Abstract
Individual TPM2 commands are different to TPMv1.2 commands because they provide a choice of cryptographic algorithm, additional TPM authorisation methods, multiple Protected Storage hierarchies, TPM identities that are easier to use in PKIs, and more comprehensive attestation. Sets of TPM2 commands nevertheless provide the same overall functionality as sets of TPMv1.2 commands, and this chapter illustrates the command-set mapping from TPMv1.2 to TPM2. Perhaps the biggest differences from TPMv1.2 are that TPM2 is designed to be hosted by computer platforms that include at least one, preferably two, Trusted Computing Bases, and TPM2 includes functionality to help protect TCBs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Proudler, G., Chen, L., Dalton, C. (2014). TPM2 Operation. In: Trusted Computing Platforms. Springer, Cham. https://doi.org/10.1007/978-3-319-08744-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-08744-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08743-6
Online ISBN: 978-3-319-08744-3
eBook Packages: Computer ScienceComputer Science (R0)