You are here: Resources > FIDIS Deliverables > HighTechID > D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management > 

D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management

Main concepts of Trusted Computing  Title:
TRUSTED COMPUTING GROUP SPECIFICATIONS
 The Trusted Computing Group

 

Trusted Computing Group Specifications

In this section, we introduce the Trusted Computing Group which is an industrial work group focused on the specification and standardization of TC technologies, and we briefly review the main functionalities, including binary attestation and binary sealing, of the specifications version 1.1b [9] and 1.2 [10] of the Trusted Computing Group (TCG).

The main components of the TCG proposal are the hardware component Trusted Platform Module (TPM), a kind of (protected) pre-BIOS called the Core Root of Trust for Measurement (CRTM), and a support software called TCG Software Stack (TSS) which performs various functions like communicating with the rest of the platform or with other platforms.

 

 

Main concepts of Trusted Computing  fidis-wp3-del3.9_Study_on_the_Impact_of_Trusted_Computing_on_Identity_and_Identity_Management_v1.1.sxw  The Trusted Computing Group
7 / 38