- Clear, practical tutorial style text with real-world applications
- First book on TPM for embedded designers
- Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
- Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform Module specification
- Presents a methodology to enable designers and developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform
- This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
- The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
Chapter 1: History of the Trusted Computing Group
Chapter 2: Cryptographic Basics
Chapter 3: Software vs. Hardware Based Security Models
Chapter 4: Hardware Design Considerations
Chapter 5: TPM Architectural Overview
Chapter 6: Root of Trust, the TPM Endorsement Key
Chapter 7: Key Hierarchy and Management
Chapter 8: Platform Configuration Registers
Chapter 9: TPM Command Message Overview
Chapter 10: TPM Intra Message Structures
Chapter 11: Anti-Replay Protection and Rolling Nonces
Chapter 12: Command Authorization
Chapter 13: Communicating with the TPM, Intel's Low Pin Count (LPC) Bus
Chapter 14: TPM LPC Base Address Definitions and Functionality
Chapter 15: TPM Sacred Seven Command Suite
Chapter 16: Compliance Vectors and Their Purpose
Chapter 17: TPM System Deployment Initialization
Chapter 18: Establishing a TPM Owner and Owner Authorized Command Suite
Chapter 19: TPM CryptoglÃØ