没有合适的资源?快使用搜索试试~ 我知道了~
TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf
需积分: 1 0 下载量 131 浏览量
2023-07-21
06:32:48
上传
评论
收藏 1.16MB PDF 举报
温馨提示
试读
128页
TPM 相关技术规范
资源推荐
资源详情
资源评论
Level 0 Revision 1.59 ii 29 September 2021
TCG PUBLISHED
Disclaimers, Notices, and License Terms
THIS SPECIFICATION IS PROVIDED "AS IS" WITH NO WARRANTIES WHATSOEVER,
INCLUDING ANY WARRANTY OF MERCHANTABILITY, NONINFRINGEMENT, FITNESS FOR
ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE ARISING OUT OF ANY
PROPOSAL, SPECIFICATION OR SAMPLE.
Without limitation, TCG disclaims all liability, including liability for infringement of any
proprietary rights, relating to use of information in this specification and to the
implementation of this specification, and TCG disclaims all liability for cost of procurement
of substitute goods or services, lost profits, loss of use, loss of data or any incidental,
consequential, direct, indirect, or special damages, whether under contract, tort, warranty or
otherwise, arising in any way out of use or reliance upon this specification or any information
herein.
This document is copyrighted by Trusted Computing Group (TCG), and no license, express
or implied, is granted herein other than as follows: You may not copy or reproduce the
document or distribute it to others without written permission from TCG, except that you
may freely do so for the purposes of (a) examining or implementing TCG specifications or (b)
developing, testing, or promoting information technology standards and best practices, so
long as you distribute the document with these disclaimers, notices, and license terms.
Contact the Trusted Computing Group at www.trustedcomputinggroup.org for information
on specification licensing through membership agreements.
Any marks and brands contained herein are the property of their respective owners.
Level 0 Revision 1.59 iii 29 September 2021
TCG PUBLISHED
Table of Contents
1. Scope ................................................................................................................................................................ 3
1.1 Key words .............................................................................................................................................. 3
1.2 Statement Type ..................................................................................................................................... 3
2. PP Introduction ................................................................................................................................................. 4
2.1 PP Reference ........................................................................................................................................ 4
2.2 PP overview .......................................................................................................................................... 4
3. TOE Overview ................................................................................................................................................... 5
3.1.1 TOE Definition ................................................................................................................................ 5
3.1.2 TOE Usage and Security Features ................................................................................................ 5
3.1.3 Non-TOE Hardware, Firmware and Software ................................................................................ 7
3.1.4 TPM Life Cycle ............................................................................................................................... 7
4. Conformance Claims ...................................................................................................................................... 12
4.1 CC Conformance Claim ...................................................................................................................... 12
4.2 Conformance with Packages .............................................................................................................. 12
4.3 Conformance with other Protection Profiles ........................................................................................ 12
4.4 Conformance Statement ..................................................................................................................... 12
5. Security Problem Definition ............................................................................................................................ 13
5.1 Assets .................................................................................................................................................. 13
5.2 Threats ................................................................................................................................................ 13
5.3 Organisational Security Policies .......................................................................................................... 14
5.4 Assumptions ........................................................................................................................................ 15
6. Security Objectives ......................................................................................................................................... 17
6.1 Security Objectives for the TOE .......................................................................................................... 17
6.2 Security Objectives for the Operational Environment ......................................................................... 19
6.3 Security Objective Rationale ............................................................................................................... 19
7. Extended Components Definition ................................................................................................................... 28
7.1 Family Random Number Generation .................................................................................................. 28
8. Security Requirements ................................................................................................................................... 29
8.1 Security Functional Requirements ...................................................................................................... 29
8.1.1 Definitions of Subjects, Objects and TSF data ............................................................................ 29
8.1.2 Presentation of operations on SFR components ......................................................................... 36
8.1.3 SFRs for the General Behavior of the TOE ................................................................................. 37
8.1.3.1 Management ............................................................................................................................... 37
8.1.3.2 Data Protection and Privacy ....................................................................................................... 38
8.1.3.3 Cryptographic SFR ..................................................................................................................... 39
Level 0 Revision 1.59 iv 29 September 2021
TCG PUBLISHED
8.1.3.4 Identification and Authentication SFR ......................................................................................... 46
8.1.3.5 TSF Protection ............................................................................................................................ 53
8.1.4 SFRs Concerning the Object Hierarchy of the TOE .................................................................... 55
8.1.4.1 TPM Operational States .............................................................................................................. 55
8.1.4.2 Creation and Modification of the TPM Hierarchy ........................................................................ 61
8.1.4.3 Data Import and Export ............................................................................................................... 66
8.1.4.4 Measurement and Reporting ...................................................................................................... 72
8.1.5 SFRs for the TOE Operation ........................................................................................................ 76
8.1.5.1 Access SFR ................................................................................................................................ 76
8.1.5.2 Non-Volatile Storage ................................................................................................................... 82
8.1.5.3 Credentials .................................................................................................................................. 88
8.2 Security assurance requirements ........................................................................................................ 91
8.3 Security Requirements rationale ......................................................................................................... 92
8.3.1 Sufficiency of SFR ....................................................................................................................... 92
8.3.2 Dependency Rationale ............................................................................................................... 105
8.3.3 Assurance Rationale .................................................................................................................. 111
9. ECDAA optional package ............................................................................................................................. 113
9.1 Overview ........................................................................................................................................... 113
9.2 Conformance Claims ......................................................................................................................... 113
9.2.1 CC Conformance Claim ............................................................................................................. 113
9.2.2 Conformance with Packages ..................................................................................................... 113
9.2.3 Conformance with other Protection Profiles .............................................................................. 113
9.2.4 Conformance Statement ............................................................................................................ 113
9.3 Security Problem definition ............................................................................................................... 113
9.3.1 Assets ........................................................................................................................................ 113
9.3.2 Threats ....................................................................................................................................... 114
9.4 Organizational security policies ......................................................................................................... 114
9.5 Assumptions ...................................................................................................................................... 115
9.6 Security Objectives ............................................................................................................................ 115
9.6.1 Security objectives for the TOE ................................................................................................. 115
9.6.2 Security Objectives for the Operational Environment ................................................................ 115
9.6.3 Security Objective Rationale ...................................................................................................... 115
9.7 Security Requirements ...................................................................................................................... 116
9.8 Security Requirements rationale ....................................................................................................... 116
9.8.1 Sufficiency of SFR ..................................................................................................................... 116
9.8.2 Dependency Rationale ............................................................................................................... 117
10. Appendix ....................................................................................................................................................... 118
Level 0 Revision 1.59 v 29 September 2021
TCG PUBLISHED
10.1 Random Number Generator (informative) ........................................................................................ 118
10.2 Acronyms .......................................................................................................................................... 119
10.3 Normative references ........................................................................................................................ 121
剩余127页未读,继续阅读
资源评论
书香度年华
- 粉丝: 1w+
- 资源: 383
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功