Trusted Platform Module (TPM) version 2.0.
Measured boot—SHA1(Secure Hash Algorithm 1) is used to produce a hash value for ThinOS image, and extend the integrity
measurement into Platform
Configuration
Registers inside TPM—
TPM_PCR16
. This is used to generate disk encryption/decryption
key.
Disk encryption/decryption key
Disk C with user data and Disk B with system libraries are encrypted.
Prestored
KeyStub
and
TPM_PCR16
are used to generate disk encryption and decryption keys through TPM. The actual
implementation is based on TPM-unseal operation.
If the key is
modified,
the key fails to verify the
specific
disk partition. The disk partition is formatted to make the partition valid. The
following screenshot displays the event log
ThinOS 8.5_107
25