

How does Windows use TPMs and why are they required? Ensure software licenses are protected.Protect digital media rights using DRM technology.Mitigate firmware, ransomware, dictionary and phishing attacks.Provide platform device authentication with TPM's RSA key.Ensure platform integrity by using metrics that can detect changes to past configurations.


If any of the hashed components have been modified, the match fails, and the system cannot gain entry to the network. When the system attempts to connect to the network, the hashes are sent to a server that verifies they match expected values. This key pair is generated by the TPM based on the EK and an owner-specified password.Ī second key, called an Attestation Identity Key (AIK), protects the device against unauthorized firmware and software modification by hashing critical sections of firmware and software before they are executed. The Storage Root Key is created when a user or administrator takes ownership of the system. The pair is maintained inside the chip and cannot be accessed by software. Cryptographic keys store Rivest-Shamir-Adleman ( RSA) encryption keys specific to the host system for hardware authentication.Įach TPM chip contains an RSA key pair called the Endorsement Key (EK). TPM chips can be used with any major operating system and work best in conjunction with other security technologies, such as firewalls, antivirus software, smart cards and biometric verification.Ī TPM chip is located on a computer's motherboard as a dedicated processor. It can also store passwords, certificates or encryption keys. A TPM also helps provide security against threats like firmware and ransomware attacks.Ī TPM is used for digital rights management (DRM) to protect Windows-based systems and to enforce software licenses. A TPM helps prove a user's identity and authenticates their device. What is a Trusted Platform Module (TPM) and why is it important?Ī Trusted Platform Module (TPM) is a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys.
