没有合适的资源?快使用搜索试试~ 我知道了~
TCPA_Main_TCG_Architecture_v1_1b.pdf
需积分: 1 0 下载量 178 浏览量
2023-07-21
06:32:44
上传
评论
收藏 1.6MB PDF 举报
温馨提示
试读
332页
TPM 相关技术规范
资源推荐
资源详情
资源评论
Trusted Computing
Platform Alliance
(TCPA)
Main Specification
Version 1.1b
Published by
the
Trusted Computing Group
Copyright © 2003 Trusted Computing Group, Incorporated.
Copyright © 2000-2001 Compaq Computer Corporation, Hewlett-Packard Company, IBM Corporation,
Intel Corporation, Microsoft Corporation
Previously published by Trusted Computing Platform Alliance under the title: Trusted Computing Platform
Alliance (TCPA) Main Specification Version 1.1a.
DISCLAIMERS:
THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER, INCLUDING
ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR
PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY PROPOSAL, SPECIFICATION
OR SAMPLE. Without limitation, TCG disclaims all liability, including liability for infringement of any
proprietary rights, relating to use of information in this specification and to the implementation of this
specification, and TCG disclaims all liability for cost of procurement of substitute goods or services, lost
profits, loss of use, loss of data or any incidental, consequential, direct, indirect, or special damages,
whether under contract, tort, warranty or otherwise, arising in any way out of use or reliance upon this
specification or any information herein. No license, express or implied, by estoppel or otherwise, to any
TCG or TCG member intellectual property rights is granted herein.
Except that a license is hereby granted by TCG to copy and reproduce this specification for internal use
only.
TCPA Main Specification Page ii
Version 1.1b 22 February 2002
Contact the Trusted Computing Group at http://www.trustedcomputinggroup.org for information on
specification licensing through membership agreements.
Any marks and brands contained herein are the property of their respective owners.
Copyright C 2005 Trusted Computing Group (TCG) (
www.trustedcomputinggroup.org). All rights
reserved.
The only official, normative version of a TCG Specification or related document is the English-language
text adopted by TCG under its Bylaws and published on the TCG website,
www.trustedcomputing.org.
TCG does not guarantee the accuracy or completeness of any other version. Other language versions of
Specifications and related documents are provided for convenience and are intended to be technically
identical to the official English version, but they may contain translation and other errors.
Translations may be provided by volunteers through the Trusted Computing Group's translation program
(see
www.trustedcomputinggroup.org/specifications.
Other legal notices and terms governing the publication of materials on the TCG website are found at
www.trustedcomputinggroup.org/about/legal. TCG incorporates by reference the same notices and terms
with respect to TCG-authorized translations of Specifications and related documents, whether published
on the TCG website or at another online location.
TCPA Main Specification Page iii
Version 1.1b 22 February 2002
Acknowledgement
The Trusted Computing Group wishes to thank members of the PKI, PC Specific and Conformance
Workgroup who contributed expertise and text to this document. Thanks must be given to the members of
the TCG Technical Committee who were Michael Angelo, Boris Balacheff, Josh Benaloh, David
Challener, Dhruv Desai, Paul England, David Grawrock, Bob Meinschein, Manny Novoa, Graeme
Proudler, Jim Ward and Monty Wiseman.
David Chan
Technical Committee Chair
TCPA Main Specification Page iv
Version 1.1b 22 February 2002
Change History
Version Date Description
0.44 July 2000 Voted by members as appropriate for public release
with modifications.
0.90 August 2000 First version released to public.
0.91 October 26, 2000 Remove chapters 1 & 2. Complete reformat
0.92 4 November, 2000 Added new chapter for structures, updated
functions to match IDL, editing changes.
1.0 RC1 28 November 2000 Incorporated comments cleaned up structures and
made ready for publication.
1.0 RC2 11 December 2000 Incorporated changes from reflector.
Added new change authorization command.
1.0 RC4 10 Jan 2001 Incorporated changes and fixed up IDL
1.0 RC5 11 Jan 2001 PKCS#1 changes
1.01 17 April 2001 Implemented corrections. Mid point save made to
avoid problems with track changes in document
1.02 18 April 2001 Continue with changes for 1.1 release, changed IDL
to table format
1.03 First attempt to reconcile IDL misses
1.04 7 May 2001 Mid level drop to show all changes in regard to IDL
1.06 17 May 2001 All CR’s complete
1.07 22 May 2001 Cleanup from WG messages and changing in Audit
commands.
1.1 RC1 25 May 2001 Release candidate for specification
1.1 RC2 4 June 2001 All changes
1.1 RC3 12 June 2001 Removal of TSS commands, cleanup of parameter
blocks, all comments from v1 reflector.
1.1 RC4 5 July 2001 Editing changes, candidate for final review
1.1 RC6 17 July 2001 All changes made and version ready for voting
1.1 31 July 2001 Voted on release of 1.1
1.1a 12
th
November 2001 Includes all errata up to and including #55
1.1b 22 February 2002 Includes all errata up to and including #85
TCPA Main Specification Page v
Version 1.1b 22 February 2002
Table Of Contents
1. Forward ..............................................................................................................................................1
2. The Trusted Platform Subsystem.......................................................................................................2
2.1 Introduction.....................................................................................................................................2
2.2 Roots of Trust .................................................................................................................................2
2.2.1 Definitions................................................................................................................................3
2.2.2 Instantiations and Trust Bindings ............................................................................................3
2.3 Integrity Operations ........................................................................................................................5
2.3.1 Storage of Integrity Metrics .....................................................................................................5
2.3.2 Reporting of Integrity Metrics ..................................................................................................6
2.4 Use of Keys Associated with TPM Identities ..................................................................................7
2.5 Cryptographic Operations...............................................................................................................7
2.6 Opting to use a TPM.......................................................................................................................8
2.6.1 Enabling Ownership ................................................................................................................9
2.6.2 Activating a TPM .....................................................................................................................9
2.6.3 Selected operations...............................................................................................................11
2.7 Protected, Unprotected, and Connection Operations...................................................................13
3. Protection .........................................................................................................................................14
3.1 Introduction...................................................................................................................................14
3.2 Threat ...........................................................................................................................................14
3.3 Integrity.........................................................................................................................................15
3.4 Privileged Access .........................................................................................................................15
3.5 Side effects...................................................................................................................................15
4. Structures and Defines.....................................................................................................................16
4.1.1 Endness of Structures...........................................................................................................16
4.1.2 Byte Packing..........................................................................................................................16
4.1.3 Lengths..................................................................................................................................16
4.2 Defines..........................................................................................................................................17
4.2.1 Basic data types ....................................................................................................................17
4.2.2 Boolean types........................................................................................................................17
4.2.3 Helper redefinitions ...............................................................................................................17
4.2.4 Enumerated Helper redefinitions...........................................................................................18
4.2.5 Vendor specific......................................................................................................................19
4.3 Return codes ................................................................................................................................19
4.4 Command Specification Table Description ..................................................................................20
4.4.1 Introduction, Definition of Terms ...........................................................................................23
4.4.2 HMAC Calculation for Authorization......................................................................................23
4.4.3 Parameter List Tag Identifiers ...............................................................................................24
4.5 TCPA_VERSION..........................................................................................................................25
4.6 TCPA_DIGEST.............................................................................................................................26
4.7 TCPA_NONCE .............................................................................................................................27
4.8 TCPA_AUTHDATA.......................................................................................................................28
4.9 TCPA_KEY_HANDLE_LIST.........................................................................................................29
4.10 TCPA_KEY_USAGE values .....................................................................................................30
4.10.1 Mandatory Key Usage Schemes...........................................................................................31
4.11 TCPA_AUTH_DATA_USAGE values.......................................................................................32
4.12 TCPA_KEY_FLAGS..................................................................................................................33
4.13 Flags and persistent data structures.........................................................................................34
4.13.1 TCPA persistent data ............................................................................................................35
4.13.2 TCPA_PERSISTENT_FLAGS Structure...............................................................................37
4.13.3 TCPA_VOLATILE_FLAGS Structure....................................................................................37
4.14 TCPA_PAYLOAD_TYPE..........................................................................................................44
4.15 TCPA_ENTITY_TYPE ..............................................................................................................45
4.16 TCPA_STARTUP_TYPE ..........................................................................................................46
4.17 TCPA_PROTOCOL_ID.............................................................................................................47
剩余331页未读,继续阅读
资源评论
书香度年华
- 粉丝: 1w+
- 资源: 383
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功