InvestorsHub Logo
icon url

waverider

08/18/05 5:04 PM

#92265 RE: x-point #92262

x-point, thanks.
icon url

awk

08/18/05 5:10 PM

#92267 RE: x-point #92262

x-point: The TCG spec says...(Edited)

I am sure Steven Sprague will give you the appropriate answer...researchers are sometimes are a bit whacky...don't they know 1.2 is out? It will be impossible for the Linux community to get on board without working together with the TCG...and I can't see that happen as long as nobody within the linux group takes the initiative to do so in a concerted effort.


From the TCG:

http://www.trustedcomputinggroup.org/downloads/specifications/IWG/IWG_Architecture_v1_0_r1.pdf


3.3.1 Manufacturing

The Manufacturing phase covers the manufacturing and assembly processes involved in the creation of a trusted platform as understood by the TCG. This includes TPM hardware manufacturing, Trusted Building Block (TBB) components and motherboard manufacturing, and the process bringing together all the hardware components defining a trusted platform. In addition, this phase covers the various conformance testing that has to be performed on the TPM, TBBs and TP as a whole.

From the infrastructure perspective a number of important functions occur at this phase:

Integrity Values Creation: Information regarding a given TPM, TBB components, Firmware, Software and Trusted Platform configuration must be collected and made accessible for input into the next phase. This information must be generated in this phase by the manufacturers of each component, with the aim of being consumable by Conformance Laboratory who verify the correctness of the implementation of a given TPM, TBB, Platform or any of its hardware and software components.

TPM-Manufacturer EK key pair generation (Early/Normative): A TPM manufacturer is expected to make the EK key pair physically present inside a TPM during this phase. Typically, the TPM manufacturer generates the EK key pair and inserts it into the TPM Platform Credential issuance prior to delivering the platform to its owner. There are two approaches to key generation and insertion; 1) generate keys off-chip and insert as part of TPM construction, 2) generate keys on-chip. The first approach is presumed to be performed by a TPM manufacturer, while the second can be performed by anyone having physical access to the TPM/platform during the manufacturing process. In order to distinguish the normative EK key pair generation in this phase from that in other later phases, here it is also referred to as early EK key pair generation. Early EK generation is the normative behavior.

TPM-Manufacturer EK-credential issuance (Early/Normative): A TPM manufacturer is expected to issue an EK-Credential during this phase for TPM devices it manufactures. This is the normative behavior. Note that EK-Credential issuance must come after EK key pair generation but not necessarily immediately following. In order to distinguish the normative EK-Credential issuance in this phase from that in other later phases, here it is also referred to as early EK-Credential issuance.

TPM-Manufacturer DAA-Credential issuance: A TPM manufacturer could issue a DAACredential by executing the DAA-Join Protocol. A TSS would be temporarily required, which output (DAA-Credential) must be able to be imported into the owners TSS later.