4831455
9780750679602
Security has become a key design consideration for many embedded engineers due to the significant advances in embedded systems networking capabilities. However, system security is difficult to manage, and the typical size, power, and cost limitations faced by embedded developers inhibit their use of many software-based cryptographic security models. The Trusted Computing Groups (TCG) Trusted Platform Module (TPM) open standard, which facilitates hacker-safe computing at the hardware level, presents a possible solution to this quandary. Although PC designers dont particularly need to see inside the TPMs black box, embedded engineers must become intimately familiar with its functionality to enable security measure customization that conserves space, memory, and power. In this practical guide, expert author Steven Kinney cuts through the complexities of the lengthy TPM specification to provide a targeted, solid foundation for understanding the standard. This book encapsulates everything readers need to know in order to take advantage of hardware security based on sound TCG standards. It introduces the TPM interfaces basic concepts, then discusses command compilation and execution in detail, focusing on the TPM key hierarchy and the specification itself. The author presents a methodology that allows developers to successfully integrate the TPM into an embedded design and to verify the TPMs operation on a specific platform. Detailed real-world application examples throughout the book use the popular Atmel single-chip implementation of the TPM, which was created specifically for use in embedded designs. Device drivers and useful tools are included on the accompanying CD-ROM.Kinney, Steven is the author of 'Trusted Platform Module Basics Using Tpm in Embedded Systems', published 2006 under ISBN 9780750679602 and ISBN 0750679603.
[read more]