

Help ensure platform integrity by taking and storing security measurements.Use TPM technology for platform device authentication by using the TPM’s unique RSA key (an algorithm used by modern computers to encrypt and decrypt messages.).Generate, store, and limit the use of cryptographic keys.

But protecting physical property is something we’re taught and experienced in, cyber security, not so much. That’s where things like physical locks and keys come into play. (But even then, the chip includes multiple physical security mechanisms to make it tamper-resistant.) It is physical, which makes it immune to the hacking that software can be susceptible to.Īs a piece of hardware, the only way it can be tampered with is if someone literally goes into your office, opens up your device by hand, and messes with the TPM chip. We have a whole blog about the importance of staying up to date with your patches.īut not all security is software, some of it, like a TPM chip is hardware. Software works effectively when it is supported and updated. When we talk about cyber security, a lot of the time we’re talking about software, which by its nature has to be more malleable, it can and will be changed.įor software to be improved, you download more and more updates, as discovered weaknesses are exploited, and improvements are created. Simply put, a TPM chip inside your device, and just like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it. Which creates an algorithm containing random characters in a particular order, which serves as a digital signature, which functions as the key to your device, or the data inside. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. Let’s do the tech speak version first, and make sense of it after. Institutions, businesses, individuals, can be slow to take on the latest operating systems, like Windows 11, but eventually you have to make the switch, then you’ll be using TMP too. TPM, or Trusted Platform Module is a method of cyber security rising in prominence due to the unveiling of Windows 11 earlier this year, which requires your device to have a TPM chip.
