TPM Enterprise Key Management requires centralized Hardware-based Security
Finding a way in which to administrate the sensitive Trusted Platform Module (TPM) key information and benefit from the potential of TPM’s is currently a major issue in most large companies. Enterprise customers are requesting centralized security management to guarantee reliable security. Thus security mechanisms whose use is controlled by the user do not provide companies with reliable security.
When compared to standard data backup utilities today’s operating systems do not provide any backup and recovery procedures for TPM specific keys. Furthermore existing key recovery solutions tend to place the burden for backup and restore onto the individual user. By combing readily available technology a centralized backup, recovery and migration solution, based upon a hardware-security- module, is proposed which fulfills the requirements of enterprise customers.
KeywordsSecurity Mechanism Trusted Platform Module Security Software Trust Computing Group Onsite Support
Unable to display preview. Download preview PDF.
- [Arch]TCG; TCG Specification Architecture Overview; Revision 1.2, 28. April 2004; File: TCG_1_0_Architecture_Overview.pdf.Google Scholar
- [BaMS]TCG; Interoperability Specification for Backup and Migration Services; Revision 1.0, 30 June 2005; for TPM Family 1. lb Level 1; File: IWG_Backup_and_ Migration_Services.pdf.Google Scholar
- [Kay]Kay, Roger L.; The Future of Trusted Computing, IDC, GovSec 2005.Google Scholar
- [LaG]Intel; LaGrande Technology, Preliminary Architecture Specification; May 2006; Link: http://www.intel.comltechnology/security/.