11. Mai 2019 at 10:28

There are also hybrid types; for example, TPM can be integrated into an Ethernet controller, thus eliminating the need for a separate motherboard component. About TCG Specifications The Trusted Computing Group TCG , with more than member companies, is a not-for-profit organization formed to develop, define, and promote open standards for hardware-enabled trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. The TPM provides protected storage for secretes, automatically checks system integrity, and can authenticate the platform to third parties if authorized by the primary user. Title to all copies of the Software remains with Intel or its suppliers. Archived from the original on 3 August

Uploader: Nigami
Date Added: 13 November 2007
File Size: 9.98 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 29586
Price: Free* [*Free Regsitration Required]

Infineon* Trusted Platform Module (TPM) Driver for Desktop Boards

In fiscal year ending Septemberthe company achieved sales of Euro 7. The company is committed to further contribute its best-in-class hardware security expertise to make PC and laptop computers trustworthy platforms for communication.

Researcher claims hack of processor used to secure Xboxother products”. This topic has been locked due to inactivity for a long period of time.

Key features and benefits. The basic keys stored in the Trusted Platform Module TPM are processed and used internally, with all cryptographic functions being protected. Except as otherwise expressly provided, Intel grants no express or implied right under Intel patents, copyrights, trademarks, or other intellectual property rights. Linux and infineln computing”LWN.

Apart from active shielding, the chip features the true random number generator RNGhardware accelerated RSA crypto algorithms named after its developers Rivest, Shamir, Adleman with key lengths of up to 2, bit and hash algorithms where a document, file or computer drive is assigned a unique, cryptographically protected checksum which can be used to recognize manipulation required by the Trusted Computing Group specification.

Archived from the original on The moxule scope of TPM is to assure the integrity of a platform.

Trusted Platform Module – Wikipedia

Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible. The primary goal is to help users protect their information assets data, passwords, keys, etc.

It contains also 50 percent more internal working memory for support of the next-generation operating systems, such as Microsoft Longhorn. TCPA technology in context. In the 12., this concept could be co-located on an existing motherboard chip in computers, or any other device where the TPM facilities could be employed, such as a cellphone.

Message 3 of 6. You agree to the usage of cookies when you continue browsing this site.

OPTIGA™ TPM – Infineon Technologies

In Octoberit was reported that a code library developed by Infineon, which had been in widespread use in its TPMs, allowed RSA private keys to be inferred from public keys.

Message 1 of 6. Combined with its easy-to-use management and application software we are able to offer a secure solution to PC manufacturers and PC users. These metrics can be used to detect changes to previous configurations and decide how to proceed. Integrated on to the motherboard of a stationary or mobile PC, the TPM helps to shield against unauthorized access to the data stored and improves the system integrity.

Infineon Technologies AG, Munich, Germany, offers semiconductor and system solutions for automotive, industrial and multimarket sectors, for applications in infineom, as well as memory products. In order to optimize your browsing experience Infineon uses cookies.

Trusted Platform Module

As one of the founding members and key drivers within TCG, Infineon continues to bring the benefits of standardization to its customers. For more information we recommend checking directly with your device manufacturer:. In fact, we were the first semiconductor player to complement our TPM 1.

Trusted Platform Module TPM is an international standard for platfodm secure cryptoprocessors that can securely store critical data such as passwords, certificates and encryption keys.

Retrieved October 27, Anyone with access to the private endorsement key would be able to forge the chip’s identity and break some of the security that the chip provides. Intel may make changes to the Software, or to items referenced therein, at any time without notice, but is not infineln to support or update the Software.

For more information regarding cookies and the processing of your personal data please read our Privacy Policy. A Root of Trust for Measurement: In a bid to meet rising demand for security, many manufacturers and system providers are looking for customized, easy-to-implement solutions that support rapid design-in and deployment by integrating seamlessly into existing and new computing designs.

Our aim is to provide you with strong, proven security solutions offering reduced integration effort.