Trusted Platform Module (TPM) Summary
TPM (Trusted Platform Module) is a computer chip (microcontroller) that can securely
store artifacts used to authenticate the platform (your PC or laptop). These artifacts can
include passwords, certificates, or encryption keys. A TPM can also be used to store
platform measurements that help ensure that the platform remains trustworthy.
Authentication (ensuring that the platform can prove that it is what it claims to be) and
attestation (a process helping to prove that a platform is trustworthy and has not been
breached) are necessary steps to ensure safer computing in all environments.
Trusted modules can be used in computing devices other than PCs, such as mobile
phones or network equipment.
Picture 1: Components of a TPM
The nature of hardware-based cryptography ensures that the information stored in
hardware is better protected from external software attacks. A variety of applications
storing secrets on a TPM can be developed. These applications make it much harder to
access information on computing devices without proper authorization (e.g., if the device
was stolen). If the configuration of the platform has changed as a result of unauthorized