
TCG Specification Architecture Overview TCG Copyright
Specification
Revision 1.4
Page v of 54
Table of Contents
1. Scope and Audience ............................................................................................................................... 1
2. What is TCG? .......................................................................................................................................... 2
2.1 History................................................................................................................................................... 2
2.2 Mission.................................................................................................................................................. 2
2.3 Goals..................................................................................................................................................... 2
3. TCG Usage Scenarios ............................................................................................................................ 3
3.1 Risk Management................................................................................................................................ 3
3.2 Asset Management.............................................................................................................................. 3
3.3 E-commerce......................................................................................................................................... 3
3.4 Security Monitoring and Emergency Response ................................................................................ 3
4. TCG Architecture..................................................................................................................................... 5
4.1 Fundamental Trusted Platform Features ........................................................................................... 5
4.1.1 Protected Capabilities.................................................................................................................. 5
4.1.2 Attestation..................................................................................................................................... 5
4.1.3 Integrity Measurement, Storage and Reporting......................................................................... 6
4.2 The Trusted Platform........................................................................................................................... 6
4.2.1 Trusted Platform Building Blocks................................................................................................ 7
4.2.2 The Trust Boundary ..................................................................................................................... 7
4.2.3 Transitive Trust............................................................................................................................. 7
4.2.4 Integrity Measurement ................................................................................................................. 8
4.2.5 Integrity Reporting........................................................................................................................ 9
4.2.6 TPM as an Endpoint of Communication................................................................................... 15
4.2.7 Protected Storage ...................................................................................................................... 16
4.3 Trusted Platform Module (TPM) Components................................................................................. 19
4.3.1 Discrete Components ................................................................................................................ 19
4.3.2 Communications Interface......................................................................................................... 20
4.3.3 Tamper-Protected Packaging.................................................................................................... 21
4.4 Privacy Considerations...................................................................................................................... 21
4.4.1 What Does TCG Protect?.......................................................................................................... 21
4.4.2 How Does TCG Protect It? ........................................................................................................ 21
4.5 TCG Execution Model ....................................................................................................................... 21
4.5.1 TPM Operational States ............................................................................................................ 22
4.5.2 Platform Operation ..................................................................................................................... 24
4.5.3 Interfacing with TPM and Software Services ........................................................................... 25
4.6 TCG Programmatic Interfaces .......................................................................................................... 34
4.6.1 Naming Conventions.................................................................................................................. 34
4.6.2 Command Ordinals & Serialization........................................................................................... 34
4.6.3 Summary of TCG Commands and Interfaces.......................................................................... 35
5. TCG Model for Security Evaluation...................................................................................................... 41
5.1 The Context for Evaluation................................................................................................................ 41
5.2 Goal of Evaluation.............................................................................................................................. 42
5.3 The Evaluation Process .................................................................................................................... 43
5.3.1 Inputs to Evaluation.................................................................................................................... 43
5.3.2 Evaluation Results...................................................................................................................... 45
5.4 Certification ........................................................................................................................................ 45
5.4.1 Certified Products List................................................................................................................ 45
5.4.2 Where Does Certification Authority Originate? ........................................................................ 45
5.5 Accreditation....................................................................................................................................... 46
5.5.1 Protection Profile as Security Policy ......................................................................................... 46
5.5.2 Site-Specific Security Policy...................................................................................................... 46
5.5.3 Accreditation and Attestation..................................................................................................... 46
5.6 TCG Specification Conformance ...................................................................................................... 46
6. Manufacturing & Support Implications of TPM.................................................................................... 47
6.1 Tamper-resistant Packaging............................................................................................................. 47