CINXE.COM

Trusted Platform Module - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Trusted Platform Module - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"82713ff4-142e-44cc-b584-381133f7449c","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Trusted_Platform_Module","wgTitle":"Trusted Platform Module","wgCurRevisionId":1256857161,"wgRevisionId":1256857161,"wgArticleId":2936835,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["CS1: long volume value","CS1 maint: archived copy as title","CS1 maint: bot: original URL status unknown","Articles with short description","Short description is different from Wikidata","All articles with vague or ambiguous time","Vague or ambiguous time from December 2022","All articles with unsourced statements","Articles with unsourced statements from September 2021","Articles containing potentially dated statements from 2012", "All articles containing potentially dated statements","Computer hardware standards","Computer security hardware","Cryptographic hardware","Cryptographic software","Cryptography standards","ISO standards","Random number generation","Trusted computing"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Trusted_Platform_Module","wgRelevantArticleId":2936835,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":80000, "wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q1140366","wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript" :"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/1200px-TPM.svg.png"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="809"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/800px-TPM.svg.png"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="539"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/640px-TPM.svg.png"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="431"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Trusted Platform Module - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Trusted_Platform_Module"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Trusted_Platform_Module"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Trusted_Platform_Module rootpage-Trusted_Platform_Module skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trusted+Platform+Module" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Trusted+Platform+Module" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Trusted+Platform+Module" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Trusted+Platform+Module" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Overview" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Overview"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Overview</span> </div> </a> <ul id="toc-Overview-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Uses" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Uses"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Uses</span> </div> </a> <button aria-controls="toc-Uses-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Uses subsection</span> </button> <ul id="toc-Uses-sublist" class="vector-toc-list"> <li id="toc-Platform_integrity" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Platform_integrity"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Platform integrity</span> </div> </a> <ul id="toc-Platform_integrity-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Disk_encryption" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Disk_encryption"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Disk encryption</span> </div> </a> <ul id="toc-Disk_encryption-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Other_uses_and_concerns" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Other_uses_and_concerns"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.3</span> <span>Other uses and concerns</span> </div> </a> <ul id="toc-Other_uses_and_concerns-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-By_organizations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#By_organizations"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.4</span> <span>By organizations</span> </div> </a> <ul id="toc-By_organizations-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-TPM_implementations" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#TPM_implementations"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>TPM implementations</span> </div> </a> <button aria-controls="toc-TPM_implementations-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle TPM implementations subsection</span> </button> <ul id="toc-TPM_implementations-sublist" class="vector-toc-list"> <li id="toc-Laptops_and_notebooks" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Laptops_and_notebooks"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Laptops and notebooks</span> </div> </a> <ul id="toc-Laptops_and_notebooks-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-TPM_2.0_implementations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#TPM_2.0_implementations"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>TPM 2.0 implementations</span> </div> </a> <ul id="toc-TPM_2.0_implementations-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Open_source_implementations" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Open_source_implementations"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Open source implementations</span> </div> </a> <ul id="toc-Open_source_implementations-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-TPM_1.2_versus_TPM_2.0" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#TPM_1.2_versus_TPM_2.0"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>TPM 1.2 versus TPM 2.0</span> </div> </a> <ul id="toc-TPM_1.2_versus_TPM_2.0-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Reception" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Reception"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Reception</span> </div> </a> <ul id="toc-Reception-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Attacks" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Attacks"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Attacks</span> </div> </a> <button aria-controls="toc-Attacks-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Attacks subsection</span> </button> <ul id="toc-Attacks-sublist" class="vector-toc-list"> <li id="toc-2017_weak_key_generation_controversy" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#2017_weak_key_generation_controversy"> <div class="vector-toc-text"> <span class="vector-toc-numb">7.1</span> <span>2017 weak key generation controversy</span> </div> </a> <ul id="toc-2017_weak_key_generation_controversy-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Availability" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Availability"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>Availability</span> </div> </a> <button aria-controls="toc-Availability-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Availability subsection</span> </button> <ul id="toc-Availability-sublist" class="vector-toc-list"> <li id="toc-TPM" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#TPM"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.1</span> <span>TPM</span> </div> </a> <ul id="toc-TPM-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Field_upgrade" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Field_upgrade"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.2</span> <span>Field upgrade</span> </div> </a> <ul id="toc-Field_upgrade-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Virtual_TPM" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Virtual_TPM"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.3</span> <span>Virtual TPM</span> </div> </a> <ul id="toc-Virtual_TPM-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Operating_systems" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Operating_systems"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.4</span> <span>Operating systems</span> </div> </a> <ul id="toc-Operating_systems-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Platforms" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Platforms"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.5</span> <span>Platforms</span> </div> </a> <ul id="toc-Platforms-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Virtualization" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Virtualization"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.6</span> <span>Virtualization</span> </div> </a> <ul id="toc-Virtualization-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Software" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Software"> <div class="vector-toc-text"> <span class="vector-toc-numb">8.7</span> <span>Software</span> </div> </a> <ul id="toc-Software-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Endorsement_keys" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Endorsement_keys"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>Endorsement keys</span> </div> </a> <ul id="toc-Endorsement_keys-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-TPM_software_libraries" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#TPM_software_libraries"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>TPM software libraries</span> </div> </a> <ul id="toc-TPM_software_libraries-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">11</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">12</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Trusted Platform Module</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 20 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-20" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">20 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D9%88%D8%AD%D8%AF%D8%A9_%D8%A7%D9%84%D9%86%D8%B8%D8%A7%D9%85_%D8%A7%D9%84%D8%A3%D8%B3%D8%A7%D8%B3%D9%8A_%D8%A7%D9%84%D9%85%D9%88%D8%AB%D9%88%D9%82%D8%A9" title="وحدة النظام الأساسي الموثوقة – Arabic" lang="ar" hreflang="ar" data-title="وحدة النظام الأساسي الموثوقة" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Catalan" lang="ca" hreflang="ca" data-title="Trusted Platform Module" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Czech" lang="cs" hreflang="cs" data-title="Trusted Platform Module" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – German" lang="de" hreflang="de" data-title="Trusted Platform Module" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Usaldusv%C3%A4%C3%A4rse_platvormi_moodul" title="Usaldusväärse platvormi moodul – Estonian" lang="et" hreflang="et" data-title="Usaldusväärse platvormi moodul" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/TPM_(inform%C3%A1tica)" title="TPM (informática) – Spanish" lang="es" hreflang="es" data-title="TPM (informática)" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – French" lang="fr" hreflang="fr" data-title="Trusted Platform Module" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%8B%A0%EB%A2%B0_%ED%94%8C%EB%9E%AB%ED%8F%BC_%EB%AA%A8%EB%93%88" title="신뢰 플랫폼 모듈 – Korean" lang="ko" hreflang="ko" data-title="신뢰 플랫폼 모듈" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Croatian" lang="hr" hreflang="hr" data-title="Trusted Platform Module" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Indonesian" lang="id" hreflang="id" data-title="Trusted Platform Module" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Italian" lang="it" hreflang="it" data-title="Trusted Platform Module" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/TPM" title="TPM – Hebrew" lang="he" hreflang="he" data-title="TPM" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Dutch" lang="nl" hreflang="nl" data-title="Trusted Platform Module" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Japanese" lang="ja" hreflang="ja" data-title="Trusted Platform Module" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Trusted Platform Module" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Polish" lang="pl" hreflang="pl" data-title="Trusted Platform Module" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Portuguese" lang="pt" hreflang="pt" data-title="Trusted Platform Module" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/TPM_(%D1%81%D0%BF%D0%B5%D1%86%D0%B8%D1%84%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D1%8F)" title="TPM (спецификация) – Russian" lang="ru" hreflang="ru" data-title="TPM (спецификация)" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/Trusted_Platform_Module" title="Trusted Platform Module – Ukrainian" lang="uk" hreflang="uk" data-title="Trusted Platform Module" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E4%BF%A1%E8%B3%B4%E5%B9%B3%E5%8F%B0%E6%A8%A1%E7%B5%84" title="信賴平台模組 – Chinese" lang="zh" hreflang="zh" data-title="信賴平台模組" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1140366#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trusted_Platform_Module" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Trusted_Platform_Module" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Trusted_Platform_Module"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Trusted_Platform_Module"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Trusted_Platform_Module" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Trusted_Platform_Module" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;oldid=1256857161" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Trusted_Platform_Module&amp;id=1256857161&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrusted_Platform_Module"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FTrusted_Platform_Module"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Trusted_Platform_Module&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Trusted_Platform_Module&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Trusted_Platform_Module" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q1140366" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Standard for secure cryptoprocessors</div> <style data-mw-deduplicate="TemplateStyles:r1257001546">.mw-parser-output .infobox-subbox{padding:0;border:none;margin:-3px;width:auto;min-width:100%;font-size:100%;clear:none;float:none;background-color:transparent}.mw-parser-output .infobox-3cols-child{margin:auto}.mw-parser-output .infobox .navbar{font-size:100%}@media screen{html.skin-theme-clientpref-night .mw-parser-output .infobox-full-data:not(.notheme)>div:not(.notheme)[style]{background:#1f1f23!important;color:#f8f9fa}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .infobox-full-data:not(.notheme) div:not(.notheme){background:#1f1f23!important;color:#f8f9fa}}@media(min-width:640px){body.skin--responsive .mw-parser-output .infobox-table{display:table!important}body.skin--responsive .mw-parser-output .infobox-table>caption{display:table-caption!important}body.skin--responsive .mw-parser-output .infobox-table>tbody{display:table-row-group}body.skin--responsive .mw-parser-output .infobox-table tr{display:table-row!important}body.skin--responsive .mw-parser-output .infobox-table th,body.skin--responsive .mw-parser-output .infobox-table td{padding-left:inherit;padding-right:inherit}}</style><table class="infobox hproduct"><caption class="infobox-title fn">Trusted Platform Module</caption><tbody><tr><th scope="row" class="infobox-label">Abbreviation</th><td class="infobox-data">TPM</td></tr><tr><th scope="row" class="infobox-label">Status</th><td class="infobox-data">Published</td></tr><tr><th scope="row" class="infobox-label">Year started</th><td class="infobox-data">2009<span class="noprint">&#59;&#32;15&#160;years ago</span><span style="display:none">&#160;(<span class="bday dtstart published updated">2009</span>)</span></td></tr><tr><th scope="row" class="infobox-label">Latest version</th><td class="infobox-data"><a href="/wiki/International_Organization_for_Standardization" title="International Organization for Standardization">ISO</a>/<a href="/wiki/International_Electrotechnical_Commission" title="International Electrotechnical Commission">IEC</a> 11889:2015<br />2015<span class="noprint">&#59;&#32;9&#160;years ago</span><span style="display:none">&#160;(<span class="bday dtstart published updated">2015</span>)</span></td></tr><tr><th scope="row" class="infobox-label">Organization</th><td class="infobox-data"><a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a>, <a href="/wiki/ISO/IEC_JTC_1" title="ISO/IEC JTC 1">ISO/IEC JTC 1</a></td></tr><tr><th scope="row" class="infobox-label">Domain</th><td class="infobox-data"><a href="/wiki/Secure_cryptoprocessor" title="Secure cryptoprocessor">Secure cryptoprocessor</a></td></tr><tr><th scope="row" class="infobox-label">Website</th><td class="infobox-data"><span class="url"><a rel="nofollow" class="external text" href="https://www.iso.org/standard/66510.html">ISO/IEC 11889-1:2015</a></span>, <span class="url"><a rel="nofollow" class="external text" href="https://www.iso.org/standard/66511.html">ISO/IEC 11889-2:2015</a></span>, <span class="url"><a rel="nofollow" class="external text" href="https://www.iso.org/standard/66512.html">ISO/IEC 11889-3:2015</a></span>, <span class="url"><a rel="nofollow" class="external text" href="https://www.iso.org/standard/66513.html">ISO/IEC 11889-4:2015</a></span></td></tr></tbody></table> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:TPM.svg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/330px-TPM.svg.png" decoding="async" width="330" height="222" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/495px-TPM.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/be/TPM.svg/660px-TPM.svg.png 2x" data-file-width="580" data-file-height="391" /></a><figcaption>Components of a Trusted Platform Module complying with the TPM version 1.2 standard</figcaption></figure> <p><b>Trusted Platform Module</b> (<b>TPM</b>) is an international standard for a <a href="/wiki/Secure_cryptoprocessor" title="Secure cryptoprocessor">secure cryptoprocessor</a>, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The term can also refer to a <a href="/wiki/Integrated_circuit" title="Integrated circuit">chip</a> conforming to the standard ISO/IEC 11889. Common uses are to verify platform integrity (to verify that the <a href="/wiki/Boot_process" class="mw-redirect" title="Boot process">boot process</a> starts from a trusted combination of hardware and software), and to store disk encryption keys. </p><p>One of <a href="/wiki/Windows_11" title="Windows 11">Windows 11</a>'s operating system requirements is TPM 2.0 implementation. Microsoft has stated that this is to help increase security against firmware attacks.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p><p>The bloat of functions was criticised, especially random number generation.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Trusted Platform Module (TPM) was conceived by a <a href="/wiki/Computer_industry" class="mw-redirect" title="Computer industry">computer industry</a> consortium called <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> (TCG). It evolved into <i>TPM Main Specification Version 1.2</i> which was standardized by <a href="/wiki/International_Organization_for_Standardization" title="International Organization for Standardization">International Organization for Standardization</a> (ISO) and <a href="/wiki/International_Electrotechnical_Commission" title="International Electrotechnical Commission">International Electrotechnical Commission</a> (IEC) in 2009 as ISO/IEC 11889:2009.<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> <i>TPM Main Specification Version 1.2</i> was finalized on 3 March 2011 completing its revision.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-TPM_Main_Specs_5-0" class="reference"><a href="#cite_note-TPM_Main_Specs-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> </p><p>On 9 April 2014 the <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> announced a major upgrade to their specification entitled <i>TPM Library Specification 2.0</i>.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> The group continues work on the standard incorporating errata, algorithmic additions and new commands, with its most recent edition published as 2.0 in November 2019.<sup id="cite_ref-TPM_Library_Specs_7-0" class="reference"><a href="#cite_note-TPM_Library_Specs-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> This version became ISO/IEC 11889:2015. </p><p>When a new revision is released it is divided into multiple parts by the Trusted Computing Group. Each part consists of a document that makes up the whole of the new TPM specification. </p> <ul><li>Part 1 Architecture (renamed from Design Principles)</li> <li>Part 2 Structures of the TPM</li> <li>Part 3 Commands</li> <li>Part 4 Supporting Routines (added in TPM 2.0)</li></ul> <div class="mw-heading mw-heading2"><h2 id="Overview">Overview</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=2" title="Edit section: Overview"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The Trusted Platform Module (TPM) provides: </p> <ul><li>A <a href="/wiki/Hardware_random_number_generator" title="Hardware random number generator">hardware random number generator</a><sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup></li> <li>Facilities for the secure generation of <a href="/wiki/Cryptographic_keys" class="mw-redirect" title="Cryptographic keys">cryptographic keys</a> for limited uses.</li> <li><a href="/wiki/Remote_attestation" class="mw-redirect" title="Remote attestation">Remote attestation</a>: Creates a nearly unforgeable <a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">hash key</a> summary of the hardware and software configuration. One could use the hash to verify that the hardware and software have not been changed. The software in charge of hashing the setup determines the extent of the summary.</li> <li><a href="/wiki/Late_binding" title="Late binding">Binding</a>: Data is encrypted using the TPM bind key, a unique <a href="/wiki/RSA_(algorithm)" class="mw-redirect" title="RSA (algorithm)">RSA</a> key descended from a storage key. Computers that incorporate a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM. This process, often called wrapping or binding a key, can help protect the key from disclosure. Each TPM has a master wrapping key, called the storage root key, which is stored within the TPM itself. User-level RSA key containers are stored with the Windows user profile for a particular user and can be used to encrypt and decrypt information for applications that run under that specific user identity.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Sealed_storage" class="mw-redirect" title="Sealed storage">Sealed storage</a>: Specifies the TPM state<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> for the data to be decrypted (unsealed).<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup></li> <li>Other <a href="/wiki/Trusted_Computing" title="Trusted Computing">Trusted Computing</a> functions for the data to be decrypted (unsealed).<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>Computer programs can use a TPM for the <a href="/wiki/Authentication" title="Authentication">authentication</a> of hardware devices, since each TPM chip has a unique and secret Endorsement Key (EK) burned in as it is produced. Security embedded in hardware provides more protection than a software-only solution.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> Its use is restricted in some countries.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Uses">Uses</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=3" title="Edit section: Uses"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Platform_integrity">Platform integrity</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=4" title="Edit section: Platform integrity"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The primary scope of TPM is to ensure the <a href="/wiki/Data_integrity" title="Data integrity">integrity</a> of a platform during boot time. In this context, "integrity" means "behaves as intended", and a "platform" is any computer device regardless of its <a href="/wiki/Operating_system" title="Operating system">operating system</a>. This is to ensure that the <a href="/wiki/Boot_process" class="mw-redirect" title="Boot process">boot process</a> starts from a trusted combination of hardware and software, and continues until the operating system has fully booted and <a href="/wiki/Application_software" title="Application software">applications</a> are running. </p><p>When TPM is used, the firmware and the operating system are responsible for ensuring integrity. </p><p>For example, the <a href="/wiki/Unified_Extensible_Firmware_Interface" class="mw-redirect" title="Unified Extensible Firmware Interface">Unified Extensible Firmware Interface</a> (UEFI) can use TPM to form a <a href="/wiki/Root_of_Trust" class="mw-redirect" title="Root of Trust">root of trust</a>: The TPM contains several Platform Configuration Registers (PCRs) that allow secure storage and reporting of security-relevant metrics. These metrics can be used to detect changes to previous configurations and decide how to proceed. Examples of such use can be found in <a href="/wiki/Linux_Unified_Key_Setup" title="Linux Unified Key Setup">Linux Unified Key Setup</a> (LUKS),<sup id="cite_ref-:0_17-0" class="reference"><a href="#cite_note-:0-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/BitLocker" title="BitLocker">BitLocker</a> and <a href="/wiki/PrivateCore" title="PrivateCore">PrivateCore</a> vCage memory encryption. (See below.) </p><p>Another example of platform integrity via TPM is in the use of <a href="/wiki/Microsoft_Office_365" class="mw-redirect" title="Microsoft Office 365">Microsoft Office 365</a> licensing and Outlook Exchange.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> </p><p>Another example of TPM use for platform integrity is the <a href="/wiki/Trusted_Execution_Technology" title="Trusted Execution Technology">Trusted Execution Technology</a> (TXT), which creates a chain of trust. It could remotely attest that a computer is using the specified hardware and software.<sup id="cite_ref-:1_19-0" class="reference"><a href="#cite_note-:1-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Disk_encryption">Disk encryption</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=5" title="Edit section: Disk encryption"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Full_disk_encryption" class="mw-redirect" title="Full disk encryption">Full disk encryption</a> utilities, such as <a href="/wiki/Dm-crypt" title="Dm-crypt">dm-crypt</a>, can use this technology to protect the keys used to encrypt the computer's storage devices and provide integrity <a href="/wiki/Authentication" title="Authentication">authentication</a> for a trusted boot pathway that includes firmware and the <a href="/wiki/Boot_sector" title="Boot sector">boot sector</a>.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Other_uses_and_concerns">Other uses and concerns</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=6" title="Edit section: Other uses and concerns"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Any application can use a TPM chip for: </p> <ul><li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management (DRM)</a></li> <li><a href="/wiki/Windows_Defender" class="mw-redirect" title="Windows Defender">Windows Defender</a></li> <li>Windows Domain logon<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup></li> <li>Protection and enforcement of <a href="/wiki/Software_license" title="Software license">software licenses</a></li> <li>Prevention of <a href="/wiki/Cheating_in_online_games" title="Cheating in online games">cheating in online games</a><sup id="cite_ref-:2_22-0" class="reference"><a href="#cite_note-:2-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup></li></ul> <p>Other uses exist, some of which give rise to <a href="/wiki/Privacy" title="Privacy">privacy</a> concerns. The "physical presence" feature of TPM addresses some of these concerns by requiring <a href="/wiki/BIOS" title="BIOS">BIOS</a>/<a href="/wiki/UEFI" title="UEFI">UEFI</a>-level confirmation for operations such as activating, deactivating, clearing or changing ownership of TPM by someone who is physically present at the console of the machine.<sup id="cite_ref-TCPA_23-0" class="reference"><a href="#cite_note-TCPA-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-SetPhysicalPresenceRequest_24-0" class="reference"><a href="#cite_note-SetPhysicalPresenceRequest-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="By_organizations">By organizations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=7" title="Edit section: By organizations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/United_States_Department_of_Defense" title="United States Department of Defense">United States Department of Defense</a> (DoD) specifies that "new computer assets (e.g., server, desktop, laptop, thin client, tablet, smartphone, personal digital assistant, mobile phone) procured to support DoD will include a TPM version 1.2 or higher where required by <a href="/wiki/Defense_Information_Systems_Agency" title="Defense Information Systems Agency">Defense Information Systems Agency</a> (DISA) <a href="/wiki/Security_Technical_Implementation_Guide" title="Security Technical Implementation Guide">Security Technical Implementation Guides</a> (STIGs) and where such technology is available." The DoD anticipates that TPM is to be used for device identification, authentication, encryption, and device integrity verification.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="TPM_implementations">TPM implementations</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=8" title="Edit section: TPM implementations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:TPM_Asus.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/6/64/TPM_Asus.jpg/220px-TPM_Asus.jpg" decoding="async" width="220" height="187" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/6/64/TPM_Asus.jpg/330px-TPM_Asus.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/6/64/TPM_Asus.jpg/440px-TPM_Asus.jpg 2x" data-file-width="830" data-file-height="705" /></a><figcaption>Trusted Platform Module installed on a mainboard</figcaption></figure> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1257001546"><table class="infobox vevent"><caption class="infobox-title summary">TPM 2.0 Reference Implementation</caption><tbody><tr><th scope="row" class="infobox-label" style="white-space: nowrap;"><a href="/wiki/Programmer" title="Programmer">Developer(s)</a></th><td class="infobox-data"><a href="/wiki/Microsoft" title="Microsoft">Microsoft</a></td></tr><tr><th scope="row" class="infobox-label" style="white-space: nowrap;"><a href="/wiki/Repository_(version_control)" title="Repository (version control)">Repository</a></th><td class="infobox-data"><span class="url"><a rel="nofollow" class="external text" href="https://github.com/Microsoft/ms-tpm-20-ref">github<wbr />.com<wbr />/Microsoft<wbr />/ms-tpm-20-ref</a></span></td></tr><tr><th scope="row" class="infobox-label" style="white-space: nowrap;">Written in</th><td class="infobox-data"><a href="/wiki/C_(programming_language)" title="C (programming language)">C</a>, <a href="/wiki/C%2B%2B" title="C++">C++</a></td></tr><tr><th scope="row" class="infobox-label" style="white-space: nowrap;"><a href="/wiki/Software_categories#Categorization_approaches" title="Software categories">Type</a></th><td class="infobox-data">TPM implementation</td></tr><tr><th scope="row" class="infobox-label" style="white-space: nowrap;"><a href="/wiki/Software_license" title="Software license">License</a></th><td class="infobox-data"><a href="/wiki/BSD_License" class="mw-redirect" title="BSD License">BSD License</a></td></tr><tr><th scope="row" class="infobox-label" style="white-space: nowrap;">Website</th><td class="infobox-data"><span class="url"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/tpm-library-specification">trustedcomputinggroup<wbr />.org<wbr />/tpm-library-specification</a></span></td></tr></tbody></table> <div class="mw-heading mw-heading3"><h3 id="Laptops_and_notebooks">Laptops and notebooks</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=9" title="Edit section: Laptops and notebooks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2006 new <a href="/wiki/Laptop" title="Laptop">laptops</a> began being sold with a built-in TPM chip. In the future, this concept could be co-located on an existing <a href="/wiki/Motherboard" title="Motherboard">motherboard</a> chip in computers, or any other device where the TPM facilities could be employed, such as a <a href="/wiki/Cellphone" class="mw-redirect" title="Cellphone">cellphone</a>. On a PC, either the <a href="/wiki/Low_Pin_Count" title="Low Pin Count">Low Pin Count</a> (LPC) bus or the <a href="/wiki/Serial_Peripheral_Interface" title="Serial Peripheral Interface">Serial Peripheral Interface</a> (SPI) bus is used to connect to the TPM chip. </p><p>The <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> (TCG) has certified TPM chips manufactured by <a href="/wiki/Infineon_Technologies" title="Infineon Technologies">Infineon Technologies</a>, <a href="/wiki/Nuvoton" title="Nuvoton">Nuvoton</a>, and <a href="/wiki/STMicroelectronics" title="STMicroelectronics">STMicroelectronics</a>,<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> having assigned TPM vendor <a href="/wiki/Identity_document" title="Identity document">IDs</a> to <a href="/wiki/Advanced_Micro_Devices" class="mw-redirect" title="Advanced Micro Devices">Advanced Micro Devices</a>, <a href="/wiki/Atmel" title="Atmel">Atmel</a>, <a href="/wiki/Broadcom" title="Broadcom">Broadcom</a>, <a href="/wiki/IBM" title="IBM">IBM</a>, Infineon, <a href="/wiki/Intel" title="Intel">Intel</a>, <a href="/wiki/Lenovo" title="Lenovo">Lenovo</a>, <a href="/wiki/National_Semiconductor" title="National Semiconductor">National Semiconductor</a>, Nationz Technologies, Nuvoton, <a href="/wiki/Qualcomm" title="Qualcomm">Qualcomm</a>, <a href="/wiki/Rockchip" title="Rockchip">Rockchip</a>, <a href="/wiki/Microchip_Technology" title="Microchip Technology">Standard Microsystems Corporation</a>, STMicroelectronics, <a href="/wiki/Samsung" title="Samsung">Samsung</a>, Sinosun, <a href="/wiki/Texas_Instruments" title="Texas Instruments">Texas Instruments</a>, and <a href="/wiki/Winbond" title="Winbond">Winbond</a>.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="TPM_2.0_implementations">TPM 2.0 implementations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=10" title="Edit section: TPM 2.0 implementations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>There are five different types of TPM 2.0 implementations (listed in order from most to least secure):<sup id="cite_ref-TPMRecs_28-0" class="reference"><a href="#cite_note-TPMRecs-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-TPMBrief_29-0" class="reference"><a href="#cite_note-TPMBrief-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p> <ul><li><b>Discrete TPMs</b> are dedicated chips that implement TPM functionality in their own tamper resistant semiconductor package. They are the most secure, certified to FIPS-140 with level 3 physical security<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup> resistance to attack versus routines implemented in software, and their packages are required to implement some tamper resistance. For example, the TPM for the brake controller in a car is protected from hacking by sophisticated methods.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Integrated TPMs</b> are part of another chip. While they use hardware that resists software bugs, they are not required to implement tamper resistance. <a href="/wiki/Intel" title="Intel">Intel</a> has integrated TPMs in some of its <a href="/wiki/Chipset" title="Chipset">chipsets</a>.</li> <li><b>Firmware TPMs (fTPMs)</b> are firmware-based (e.g. <a href="/wiki/UEFI" title="UEFI">UEFI</a>) solutions that run in a CPU's <a href="/wiki/Trusted_execution_environment" title="Trusted execution environment">trusted execution environment</a>. Intel, AMD and Qualcomm have implemented firmware TPMs.</li> <li><b>Virtual TPMs (vTPMs)</b> are provided by and rely on <a href="/wiki/Hypervisor" title="Hypervisor">hypervisors</a> in isolated execution environments that are hidden from the software running inside <a href="/wiki/Virtual_machines" class="mw-redirect" title="Virtual machines">virtual machines</a> to secure their code from the software in the virtual machines. They can provide a security level comparable to a firmware TPM. <a href="/wiki/Google_Cloud_Platform" title="Google Cloud Platform">Google Cloud Platform</a> has implemented vTPM.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Software TPMs</b> are software emulators of TPMs that run with no more protection than a regular program gets within an operating system. They depend entirely on the environment that they run in, so they provide no more security than what can be provided by the normal execution environment. They are useful for development purposes.</li></ul> <div class="mw-heading mw-heading3"><h3 id="Open_source_implementations">Open source implementations</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=11" title="Edit section: Open source implementations"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The official TCG reference implementation of the TPM 2.0 Specification has been developed by <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. It is licensed under <a href="/wiki/BSD_License" class="mw-redirect" title="BSD License">BSD License</a> and the <a href="/wiki/Source_code" title="Source code">source code</a> is available on <a href="/wiki/GitHub" title="GitHub">GitHub</a>.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2018 <a href="/wiki/Intel" title="Intel">Intel</a> open-sourced its Trusted Platform Module 2.0 (TPM2) software stack with support for Linux and Microsoft Windows.<sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> The source code is hosted on GitHub and licensed under <a href="/wiki/BSD_License" class="mw-redirect" title="BSD License">BSD License</a>.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/Infineon" class="mw-redirect" title="Infineon">Infineon</a> funded the development of an open source TPM middleware that complies with the Software Stack (TSS) Enhanced System API (ESAPI) specification of the TCG.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup> It was developed by <a href="/wiki/Fraunhofer_Institute" class="mw-redirect" title="Fraunhofer Institute">Fraunhofer Institute</a> for Secure Information Technology (SIT).<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> </p><p><a href="/wiki/IBM" title="IBM">IBM</a>'s Software TPM 2.0 is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 and source code donated by Microsoft. It contains additional files to complete the implementation. The source code is hosted on <a href="/wiki/SourceForge" title="SourceForge">SourceForge</a><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> and <a href="/wiki/GitHub" title="GitHub">GitHub</a><sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup> and licensed under BSD License. </p><p>In 2022, <a href="/wiki/Advanced_Micro_Devices" class="mw-redirect" title="Advanced Micro Devices">AMD</a> announced that under certain circumstances their fTPM implementation causes performance problems. A fix is available in form of a <a href="/wiki/BIOS" title="BIOS">BIOS</a>-Update.<sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="TPM_1.2_versus_TPM_2.0">TPM 1.2 versus TPM 2.0</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=12" title="Edit section: TPM 1.2 versus TPM 2.0"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>While TPM 2.0 addresses many of the same use cases and has similar features, the details are different. TPM 2.0 is not backward compatible with TPM 1.2.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p> <table class="wikitable"> <tbody><tr> <th>Specification</th> <th>TPM 1.2</th> <th>TPM 2.0 </th></tr> <tr> <td>Architecture </td> <td>A complete specification is intended to consist of a platform-specific protection profile which references a common three part TPM 1.2 library.<sup id="cite_ref-TPM_Main_Specs_5-1" class="reference"><a href="#cite_note-TPM_Main_Specs-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> In practice, only a PC Client protection profile was created for TPM 1.2. Protection profiles for <a href="/wiki/Personal_digital_assistant" title="Personal digital assistant">PDA</a> and <a href="/wiki/Mobile_phone" title="Mobile phone">cellular</a> were intended to be defined,<sup id="cite_ref-TPM_Main_Specs_5-2" class="reference"><a href="#cite_note-TPM_Main_Specs-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> but were never published. </td> <td>A complete specification consists of a platform-specific specification which references a common four-part TPM 2.0 library.<sup id="cite_ref-TPM2.0Book_46-0" class="reference"><a href="#cite_note-TPM2.0Book-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-TPM_Library_Specs_7-1" class="reference"><a href="#cite_note-TPM_Library_Specs-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> Platform-specific specifications define what parts of the library are mandatory, optional, or banned for that platform; and detail other requirements for that platform.<sup id="cite_ref-TPM2.0Book_46-1" class="reference"><a href="#cite_note-TPM2.0Book-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> Platform-specific specifications include PC Client,<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> mobile,<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> and Automotive-Thin.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> </td></tr> <tr> <td>Algorithms </td> <td><a href="/wiki/SHA-1" title="SHA-1">SHA-1</a> and <a href="/wiki/RSA_(algorithm)" class="mw-redirect" title="RSA (algorithm)">RSA</a> are required.<sup id="cite_ref-TPM1.2Rev116Part2_50-0" class="reference"><a href="#cite_note-TPM1.2Rev116Part2-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Advanced_Encryption_Standard" title="Advanced Encryption Standard">AES</a> is optional.<sup id="cite_ref-TPM1.2Rev116Part2_50-1" class="reference"><a href="#cite_note-TPM1.2Rev116Part2-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Triple_DES" title="Triple DES">Triple DES</a> was once an optional algorithm in earlier versions of TPM 1.2,<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> but has been removed from TPM 1.2 version 103.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> The MGF1 hash-based mask generation function that is defined in <a href="/wiki/PKCS_1" title="PKCS 1">PKCS#1</a> is required.<sup id="cite_ref-TPM1.2Rev116Part2_50-2" class="reference"><a href="#cite_note-TPM1.2Rev116Part2-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> </td> <td>The PC Client Platform TPM Profile (PTP) Specification requires <a href="/wiki/SHA-1" title="SHA-1">SHA-1</a> and <a href="/wiki/SHA-256" class="mw-redirect" title="SHA-256">SHA-256</a> for hashes; <a href="/wiki/RSA_(algorithm)" class="mw-redirect" title="RSA (algorithm)">RSA</a>, <a href="/wiki/Elliptic_curve_cryptography" class="mw-redirect" title="Elliptic curve cryptography">ECC</a> using the <a href="/wiki/National_Institute_of_Standards_and_Technology" title="National Institute of Standards and Technology">NIST</a> P-256 curve for <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">public-key cryptography</a> and asymmetric <a href="/wiki/Digital_signature" title="Digital signature">digital signature</a> generation and verification; <a href="/wiki/HMAC" title="HMAC">HMAC</a> for symmetric digital signature generation and verification; 128-bit <a href="/wiki/Advanced_Encryption_Standard" title="Advanced Encryption Standard">AES</a> for <a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">symmetric-key algorithm</a>; and the MGF1 hash-based mask generation function that is defined in <a href="/wiki/PKCS_1" title="PKCS 1">PKCS#1</a> are required by the TCG PC Client Platform TPM Profile (PTP) Specification.<sup id="cite_ref-PCClient_53-0" class="reference"><a href="#cite_note-PCClient-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> Many other algorithms are also defined but are optional.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> Note that <a href="/wiki/Triple_DES" title="Triple DES">Triple DES</a> was added into the TPM 2.0 library, but with restrictions to reject <a href="/wiki/Weak_key" title="Weak key">weak keys</a>.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> Also, elliptic cryptography <a href="/wiki/Direct_Anonymous_Attestation" title="Direct Anonymous Attestation">Direct Anonymous Attestation</a> (ECDAA) using Barreto-Naehrig ECC curves which was mandatory in earlier versions has been made optional in the PC Client profile version 1.59.<sup id="cite_ref-PCClient_53-1" class="reference"><a href="#cite_note-PCClient-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </td></tr> <tr> <td>Crypto Primitives </td> <td>A <a href="/wiki/Random_number_generation" title="Random number generation">random number generator</a>, a <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">public-key cryptographic algorithm</a>, a <a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">cryptographic hash function</a>, a mask generation function, <a href="/wiki/Digital_signature" title="Digital signature">digital signature</a> generation and verification, and <a href="/wiki/Direct_Anonymous_Attestation" title="Direct Anonymous Attestation">Direct Anonymous Attestation</a> are required.<sup id="cite_ref-TPM1.2Rev116Part2_50-3" class="reference"><a href="#cite_note-TPM1.2Rev116Part2-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">Symmetric-key algorithms</a> and <a href="/wiki/Exclusive_or" title="Exclusive or">exclusive or</a> are optional.<sup id="cite_ref-TPM1.2Rev116Part2_50-4" class="reference"><a href="#cite_note-TPM1.2Rev116Part2-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Key_generation" title="Key generation">Key generation</a> is also required.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> </td> <td>A <a href="/wiki/Random_number_generation" title="Random number generation">random number generator</a>, <a href="/wiki/Public-key_cryptography" title="Public-key cryptography">public-key cryptographic algorithms</a>, <a href="/wiki/Cryptographic_hash_function" title="Cryptographic hash function">cryptographic hash functions</a>, <a href="/wiki/Symmetric-key_algorithm" title="Symmetric-key algorithm">symmetric-key algorithms</a>, <a href="/wiki/Digital_signature" title="Digital signature">digital signature</a> generation and verification, mask generation functions, and <a href="/wiki/Exclusive_or" title="Exclusive or">exclusive or</a> are required by the TCG PC Client Platform TPM Profile (PTP) Specification.<sup id="cite_ref-PCClient_53-2" class="reference"><a href="#cite_note-PCClient-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Elliptic_curve_cryptography" class="mw-redirect" title="Elliptic curve cryptography">ECC</a>-based <a href="/wiki/Direct_Anonymous_Attestation" title="Direct Anonymous Attestation">Direct Anonymous Attestation</a> using the Barreto–Naehrig 256-bit curve is optional for the TCG PC Client Platform TPM Profile (PTP) Specification.<sup id="cite_ref-PCClient_53-3" class="reference"><a href="#cite_note-PCClient-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> The TPM 2.0 common library specification also requires <a href="/wiki/Key_generation" title="Key generation">key generation</a> and <a href="/wiki/Key_derivation_function" title="Key derivation function">key derivation functions</a>.<sup id="cite_ref-57" class="reference"><a href="#cite_note-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> </td></tr> <tr> <td>Hierarchy </td> <td>One (storage) </td> <td>Three (platform, storage and endorsement) </td></tr> <tr> <td>Root keys </td> <td>One (SRK RSA-2048) </td> <td>Multiple keys and algorithms per hierarchy </td></tr> <tr> <td>Authorization </td> <td><a href="/wiki/Hash-based_message_authentication_code" class="mw-redirect" title="Hash-based message authentication code">HMAC</a>, PCR, locality, physical presence </td> <td>Password, <a href="/wiki/Hash-based_message_authentication_code" class="mw-redirect" title="Hash-based message authentication code">HMAC</a>, and policy (which covers HMAC, PCR, locality, and physical presence). </td></tr> <tr> <td>NVRAM </td> <td>Unstructured data </td> <td>Unstructured data, counter, bitmap, extend, PIN pass and fail </td></tr></tbody></table> <p>The TPM 2.0 policy authorization includes the 1.2 HMAC, locality, physical presence, and PCR. It adds authorization based on an asymmetric digital signature, indirection to another authorization secret, counters and time limits, NVRAM values, a particular command or command parameters, and physical presence. It permits the ANDing and ORing of these authorization primitives to construct complex authorization policies.<sup id="cite_ref-58" class="reference"><a href="#cite_note-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Reception">Reception</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=13" title="Edit section: Reception"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> (TCG) has faced resistance to the deployment of this technology in some areas, where some authors see possible uses not specifically related to <a href="/wiki/Trusted_Computing" title="Trusted Computing">Trusted Computing</a>, which may raise privacy concerns. The concerns include the abuse of remote validation of software decides what software is allowed to run and possible ways to follow actions taken by the user being recorded in a database, in a manner that is completely undetectable to the user.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> </p><p>The <a href="/wiki/TrueCrypt" title="TrueCrypt">TrueCrypt</a> disk encryption utility, as well as its derivative <a href="/wiki/VeraCrypt" title="VeraCrypt">VeraCrypt</a>, do not support TPM. The original TrueCrypt developers were of the opinion that the exclusive purpose of the TPM is "to protect against attacks that require the attacker to have administrator privileges, or physical access to the computer". The attacker who has physical or administrative access to a computer can circumvent TPM, e.g., by installing a hardware <a href="/wiki/Keystroke_logger" class="mw-redirect" title="Keystroke logger">keystroke logger</a>, by resetting TPM, or by capturing memory contents and retrieving TPM-issued keys. The condemning text goes so far as to claim that TPM is entirely redundant.<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> The VeraCrypt publisher has reproduced the original allegation with no changes other than replacing "TrueCrypt" with "VeraCrypt".<sup id="cite_ref-61" class="reference"><a href="#cite_note-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> The author is right that, after achieving either unrestricted physical access or administrative privileges, it is only a matter of time before other security measures in place are bypassed.<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">&#91;</span>62<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup> However, stopping an attacker in possession of administrative privileges has never been one of the goals of TPM (see <a href="#Uses">§&#160;Uses</a> for details), and TPM can <a href="/wiki/Cold_boot_attack" title="Cold boot attack">stop some physical tampering</a>.<sup id="cite_ref-:0_17-1" class="reference"><a href="#cite_note-:0-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-:1_19-1" class="reference"><a href="#cite_note-:1-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-:2_22-1" class="reference"><a href="#cite_note-:2-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-TCPA_23-1" class="reference"><a href="#cite_note-TCPA-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-SetPhysicalPresenceRequest_24-1" class="reference"><a href="#cite_note-SetPhysicalPresenceRequest-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2015 <a href="/wiki/Richard_Stallman" title="Richard Stallman">Richard Stallman</a> suggested to replace the term "Trusted computing" with the term "Treacherous computing" due to the danger that the computer can be made to systematically disobey its owner if the cryptographical keys are kept secret from them. He also considers that TPMs available for PCs in 2015 are not currently<sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Manual_of_Style/Words_to_watch#Relative_time_references" title="Wikipedia:Manual of Style/Words to watch"><span title="Clarify the applicable timeframe so that it is unambiguous when read at a later date. (December 2022)">timeframe?</span></a></i>&#93;</sup> dangerous and that there is no reason <b>not</b> to include one in a computer or support it in software due to failed attempts from the industry to use that technology for <a href="/wiki/Digital_rights_management" title="Digital rights management">DRM</a>, but that the TPM2 released in 2022 is precisely the "<a href="/wiki/Trusted_Computing" title="Trusted Computing">treacherous computing</a>" threat he had warned of.<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">&#91;</span>64<span class="cite-bracket">&#93;</span></a></sup> </p><p>Linux Torvalds in 2023 wrote that there is no way to believe that randomness generated by TPM is any better than randomness generated anyway by the CPU, and there is no point in supporting randomness from a firmware source.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Attacks">Attacks</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=14" title="Edit section: Attacks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2010 <a href="/wiki/Christopher_Tarnovsky" title="Christopher Tarnovsky">Christopher Tarnovsky</a> presented an attack against TPMs at <a href="/wiki/Black_Hat_Briefings" title="Black Hat Briefings">Black Hat Briefings</a>, where he claimed to be able to extract secrets from a single TPM. He was able to do this after 6 months of work by inserting a probe and spying on an <a href="/wiki/Bus_(computing)" title="Bus (computing)">internal bus</a> for the Infineon SLE 66 CL PC.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">&#91;</span>66<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">&#91;</span>67<span class="cite-bracket">&#93;</span></a></sup> </p><p>In case of physical access, computers with TPM 1.2 are vulnerable to <a href="/wiki/Cold_boot_attack" title="Cold boot attack">cold boot attacks</a> as long as the system is on or can be booted without a passphrase from shutdown, <a href="/wiki/Sleep_(computing)" class="mw-redirect" title="Sleep (computing)">sleep</a> or <a href="/wiki/Hibernation_(computing)" title="Hibernation (computing)">hibernation</a>, which is the default setup for Windows computers with BitLocker full disk encryption.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">&#91;</span>68<span class="cite-bracket">&#93;</span></a></sup> A fix was proposed, which has been adopted in the specifications for TPM 2.0. </p><p>In 2009, the concept of shared authorisation data in TPM 1.2 was found to be flawed. An adversary given access to the data could spoof responses from the TPM.<sup id="cite_ref-sharedauth_69-0" class="reference"><a href="#cite_note-sharedauth-69"><span class="cite-bracket">&#91;</span>69<span class="cite-bracket">&#93;</span></a></sup> A fix was proposed, which has been adopted in the specifications for TPM 2.0. </p><p>In 2015 as part of the <a href="/wiki/Global_surveillance_disclosures_(2013%E2%80%93present)" class="mw-redirect" title="Global surveillance disclosures (2013–present)">Snowden revelations</a>, it was revealed that in 2010 a <a href="/wiki/Central_Intelligence_Agency" title="Central Intelligence Agency">US CIA</a> team claimed at an internal conference to have carried out a <a href="/wiki/Power_analysis" title="Power analysis">differential power analysis</a> attack against TPMs that was able to extract secrets.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">&#91;</span>70<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> </p><p>Main <a href="/wiki/Tboot" class="mw-redirect" title="Tboot">Trusted Boot (tboot)</a> distributions before November 2017 are affected by a dynamic root of trust for measurement (DRTM) attack <a href="/wiki/CVE_(identifier)" class="mw-redirect" title="CVE (identifier)">CVE</a>-<style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><a rel="nofollow" class="external text" href="https://nvd.nist.gov/vuln/detail/CVE-2017-16837">2017-16837</a>, which affects computers running on <a href="/wiki/Trusted_Execution_Technology" title="Trusted Execution Technology">Intel's Trusted eXecution Technology (TXT)</a> for the boot-up routine.<sup id="cite_ref-Bleeping_72-0" class="reference"><a href="#cite_note-Bleeping-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2018, a design flaw in the TPM 2.0 specification for the static root of trust for measurement (SRTM) was reported (<a href="/wiki/CVE_(identifier)" class="mw-redirect" title="CVE (identifier)">CVE</a>-<link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a rel="nofollow" class="external text" href="https://nvd.nist.gov/vuln/detail/CVE-2018-6622">2018-6622</a>). It allows an adversary to reset and forge platform configuration registers which are designed to securely hold measurements of software that are used for bootstrapping a computer.<sup id="cite_ref-USENIX27_73-0" class="reference"><a href="#cite_note-USENIX27-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> Fixing it requires hardware-specific firmware patches.<sup id="cite_ref-USENIX27_73-1" class="reference"><a href="#cite_note-USENIX27-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> An attacker abuses power interrupts and TPM state restores to trick TPM into thinking that it is running on non-tampered components.<sup id="cite_ref-Bleeping_72-1" class="reference"><a href="#cite_note-Bleeping-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> </p><p>In 2021, the Dolos Group showed an attack on a discrete TPM, where the TPM chip itself had some tamper resistance, but the other endpoints of its communication bus did not. They read a full-disk-encryption key as it was transmitted across the motherboard, and used it to decrypt the laptop's SSD.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">&#91;</span>74<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="2017_weak_key_generation_controversy">2017 weak key generation controversy</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=15" title="Edit section: 2017 weak key generation controversy"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/ROCA_vulnerability" title="ROCA vulnerability">ROCA vulnerability</a></div> <p>In October 2017, it was reported that a code library developed by <a href="/wiki/Infineon_Technologies" title="Infineon Technologies">Infineon</a>, which had been in widespread use in its TPMs, contained a vulnerability, known as ROCA, which generated weak <a href="/wiki/RSA_(cryptosystem)" title="RSA (cryptosystem)">RSA</a> key pairs that allowed private keys to be inferred from <a href="/wiki/Public_key_cryptography" class="mw-redirect" title="Public key cryptography">public keys</a>. As a result, all systems depending upon the privacy of such weak keys are vulnerable to compromise, such as <a href="/wiki/Identity_theft" title="Identity theft">identity theft</a> or spoofing.<sup id="cite_ref-ars20171016_75-0" class="reference"><a href="#cite_note-ars20171016-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup> </p><p>Cryptosystems that store encryption keys directly in the TPM without <a href="/wiki/Blinding_(cryptography)" title="Blinding (cryptography)">blinding</a> could be at particular risk to these types of attacks, as passwords and other factors would be meaningless if the attacks can extract encryption secrets.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">&#91;</span>76<span class="cite-bracket">&#93;</span></a></sup> </p><p>Infineon has released firmware updates for its TPMs to manufacturers who have used them.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">&#91;</span>77<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Availability">Availability</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=16" title="Edit section: Availability"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Currently, a TPM is provided by nearly all PC and notebook manufacturers in their products. </p> <div class="mw-heading mw-heading3"><h3 id="TPM">TPM</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=17" title="Edit section: TPM"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The TPM is implemented by several vendors: </p> <ul><li><a href="/wiki/Infineon" class="mw-redirect" title="Infineon">Infineon</a> provides both TPM chips and TPM software, which are delivered as <a href="/wiki/Original_equipment_manufacturer" title="Original equipment manufacturer">OEM</a> versions with new computers as well as separately by Infineon for products with TPM technology which comply with TCG standards. For example, Infineon licensed TPM management software to Broadcom Corp. in 2004.<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">&#91;</span>78<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Microchip_Technology" title="Microchip Technology">Microchip</a> (formerly Atmel) manufactured TPM devices that it claims to be compliant to the Trusted Platform Module specification version 1.2 revision 116 and offered with several interfaces (LPC, SPI, and I2C), modes (FIPS 140-2 certified and standard mode), temperature grades (commercial and industrial), and packages (TSSOP and QFN).<sup id="cite_ref-AtmelTPMFrontPage_79-0" class="reference"><a href="#cite_note-AtmelTPMFrontPage-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">&#91;</span>80<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">&#91;</span>81<span class="cite-bracket">&#93;</span></a></sup> Its TPMs support PCs and embedded devices.<sup id="cite_ref-AtmelTPMFrontPage_79-1" class="reference"><a href="#cite_note-AtmelTPMFrontPage-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup> It also provides TPM development kits to support integration of its TPM devices into various embedded designs.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">&#91;</span>82<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Nuvoton" title="Nuvoton">Nuvoton</a> Technology Corporation provides TPM devices for PC applications. Nuvoton also provides TPM devices for embedded systems and Internet of Things (IoT) applications via I2C and SPI host interfaces. Nuvoton's TPM complies with <a href="/wiki/Common_Criteria" title="Common Criteria">Common Criteria</a> (CC) with assurance level EAL 4 augmented with ALC_FLR.1, AVA_VAN.4 and ALC_DVS.2, <a href="/wiki/FIPS_140-2" title="FIPS 140-2">FIPS 140-2</a> level 2 with Physical Security and EMI/EMC level 3 and <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> Compliance requirements, all supported within a single device. TPMs produced by <a href="/wiki/Winbond" title="Winbond">Winbond</a> are now part of Nuvoton.<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/STMicroelectronics" title="STMicroelectronics">STMicroelectronics</a> has provided TPMs for PC platforms and embedded systems since 2005. The product offering <sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup> includes discrete devices with several interfaces supporting <a href="/wiki/Serial_Peripheral_Interface" title="Serial Peripheral Interface">Serial Peripheral Interface</a> (SPI) and <a href="/wiki/I%C2%B2C" title="I²C">I²C</a> and different qualification grades (consumer, industrial and automotive). The TPM products are <a href="/wiki/Common_Criteria" title="Common Criteria">Common Criteria</a> (CC) certified EAL4+ augmented with ALC_FLR.1 and AVA_VAN.5, <a href="/wiki/FIPS_140-2" title="FIPS 140-2">FIPS 140-2</a> level 2 certified with physical security level 3 and also <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a> (TCG) certified.</li></ul> <p>There are also hybrid types; for example, TPM can be integrated into an <a href="/wiki/Ethernet" title="Ethernet">Ethernet</a> controller, thus eliminating the need for a separate motherboard component.<sup id="cite_ref-85" class="reference"><a href="#cite_note-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">&#91;</span>86<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Field_upgrade">Field upgrade</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=18" title="Edit section: Field upgrade"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Field upgrade is the TCG term for updating the TPM firmware. The update can be between TPM 1.2 and TPM 2.0, or between firmware versions. Some vendors limit the number of transitions between 1.2 and 2.0, and some restrict rollback to previous versions.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (September 2021)">citation needed</span></a></i>&#93;</sup> Platform OEMs such as <a href="/wiki/HP_Inc." title="HP Inc.">HP</a><sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">&#91;</span>87<span class="cite-bracket">&#93;</span></a></sup> supply an upgrade tool. </p><p>Since July 28, 2016, all new Microsoft device models, lines, or series (or updating the hardware configuration of an existing model, line, or series with a major update, such as CPU, graphic cards) implement, and enable by default TPM 2.0. </p><p>While TPM 1.2 parts are discrete silicon components, which are typically soldered on the motherboard, TPM 2.0 is available as a discrete (dTPM) silicon component in a single semiconductor package, an integrated component incorporated in one or more semiconductor packages - alongside other logic units in the same package(s), and as a firmware (fTPM) based component running in a trusted execution environment (TEE) on a general purpose System-on-a-chip (SoC).<sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Virtual_TPM">Virtual TPM</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=19" title="Edit section: Virtual TPM"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Google_Compute_Engine" title="Google Compute Engine">Google Compute Engine</a> offers virtualized TPMs (vTPMs) as part of <a href="/wiki/Google_Cloud_Platform" title="Google Cloud Platform">Google Cloud</a>'s Shielded VMs product.<sup id="cite_ref-89" class="reference"><a href="#cite_note-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup></li> <li>The libtpms library provides software emulation of a Trusted Platform Module (TPM 1.2 and TPM 2.0). It targets the integration of TPM functionality into hypervisors, primarily into Qemu.<sup id="cite_ref-90" class="reference"><a href="#cite_note-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Operating_systems">Operating systems</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=20" title="Edit section: Operating systems"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Windows_11" title="Windows 11">Windows 11</a> requires TPM 2.0 support as a minimum system requirement.<sup id="cite_ref-91" class="reference"><a href="#cite_note-91"><span class="cite-bracket">&#91;</span>91<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-92" class="reference"><a href="#cite_note-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup> On many systems TPM is disabled by default which requires changing settings in the computer's UEFI to enable it.<sup id="cite_ref-93" class="reference"><a href="#cite_note-93"><span class="cite-bracket">&#91;</span>93<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Windows_8" title="Windows 8">Windows 8</a> and later have native support for TPM 2.0.</li> <li><a href="/wiki/Windows_7" title="Windows 7">Windows 7</a> can install official patch to add TPM 2.0 support.<sup id="cite_ref-94" class="reference"><a href="#cite_note-94"><span class="cite-bracket">&#91;</span>94<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Windows_Vista" title="Windows Vista">Windows Vista</a> through <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a> have native support for TPM 1.2.</li> <li>The Trusted Platform Module 2.0 (TPM 2.0) has been supported by the <a href="/wiki/Linux_kernel" title="Linux kernel">Linux kernel</a> since version 3.20 (2012)<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">&#91;</span>95<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">&#91;</span>96<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">&#91;</span>97<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Platforms">Platforms</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=21" title="Edit section: Platforms"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Google" title="Google">Google</a> includes TPMs in <a href="/wiki/Chromebook" title="Chromebook">Chromebooks</a> as part of their security model.<sup id="cite_ref-98" class="reference"><a href="#cite_note-98"><span class="cite-bracket">&#91;</span>98<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Oracle_Corporation" title="Oracle Corporation">Oracle</a> ships TPMs in their X- and T-Series Systems such as T3 or T4 series of servers.<sup id="cite_ref-99" class="reference"><a href="#cite_note-99"><span class="cite-bracket">&#91;</span>99<span class="cite-bracket">&#93;</span></a></sup> Support is included in <a href="/wiki/Solaris_(operating_system)" class="mw-redirect" title="Solaris (operating system)">Solaris 11</a>.<sup id="cite_ref-100" class="reference"><a href="#cite_note-100"><span class="cite-bracket">&#91;</span>100<span class="cite-bracket">&#93;</span></a></sup></li> <li>In 2006, with the introduction of first Macintosh models with Intel processors, Apple started to ship Macs with TPM. Apple never provided an official driver, but there was a port under <a href="/wiki/GNU_General_Public_License" title="GNU General Public License">GPL</a> available.<sup id="cite_ref-101" class="reference"><a href="#cite_note-101"><span class="cite-bracket">&#91;</span>101<span class="cite-bracket">&#93;</span></a></sup> Apple has not shipped a computer with TPM since 2006.<sup id="cite_ref-102" class="reference"><a href="#cite_note-102"><span class="cite-bracket">&#91;</span>102<span class="cite-bracket">&#93;</span></a></sup></li> <li>In 2011, Taiwanese manufacturer <a href="/wiki/Micro-Star_International" title="Micro-Star International">MSI</a> launched its Windpad 110W tablet featuring an <a href="/wiki/Advanced_Micro_Devices" class="mw-redirect" title="Advanced Micro Devices">AMD</a> CPU and Infineon Security Platform TPM, which ships with controlling software version 3.7. The chip is disabled by default but can be enabled with the included, pre-installed software.<sup id="cite_ref-103" class="reference"><a href="#cite_note-103"><span class="cite-bracket">&#91;</span>103<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Virtualization">Virtualization</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=22" title="Edit section: Virtualization"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/VMware_ESXi" title="VMware ESXi">VMware ESXi</a> hypervisor has supported TPM since 4.x, and from 5.0 it is enabled by default.<sup id="cite_ref-104" class="reference"><a href="#cite_note-104"><span class="cite-bracket">&#91;</span>104<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-105" class="reference"><a href="#cite_note-105"><span class="cite-bracket">&#91;</span>105<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Xen" title="Xen">Xen</a> hypervisor has support of virtualized TPMs. Each guest gets its own unique, emulated, software TPM.<sup id="cite_ref-106" class="reference"><a href="#cite_note-106"><span class="cite-bracket">&#91;</span>106<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Kernel-based_Virtual_Machine" title="Kernel-based Virtual Machine">KVM</a>, combined with <a href="/wiki/QEMU" title="QEMU">QEMU</a>, has support for virtualized TPMs. As of 2012<sup class="plainlinks noexcerpt noprint asof-tag update" style="display:none;"><a class="external text" href="https://en.wikipedia.org/w/index.php?title=Trusted_Platform_Module&amp;action=edit">&#91;update&#93;</a></sup>, it supports passing through the physical TPM chip to a single dedicated guest. QEMU 2.11 released in December 2017 also provides emulated TPMs to guests.<sup id="cite_ref-107" class="reference"><a href="#cite_note-107"><span class="cite-bracket">&#91;</span>107<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/VirtualBox" title="VirtualBox">VirtualBox</a> has support for virtual TPM 1.2 and 2.0 devices starting with version 7.0 released in October 2022.<sup id="cite_ref-108" class="reference"><a href="#cite_note-108"><span class="cite-bracket">&#91;</span>108<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading3"><h3 id="Software">Software</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=23" title="Edit section: Software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> operating systems <a href="/wiki/Windows_Vista" title="Windows Vista">Windows Vista</a> and later use the chip in conjunction with the included disk encryption component named <a href="/wiki/BitLocker" title="BitLocker">BitLocker</a>. Microsoft had announced that from January 1, 2015, all computers will have to be equipped with a TPM 2.0 module in order to pass <a href="/wiki/Windows_8.1" title="Windows 8.1">Windows 8.1</a> <a href="/wiki/Hardware_certification" title="Hardware certification">hardware certification</a>.<sup id="cite_ref-109" class="reference"><a href="#cite_note-109"><span class="cite-bracket">&#91;</span>109<span class="cite-bracket">&#93;</span></a></sup> However, in a December 2014 review of the Windows Certification Program this was instead made an optional requirement. However, TPM 2.0 is required for <a href="/wiki/InstantGo" title="InstantGo">connected standby</a> systems.<sup id="cite_ref-110" class="reference"><a href="#cite_note-110"><span class="cite-bracket">&#91;</span>110<span class="cite-bracket">&#93;</span></a></sup> Virtual machines running on Hyper-V can have their own virtual TPM module starting with Windows 10 1511 and Windows Server 2016.<sup id="cite_ref-111" class="reference"><a href="#cite_note-111"><span class="cite-bracket">&#91;</span>111<span class="cite-bracket">&#93;</span></a></sup> Microsoft Windows includes two TPM related <a href="/wiki/Command_(computing)" title="Command (computing)">commands</a>: <style data-mw-deduplicate="TemplateStyles:r886049734">.mw-parser-output .monospaced{font-family:monospace,monospace}</style><span class="monospaced">tpmtool</span>, a utility that can be used to retrieve information about the TPM, and <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r886049734"><span class="monospaced">tpmvscmgr</span>, a <a href="/wiki/Command-line_interface" title="Command-line interface">command-line</a> tool that allows creating and deleting TPM virtual <a href="/wiki/Smart_card" title="Smart card">smart cards</a> on a computer.<sup id="cite_ref-112" class="reference"><a href="#cite_note-112"><span class="cite-bracket">&#91;</span>112<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-113" class="reference"><a href="#cite_note-113"><span class="cite-bracket">&#91;</span>113<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Endorsement_keys">Endorsement keys</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=24" title="Edit section: Endorsement keys"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>TPM endorsement keys (EKs) are asymmetric key pairs unique to each TPM. They use the <a href="/wiki/RSA_(cryptosystem)" title="RSA (cryptosystem)">RSA</a> and <a href="/wiki/Elliptic-curve_cryptography" title="Elliptic-curve cryptography">ECC</a> algorithms. The TPM manufacturer usually provisions endorsement key certificates in TPM <a href="/wiki/Non-volatile_memory" title="Non-volatile memory">non-volatile memory</a>. The certificates assert that the TPM is authentic. Starting with TPM 2.0, the certificates are in <a href="/wiki/X.509" title="X.509">X.509</a> <a href="/wiki/Distinguished_Encoding_Rules" class="mw-redirect" title="Distinguished Encoding Rules">DER</a> format. </p><p>These manufacturers typically provide their <a href="/wiki/Certificate_Authority" class="mw-redirect" title="Certificate Authority">certificate authority</a> root (and sometimes intermediate) certificates on their web sites. </p> <ul><li><a href="/wiki/AMD" title="AMD">AMD</a><sup id="cite_ref-114" class="reference"><a href="#cite_note-114"><span class="cite-bracket">&#91;</span>114<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-115" class="reference"><a href="#cite_note-115"><span class="cite-bracket">&#91;</span>115<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-116" class="reference"><a href="#cite_note-116"><span class="cite-bracket">&#91;</span>116<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-117" class="reference"><a href="#cite_note-117"><span class="cite-bracket">&#91;</span>117<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Infineon" class="mw-redirect" title="Infineon">Infineon</a><sup id="cite_ref-118" class="reference"><a href="#cite_note-118"><span class="cite-bracket">&#91;</span>118<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Intel" title="Intel">Intel</a><sup id="cite_ref-119" class="reference"><a href="#cite_note-119"><span class="cite-bracket">&#91;</span>119<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-120" class="reference"><a href="#cite_note-120"><span class="cite-bracket">&#91;</span>120<span class="cite-bracket">&#93;</span></a></sup></li> <li>NationZ<sup id="cite_ref-121" class="reference"><a href="#cite_note-121"><span class="cite-bracket">&#91;</span>121<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-122" class="reference"><a href="#cite_note-122"><span class="cite-bracket">&#91;</span>122<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-123" class="reference"><a href="#cite_note-123"><span class="cite-bracket">&#91;</span>123<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-124" class="reference"><a href="#cite_note-124"><span class="cite-bracket">&#91;</span>124<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/Nuvoton" title="Nuvoton">Nuvoton</a><sup id="cite_ref-125" class="reference"><a href="#cite_note-125"><span class="cite-bracket">&#91;</span>125<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-126" class="reference"><a href="#cite_note-126"><span class="cite-bracket">&#91;</span>126<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-127" class="reference"><a href="#cite_note-127"><span class="cite-bracket">&#91;</span>127<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-128" class="reference"><a href="#cite_note-128"><span class="cite-bracket">&#91;</span>128<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-129" class="reference"><a href="#cite_note-129"><span class="cite-bracket">&#91;</span>129<span class="cite-bracket">&#93;</span></a></sup></li> <li><a href="/wiki/STMicroelectronics" title="STMicroelectronics">ST Micro</a><sup id="cite_ref-130" class="reference"><a href="#cite_note-130"><span class="cite-bracket">&#91;</span>130<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-131" class="reference"><a href="#cite_note-131"><span class="cite-bracket">&#91;</span>131<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-132" class="reference"><a href="#cite_note-132"><span class="cite-bracket">&#91;</span>132<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-133" class="reference"><a href="#cite_note-133"><span class="cite-bracket">&#91;</span>133<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-134" class="reference"><a href="#cite_note-134"><span class="cite-bracket">&#91;</span>134<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-135" class="reference"><a href="#cite_note-135"><span class="cite-bracket">&#91;</span>135<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-136" class="reference"><a href="#cite_note-136"><span class="cite-bracket">&#91;</span>136<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-137" class="reference"><a href="#cite_note-137"><span class="cite-bracket">&#91;</span>137<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-138" class="reference"><a href="#cite_note-138"><span class="cite-bracket">&#91;</span>138<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-139" class="reference"><a href="#cite_note-139"><span class="cite-bracket">&#91;</span>139<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="TPM_software_libraries">TPM software libraries</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=25" title="Edit section: TPM software libraries"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>To utilize a TPM, the user needs a software library that communicates with the TPM and provides a friendlier API than the raw TPM communication. Currently, there are several such open-source TPM 2.0 libraries. Some of them also support TPM 1.2, but mostly TPM 1.2 chips are now deprecated and modern development is focused on TPM 2.0. </p><p>Typically, a TPM library provides an API with one-to-one mappings to TPM commands. The TCG specification calls this layer the System API(SAPI). This way the user has more control over the TPM operations, however the complexity is high. To hide some of the complexity most libraries also offer simpler ways to invoke complex TPM operations. The TCG specification call these two layers Enhanced System API(ESAPI) and Feature API(FAPI). </p><p>There is currently only one stack that follows the TCG specification. All the other available open-source TPM libraries use their own form of richer API. </p> <table class="wikitable"> <caption>Summary of the existing open-source TPM libraries </caption> <tbody><tr> <th>TPM Libraries </th> <th>API </th> <th>TPM 2.0 </th> <th>TPM 1.2 </th> <th>Attestation server or example </th> <th>Microsoft<br />Windows </th> <th>Linux </th> <th>Bare metal </th></tr> <tr> <td>tpm2-tss<sup id="cite_ref-140" class="reference"><a href="#cite_note-140"><span class="cite-bracket">&#91;</span>140<span class="cite-bracket">&#93;</span></a></sup> </td> <td>SAPI, ESAPI and FAPI<br />from the TCG specification </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No, but there is a separate project<sup id="cite_ref-142" class="reference"><a href="#cite_note-142"><span class="cite-bracket">&#91;</span>a<span class="cite-bracket">&#93;</span></a></sup> </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td>Maybe<sup id="cite_ref-144" class="reference"><a href="#cite_note-144"><span class="cite-bracket">&#91;</span>b<span class="cite-bracket">&#93;</span></a></sup> </td></tr> <tr> <td>ibmtss<sup id="cite_ref-145" class="reference"><a href="#cite_note-145"><span class="cite-bracket">&#91;</span>143<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-146" class="reference"><a href="#cite_note-146"><span class="cite-bracket">&#91;</span>144<span class="cite-bracket">&#93;</span></a></sup> </td> <td>1:1 mapping to TPM commands<br />+ rich API (mild layer on top) </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFB; color:black;vertical-align:middle;text-align:center;" class="table-partial">Partial </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes, "IBM ACS"<sup id="cite_ref-147" class="reference"><a href="#cite_note-147"><span class="cite-bracket">&#91;</span>145<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-148" class="reference"><a href="#cite_note-148"><span class="cite-bracket">&#91;</span>146<span class="cite-bracket">&#93;</span></a></sup> </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td></tr> <tr> <td>go-tpm<sup id="cite_ref-149" class="reference"><a href="#cite_note-149"><span class="cite-bracket">&#91;</span>147<span class="cite-bracket">&#93;</span></a></sup> </td> <td>1:1 mapping to TPM commands<br />+ rich API (mild layer on top) </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFB; color:black;vertical-align:middle;text-align:center;" class="table-partial">Partial </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes, "Go-attestation"<sup id="cite_ref-150" class="reference"><a href="#cite_note-150"><span class="cite-bracket">&#91;</span>148<span class="cite-bracket">&#93;</span></a></sup> </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td></tr> <tr> <td>wolfTPM<sup id="cite_ref-151" class="reference"><a href="#cite_note-151"><span class="cite-bracket">&#91;</span>149<span class="cite-bracket">&#93;</span></a></sup> </td> <td>1:1 mapping to TPM commands<br />+ rich API (wrappers) </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes, examples are inside the library </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td></tr> <tr> <td>TSS.MSR<sup id="cite_ref-152" class="reference"><a href="#cite_note-152"><span class="cite-bracket">&#91;</span>150<span class="cite-bracket">&#93;</span></a></sup> </td> <td>1:1 mapping to TPM commands<br />+ rich API (wrappers) </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes, examples are inside the library </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes </td> <td style="background:#9EFF9E;color:black;vertical-align:middle;text-align:center;" class="table-yes">Yes<sup id="cite_ref-153" class="reference"><a href="#cite_note-153"><span class="cite-bracket">&#91;</span>c<span class="cite-bracket">&#93;</span></a></sup> </td> <td style="background:#FFC7C7;color:black;vertical-align:middle;text-align:center;" class="table-no">No </td></tr></tbody></table> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-lower-alpha"> <div class="mw-references-wrap"><ol class="references"> <li id="cite_note-142"><span class="mw-cite-backlink"><b><a href="#cite_ref-142">^</a></b></span> <span class="reference-text">There is a separate project called "CHARRA" by Fraunhofer<sup id="cite_ref-" class="reference"><a href="#cite_note-"><span class="cite-bracket">&#91;</span>141<span class="cite-bracket">&#93;</span></a></sup> that uses the tpm2-tss library for Remote Attestation. The other stacks have accompanying attestation servers or directly include examples for attestation. IBM offer their open-source Remote Attestation Server called "IBM ACS" on SourceForge and Google have "Go-Attestation" available on GitHub, while "wolfTPM" offers time and local attestation examples directly in its open-source code, also on GitHub.</span> </li> <li id="cite_note-144"><span class="mw-cite-backlink"><b><a href="#cite_ref-144">^</a></b></span> <span class="reference-text">There is an application note<sup id="cite_ref-" class="reference"><a href="#cite_note-"><span class="cite-bracket">&#91;</span>142<span class="cite-bracket">&#93;</span></a></sup> about an example project for the AURIX 32-bit SoC using the tpm2-tss library.</span> </li> <li id="cite_note-153"><span class="mw-cite-backlink"><b><a href="#cite_ref-153">^</a></b></span> <span class="reference-text">Requires additional libraries (dotnet) to run on Linux.</span> </li> </ol></div></div> <p>These TPM libraries are sometimes also called TPM stacks, because they provide the interface for the developer or user to interact with the TPM. As seen from the table, the TPM stacks abstract the operating system and transport layer, so the user could migrate one application between platforms. For example, by using TPM stack API the user would interact the same way with a TPM, regardless if the physical chip is connected over SPI, I2C or LPC interface to the Host system. </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=26" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <ul><li><a href="/wiki/AMD_Platform_Security_Processor" title="AMD Platform Security Processor">AMD Platform Security Processor</a></li> <li><a href="/wiki/ARM_TrustZone" class="mw-redirect" title="ARM TrustZone">ARM TrustZone</a></li> <li><a href="/wiki/Crypto-shredding" title="Crypto-shredding">Crypto-shredding</a></li> <li><a href="/wiki/Hardware_security" title="Hardware security">Hardware security</a></li> <li><a href="/wiki/Hardware_security_module" title="Hardware security module">Hardware security module</a></li> <li><a href="/wiki/Hengzhi_chip" title="Hengzhi chip">Hengzhi chip</a></li> <li><a href="/wiki/Intel_Management_Engine" title="Intel Management Engine">Intel Management Engine</a></li> <li><a href="/wiki/Microsoft_Pluton" class="mw-redirect" title="Microsoft Pluton">Microsoft Pluton</a></li> <li><a href="/wiki/Next-Generation_Secure_Computing_Base" title="Next-Generation Secure Computing Base">Next-Generation Secure Computing Base</a></li> <li><a href="/wiki/Secure_Enclave" class="mw-redirect" title="Secure Enclave">Secure Enclave</a></li> <li><a href="/wiki/Threat_model" title="Threat model">Threat model</a></li></ul> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Trusted_Platform_Module&amp;action=edit&amp;section=27" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239543626"><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWarren2021" class="citation web cs1">Warren, Tom (2021-06-25). <a rel="nofollow" class="external text" href="https://www.theverge.com/2021/6/25/22550376/microsoft-windows-11-tpm-chips-requirement-security">"Why Windows 11 is forcing everyone to use TPM chips"</a>. The Verge<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-11-13</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Why+Windows+11+is+forcing+everyone+to+use+TPM+chips&amp;rft.pub=The+Verge&amp;rft.date=2021-06-25&amp;rft.aulast=Warren&amp;rft.aufirst=Tom&amp;rft_id=https%3A%2F%2Fwww.theverge.com%2F2021%2F6%2F25%2F22550376%2Fmicrosoft-windows-11-tpm-chips-requirement-security&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSen2023" class="citation web cs1">Sen, Sayan (2023-08-03). <a rel="nofollow" class="external text" href="https://www.neowin.net/news/linus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling/">"Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling"</a>. <i>Neowin</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2024-10-23</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Neowin&amp;rft.atitle=Linus+Torvalds+seems+frustrated+with+AMD+Ryzen+fTPM+bugs+and+issues%2C+suggests+disabling&amp;rft.date=2023-08-03&amp;rft.aulast=Sen&amp;rft.aufirst=Sayan&amp;rft_id=https%3A%2F%2Fwww.neowin.net%2Fnews%2Flinus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.iso.org/iso/catalogue_detail.htm?csnumber=50970">"ISO/IEC 11889-1:2009 – Information technology – Trusted Platform Module – Part 1: Overview"</a>. <i>ISO.org</i>. <a href="/wiki/International_Organization_for_Standardization" title="International Organization for Standardization">International Organization for Standardization</a>. May 2009. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170128033043/http://www.iso.org/iso/catalogue_detail.htm?csnumber=50970">Archived</a> from the original on January 28, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">November 30,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ISO.org&amp;rft.atitle=ISO%2FIEC+11889-1%3A2009+%E2%80%93+Information+technology+%E2%80%93+Trusted+Platform+Module+%E2%80%93+Part+1%3A+Overview&amp;rft.date=2009-05&amp;rft_id=http%3A%2F%2Fwww.iso.org%2Fiso%2Fcatalogue_detail.htm%3Fcsnumber%3D50970&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/resource/tpm-main-specification/">"TPM 1.2 Main Specification"</a>. <i>Trusted Computing Group</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-11-08</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Trusted+Computing+Group&amp;rft.atitle=TPM+1.2+Main+Specification&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fresource%2Ftpm-main-specification%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPM_Main_Specs-5"><span class="mw-cite-backlink">^ <a href="#cite_ref-TPM_Main_Specs_5-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TPM_Main_Specs_5-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-TPM_Main_Specs_5-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/tpm-main-specification/">"Trusted Platform Module (TPM) Specifications"</a>. <a href="/wiki/Trusted_Computing_Group" title="Trusted Computing Group">Trusted Computing Group</a>. March 1, 2011. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171022063836/https://trustedcomputinggroup.org/tpm-main-specification/">Archived</a> from the original on October 22, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+Platform+Module+%28TPM%29+Specifications&amp;rft.pub=Trusted+Computing+Group&amp;rft.date=2011-03-01&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Ftpm-main-specification%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/trusted-computing-group-releases-tpm-2-0-specification-improved-platform-device-security/">"Trusted Computing Group Releases TPM 2.0 Specification for Improved Platform and Device Security"</a>. Trusted Computing Group. 2014-04-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-11-08</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+Computing+Group+Releases+TPM+2.0+Specification+for+Improved+Platform+and+Device+Security&amp;rft.pub=Trusted+Computing+Group&amp;rft.date=2014-04-01&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Ftrusted-computing-group-releases-tpm-2-0-specification-improved-platform-device-security%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPM_Library_Specs-7"><span class="mw-cite-backlink">^ <a href="#cite_ref-TPM_Library_Specs_7-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TPM_Library_Specs_7-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/tpm-library-specification/">"TPM Library Specification 2.0"</a>. Trusted Computing Group. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161029235918/https://www.trustedcomputinggroup.org/tpm-library-specification/">Archived</a> from the original on 29 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Library+Specification+2.0&amp;rft.pub=Trusted+Computing+Group&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Ftpm-library-specification%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlin_SuciuTudor_Carean2010" class="citation arxiv cs1">Alin Suciu; Tudor Carean (2010). "Benchmarking the True Random Number Generator of TPM Chips". <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1008.2223">1008.2223</a></span> [<a rel="nofollow" class="external text" href="https://arxiv.org/archive/cs.CR">cs.CR</a>].</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=preprint&amp;rft.jtitle=arXiv&amp;rft.atitle=Benchmarking+the+True+Random+Number+Generator+of+TPM+Chips&amp;rft.date=2010&amp;rft_id=info%3Aarxiv%2F1008.2223&amp;rft.au=Alin+Suciu&amp;rft.au=Tudor+Carean&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2 cs1-prop-long-vol"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf"><i>TPM Main Specification Level 2</i></a> <span class="cs1-format">(PDF)</span>, vol.&#160;Part 1 Design Principles (Version 1.2, Revision 116&#160;ed.), <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210224215928/https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf">archived</a> <span class="cs1-format">(PDF)</span> from the original on 24 February 2021<span class="reference-accessdate">, retrieved <span class="nowrap">12 September</span> 2017</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=TPM+Main+Specification+Level+2&amp;rft.edition=Version+1.2%2C+Revision+116&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/previous-versions/aspnet/f5cs0acs(v=vs.100)">"Understanding Machine-Level and User-Level RSA Key Containers"</a>. October 22, 2014.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Understanding+Machine-Level+and+User-Level+RSA+Key+Containers&amp;rft.date=2014-10-22&amp;rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fprevious-versions%2Faspnet%2Ff5cs0acs%28v%3Dvs.100%29&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://linux.die.net/man/3/tspi_data_bind">"tspi_data_bind(3) – Encrypts data blob"</a> <span class="cs1-format">(Posix manual page)</span>. Trusted Computing Group. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131129101856/http://linux.die.net/man/3/tspi_data_bind">Archived</a> from the original on November 29, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">October 27,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=tspi_data_bind%283%29+%E2%80%93+Encrypts+data+blob&amp;rft.pub=Trusted+Computing+Group&amp;rft_id=http%3A%2F%2Flinux.die.net%2Fman%2F3%2Ftspi_data_bind&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2 cs1-prop-long-vol"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf"><i>Trusted Platform Module Library Specification, Family "2.0"</i></a> <span class="cs1-format">(PDF)</span>, vol.&#160;Part 1 – Architecture, Section 12, TPM Operational States (Level 00, Revision 01.59&#160;ed.), Trusted Computing Group, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210109164407/https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">archived</a> <span class="cs1-format">(PDF)</span> from the original on January 9, 2021<span class="reference-accessdate">, retrieved <span class="nowrap">January 17,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Trusted+Platform+Module+Library+Specification%2C+Family+%222.0%22&amp;rft.edition=Level+00%2C+Revision+01.59&amp;rft.pub=Trusted+Computing+Group&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTCG_TPM2_r1p59_Part1_Architecture_pub.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2 cs1-prop-long-vol"><a rel="nofollow" class="external text" href="http://www.trustedcomputinggroup.org/files/static_page_files/72C33D71-1A4B-B294-D02C7DF86630BE7C/TPM%20Main-Part%203%20Commands_v1.2_rev116_01032011.pdf"><i>TPM Main Specification Level 2</i></a> <span class="cs1-format">(PDF)</span>, vol.&#160;Part 3 – Commands (Version 1.2, Revision 116&#160;ed.), Trusted Computing Group, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110928031628/http://www.trustedcomputinggroup.org/files/static_page_files/72C33D71-1A4B-B294-D02C7DF86630BE7C/TPM%20Main-Part%203%20Commands_v1.2_rev116_01032011.pdf">archived</a> <span class="cs1-format">(PDF)</span> from the original on September 28, 2011<span class="reference-accessdate">, retrieved <span class="nowrap">June 22,</span> 2011</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=TPM+Main+Specification+Level+2&amp;rft.edition=Version+1.2%2C+Revision+116&amp;rft.pub=Trusted+Computing+Group&amp;rft_id=http%3A%2F%2Fwww.trustedcomputinggroup.org%2Ffiles%2Fstatic_page_files%2F72C33D71-1A4B-B294-D02C7DF86630BE7C%2FTPM%2520Main-Part%25203%2520Commands_v1.2_rev116_01032011.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc749022(v=ws.10)?redirectedfrom=MSDN"><i>Microsoft Article on TPM</i></a>, July 25, 2008, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210102105127/https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-vista/cc749022(v=ws.10)?redirectedfrom=MSDN">archived</a> from the original on January 2, 2021<span class="reference-accessdate">, retrieved <span class="nowrap">April 1,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Microsoft+Article+on+TPM&amp;rft.date=2008-07-25&amp;rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fprevious-versions%2Fwindows%2Fit-pro%2Fwindows-vista%2Fcc749022%28v%3Dws.10%29%3Fredirectedfrom%3DMSDN&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160803203400/http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;aid=1">"TPM – Trusted Platform Module"</a>. <a href="/wiki/IBM" title="IBM">IBM</a>. Archived from <a rel="nofollow" class="external text" href="http://www-01.ibm.com/support/docview.wss?uid=pos1R1003970&amp;aid=1">the original</a> on August 3, 2016.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+%E2%80%93+Trusted+Platform+Module&amp;rft.pub=IBM&amp;rft_id=http%3A%2F%2Fwww-01.ibm.com%2Fsupport%2Fdocview.wss%3Fuid%3Dpos1R1003970%26aid%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.slashgear.com/windows-11-tpm-2-0-requirement-has-a-special-exception-27680130/">"Windows 11 TPM 2.0 requirement has a special exception"</a>. <i>SlashGear</i>. 2021-06-28. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210628033548/https://www.slashgear.com/windows-11-tpm-2-0-requirement-has-a-special-exception-27680130/">Archived</a> from the original on June 28, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-06-29</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SlashGear&amp;rft.atitle=Windows+11+TPM+2.0+requirement+has+a+special+exception&amp;rft.date=2021-06-28&amp;rft_id=https%3A%2F%2Fwww.slashgear.com%2Fwindows-11-tpm-2-0-requirement-has-a-special-exception-27680130%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-:0-17"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_17-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_17-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/shpedoikal/tpm-luks">"LUKS support for storing keys in TPM NVRAM"</a>. <i>github.com</i>. 2013. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130916075234/https://github.com/shpedoikal/tpm-luks">Archived</a> from the original on September 16, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">December 19,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=github.com&amp;rft.atitle=LUKS+support+for+storing+keys+in+TPM+NVRAM&amp;rft.date=2013&amp;rft_id=https%3A%2F%2Fgithub.com%2Fshpedoikal%2Ftpm-luks&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dell.com/support/kbdoc/en-uk/000137758/microsoft-office-outlook-exchange-error-80090016-after-a-system-board-replacement">"Microsoft Office Outlook Exchange Error 80090016 After a System Board Replacement"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210628200144/https://www.dell.com/support/kbdoc/en-uk/000137758/microsoft-office-outlook-exchange-error-80090016-after-a-system-board-replacement">Archived</a> from the original on June 28, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">December 23,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Microsoft+Office+Outlook+Exchange+Error+80090016+After+a+System+Board+Replacement&amp;rft_id=https%3A%2F%2Fwww.dell.com%2Fsupport%2Fkbdoc%2Fen-uk%2F000137758%2Fmicrosoft-office-outlook-exchange-error-80090016-after-a-system-board-replacement&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-:1-19"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_19-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_19-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGreene2012" class="citation web cs1">Greene, James (2012). <a rel="nofollow" class="external text" href="http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf">"Intel Trusted Execution Technology"</a> <span class="cs1-format">(PDF)</span> (white paper). Intel. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140611161421/http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/trusted-execution-technology-security-paper.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on June 11, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">December 18,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Trusted+Execution+Technology&amp;rft.pub=Intel&amp;rft.date=2012&amp;rft.aulast=Greene&amp;rft.aufirst=James&amp;rft_id=http%3A%2F%2Fwww.intel.com%2Fcontent%2Fdam%2Fwww%2Fpublic%2Fus%2Fen%2Fdocuments%2Fwhite-papers%2Ftrusted-execution-technology-security-paper.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.techsectora.com/2021/02/tpm-header-what-is-it-and-why-is-it-used.html?m=1">"TPM Encryption"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210628045716/https://www.techsectora.com/2021/02/tpm-header-what-is-it-and-why-is-it-used.html?m=1">Archived</a> from the original on June 28, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">March 29,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Encryption&amp;rft_id=https%3A%2F%2Fwww.techsectora.com%2F2021%2F02%2Ftpm-header-what-is-it-and-why-is-it-used.html%3Fm%3D1&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started#step-3-enroll-for-the-certificate-on-the-tpm-virtual-smart-card">"Get Started with Virtual Smart Cards: Walkthrough Guide"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210324164541/https://docs.microsoft.com/en-us/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-get-started#step-3-enroll-for-the-certificate-on-the-tpm-virtual-smart-card">Archived</a> from the original on March 24, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">December 23,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Get+Started+with+Virtual+Smart+Cards%3A+Walkthrough+Guide&amp;rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fidentity-protection%2Fvirtual-smart-cards%2Fvirtual-smart-card-get-started%23step-3-enroll-for-the-certificate-on-the-tpm-virtual-smart-card&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-:2-22"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_22-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_22-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>Autonomic and Trusted Computing: 4th International Conference</i>. ATC. 2007. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9783540735465" title="Special:BookSources/9783540735465"><bdi>9783540735465</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Autonomic+and+Trusted+Computing%3A+4th+International+Conference&amp;rft.pub=ATC&amp;rft.date=2007&amp;rft.isbn=9783540735465&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TCPA-23"><span class="mw-cite-backlink">^ <a href="#cite_ref-TCPA_23-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TCPA_23-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPearsonBalacheff2002" class="citation book cs1">Pearson, Siani; Balacheff, Boris (2002). <i>Trusted computing platforms: TCPA technology in context</i>. Prentice Hall. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9780130092205" title="Special:BookSources/9780130092205"><bdi>9780130092205</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Trusted+computing+platforms%3A+TCPA+technology+in+context&amp;rft.pub=Prentice+Hall&amp;rft.date=2002&amp;rft.isbn=9780130092205&amp;rft.aulast=Pearson&amp;rft.aufirst=Siani&amp;rft.au=Balacheff%2C+Boris&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-SetPhysicalPresenceRequest-24"><span class="mw-cite-backlink">^ <a href="#cite_ref-SetPhysicalPresenceRequest_24-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-SetPhysicalPresenceRequest_24-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx">"SetPhysicalPresenceRequest Method of the Win32_Tpm Class"</a>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20090519204808/http://msdn.microsoft.com/en-us/library/aa376478(VS.85).aspx">Archived</a> from the original on May 19, 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">June 12,</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=SetPhysicalPresenceRequest+Method+of+the+Win32_Tpm+Class&amp;rft.pub=Microsoft&amp;rft_id=http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Faa376478%28VS.85%29.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation book cs1"><i>Instruction 8500.01</i>. US Department of Defense. 14 March 2014. p.&#160;43.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Instruction+8500.01&amp;rft.pages=43&amp;rft.pub=US+Department+of+Defense&amp;rft.date=2014-03-14&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/membership/certification/tpm-certified-products/">"TPM Certified Products List"</a>. Trusted Computing Group. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161014153730/http://www.trustedcomputinggroup.org/membership/certification/tpm-certified-products/">Archived</a> from the original on October 14, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 1,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Certified+Products+List&amp;rft.pub=Trusted+Computing+Group&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fmembership%2Fcertification%2Ftpm-certified-products%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/wp-content/uploads/Vendor_ID_Registry_0-8_clean.pdf">"TCG Vendor ID Registry"</a> <span class="cs1-format">(PDF)</span>. 23 September 2015. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161028083456/https://www.trustedcomputinggroup.org/wp-content/uploads/Vendor_ID_Registry_0-8_clean.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 28 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TCG+Vendor+ID+Registry&amp;rft.date=2015-09-23&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fwp-content%2Fuploads%2FVendor_ID_Registry_0-8_clean.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPMRecs-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-TPMRecs_28-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLichBrowersHallMcIlhargey2017" class="citation web cs1">Lich, Brian; Browers, Nick; Hall, Justin; McIlhargey, Bill; Farag, Hany (27 October 2017). <a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows/device-security/tpm/tpm-recommendations">"TPM Recommendations"</a>. <i>Microsoft Docs</i>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180111052704/https://docs.microsoft.com/en-us/windows/device-security/tpm/tpm-recommendations">Archived</a> from the original on 11 January 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">10 January</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Microsoft+Docs&amp;rft.atitle=TPM+Recommendations&amp;rft.date=2017-10-27&amp;rft.aulast=Lich&amp;rft.aufirst=Brian&amp;rft.au=Browers%2C+Nick&amp;rft.au=Hall%2C+Justin&amp;rft.au=McIlhargey%2C+Bill&amp;rft.au=Farag%2C+Hany&amp;rft_id=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fdevice-security%2Ftpm%2Ftpm-recommendations&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPMBrief-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-TPMBrief_29-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-A-Brief-Introduction.pdf">"Trusted Platform Module 2.0: A Brief Introduction"</a> <span class="cs1-format">(PDF)</span>. Trusted Computing Group. October 13, 2016. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190203202259/https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-A-Brief-Introduction.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on February 3, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">March 31,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+Platform+Module+2.0%3A+A+Brief+Introduction&amp;rft.pub=Trusted+Computing+Group&amp;rft.date=2016-10-13&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-2.0-A-Brief-Introduction.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/membership/certification/tpm-certified-products">"TPM Certified Products"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Certified+Products&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fmembership%2Fcertification%2Ftpm-certified-products&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-A-Brief-Introduction.pdf">"Trusted Platform Module (TPM) - 2.0: A BRIEF INTRODUCTION"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-08-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+Platform+Module+%28TPM%29+-+2.0%3A+A+BRIEF+INTRODUCTION&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-2.0-A-Brief-Introduction.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://cloud.google.com/security/shielded-cloud/shielded-vm#vtpm">GCE Shielded VM - Virtual Trusted Platform Module (vTPM)</a></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/Microsoft/ms-tpm-20-ref">"GitHub - microsoft/ms-tpm-20-ref: Reference implementation of the TCG Trusted Platform Module 2.0 specification"</a>. GitHub. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201027190036/https://github.com/microsoft/ms-tpm-20-ref">Archived</a> from the original on October 27, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=GitHub+-+microsoft%2Fms-tpm-20-ref%3A+Reference+implementation+of+the+TCG+Trusted+Platform+Module+2.0+specification.&amp;rft.pub=GitHub&amp;rft_id=https%3A%2F%2Fgithub.com%2FMicrosoft%2Fms-tpm-20-ref&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Intel-New-Open-Source-TPM2">"Intel Open-Sources New TPM2 Software Stack - Phoronix"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200810025300/https://www.phoronix.com/scan.php?page=news_item&amp;px=Intel-New-Open-Source-TPM2">Archived</a> from the original on August 10, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intel+Open-Sources+New+TPM2+Software+Stack+-+Phoronix&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DIntel-New-Open-Source-TPM2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/tpm2-software">"Linux TPM2 &amp; TSS2 Software"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200709134944/https://github.com/tpm2-software">Archived</a> from the original on July 9, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=Linux+TPM2+%26+TSS2+Software&amp;rft_id=https%3A%2F%2Fgithub.com%2Ftpm2-software&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://software.intel.com/en-us/blogs/2018/08/29/tpm2-software-stack-open-source">"The TPM2 Software Stack: Introducing a Major Open Source Release Intel Software"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200409075120/https://software.intel.com/en-us/blogs/2018/08/29/tpm2-software-stack-open-source">Archived</a> from the original on April 9, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+TPM2+Software+Stack%3A+Introducing+a+Major+Open+Source+Release+Intel+Software&amp;rft_id=https%3A%2F%2Fsoftware.intel.com%2Fen-us%2Fblogs%2F2018%2F08%2F29%2Ftpm2-software-stack-open-source&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.eenewsembedded.com/news/open-source-tpm-20-software-stack-eases-security-adoption">"Open source TPM 2.0 software stack eases security adoption"</a>. August 17, 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190618182510/https://www.eenewsembedded.com/news/open-source-tpm-20-software-stack-eases-security-adoption">Archived</a> from the original on June 18, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Open+source+TPM+2.0+software+stack+eases+security+adoption&amp;rft.date=2018-08-17&amp;rft_id=https%3A%2F%2Fwww.eenewsembedded.com%2Fnews%2Fopen-source-tpm-20-software-stack-eases-security-adoption&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bisinfotech.com/infineon-enables-open-source-software-stack-for-tpm-2-0/">"Infineon Enables Open Source Software Stack for TPM 2.0"</a>. August 17, 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210203092444/https://www.bisinfotech.com/infineon-enables-open-source-software-stack-for-tpm-2-0/">Archived</a> from the original on February 3, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Infineon+Enables+Open+Source+Software+Stack+for+TPM+2.0&amp;rft.date=2018-08-17&amp;rft_id=https%3A%2F%2Fwww.bisinfotech.com%2Finfineon-enables-open-source-software-stack-for-tpm-2-0%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sourceforge.net/projects/ibmswtpm2/">"IBM's Software TPM 2.0 download | SourceForge.net"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190612221519/https://sourceforge.net/projects/ibmswtpm2/">Archived</a> from the original on June 12, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=IBM%27s+Software+TPM+2.0+download+%7C+SourceForge.net&amp;rft_id=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fibmswtpm2%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/kgoldman/ibmswtpm2/">"IBM SW TPM 2.0"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200918030405/https://github.com/kgoldman/ibmswtpm2">Archived</a> from the original on September 18, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">June 2,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=IBM+SW+TPM+2.0&amp;rft_id=https%3A%2F%2Fgithub.com%2Fkgoldman%2Fibmswtpm2%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.amd.com/en/support/kb/faq/pa-410">"Intermittent System Stutter Experienced with fTPM Enabled on Windows 10 and 11"</a>. AMD. 2022-03-08<span class="reference-accessdate">. Retrieved <span class="nowrap">2022-07-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Intermittent+System+Stutter+Experienced+with+fTPM+Enabled+on+Windows+10+and+11&amp;rft.pub=AMD&amp;rft.date=2022-03-08&amp;rft_id=https%3A%2F%2Fwww.amd.com%2Fen%2Fsupport%2Fkb%2Ffaq%2Fpa-410&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPaul_Alcorn2022" class="citation web cs1">Paul Alcorn (2022-03-07). <a rel="nofollow" class="external text" href="https://www.tomshardware.com/news/amd-issues-fix-and-workaround-for-ftpm-stuttering-issues">"AMD Issues Fix and Workaround for Ryzen's fTPM Stuttering Issues"</a>. <i>Tom's Hardware</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2022-07-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Tom%27s+Hardware&amp;rft.atitle=AMD+Issues+Fix+and+Workaround+for+Ryzen%27s+fTPM+Stuttering+Issues&amp;rft.date=2022-03-07&amp;rft.au=Paul+Alcorn&amp;rft_id=https%3A%2F%2Fwww.tomshardware.com%2Fnews%2Famd-issues-fix-and-workaround-for-ftpm-stuttering-issues&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.16.pdf">"Part 1: Architecture"</a> <span class="cs1-format">(PDF)</span>, <i>Trusted Platform Module Library</i>, Trusted Computing Group, October 30, 2014, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161028083957/https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.16.pdf">archived</a> <span class="cs1-format">(PDF)</span> from the original on October 28, 2016<span class="reference-accessdate">, retrieved <span class="nowrap">October 27,</span> 2016</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Part+1%3A+Architecture&amp;rft.btitle=Trusted+Platform+Module+Library&amp;rft.pub=Trusted+Computing+Group&amp;rft.date=2014-10-30&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-Rev-2.0-Part-1-Architecture-01.16.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.dell.com/support/article/en-us/sln312590/tpm-1-2-vs-2-0-features?lang=en">"TPM 1.2 vs. 2.0 Features &#124; Dell US"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+1.2+vs.+2.0+Features+%26%23124%3B+Dell+US&amp;rft_id=https%3A%2F%2Fwww.dell.com%2Fsupport%2Farticle%2Fen-us%2Fsln312590%2Ftpm-1-2-vs-2-0-features%3Flang%3Den&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://aps2.toshiba-tro.de/kb0/TSB8B03XO0000R01.htm">"TPM 1.2, 2.0 and FTPM (Firmware-based TPM) Information"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200206234241/http://aps2.toshiba-tro.de/kb0/TSB8B03XO0000R01.htm">Archived</a> from the original on February 6, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">August 31,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+1.2%2C+2.0+and+FTPM+%28Firmware-based+TPM%29+Information&amp;rft_id=http%3A%2F%2Faps2.toshiba-tro.de%2Fkb0%2FTSB8B03XO0000R01.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPM2.0Book-46"><span class="mw-cite-backlink">^ <a href="#cite_ref-TPM2.0Book_46-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TPM2.0Book_46-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFArthurChallenerGoldman2015" class="citation book cs1">Arthur, Will; Challener, David; Goldman, Kenneth (2015). <i>A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security</i>. <a href="/wiki/New_York_City" title="New York City">New York City</a>: <a href="/wiki/Apress" class="mw-redirect" title="Apress">Apress</a> Media, LLC. p.&#160;69. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-1-4302-6584-9">10.1007/978-1-4302-6584-9</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1430265832" title="Special:BookSources/978-1430265832"><bdi>978-1430265832</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:27168869">27168869</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=A+Practical+Guide+to+TPM+2.0%3A+Using+the+New+Trusted+Platform+Module+in+the+New+Age+of+Security&amp;rft.place=New+York+City&amp;rft.pages=69&amp;rft.pub=Apress+Media%2C+LLC&amp;rft.date=2015&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A27168869%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-1-4302-6584-9&amp;rft.isbn=978-1430265832&amp;rft.aulast=Arthur&amp;rft.aufirst=Will&amp;rft.au=Challener%2C+David&amp;rft.au=Goldman%2C+Kenneth&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/pc-client-protection-profile-tpm-2-0/">"PC Client Protection Profile for TPM 2.0 – Trusted Computing Group"</a>. <i>trustedcomputinggroup.org</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161031085440/https://www.trustedcomputinggroup.org/pc-client-protection-profile-tpm-2-0/">Archived</a> from the original on October 31, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=trustedcomputinggroup.org&amp;rft.atitle=PC+Client+Protection+Profile+for+TPM+2.0+%E2%80%93+Trusted+Computing+Group&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fpc-client-protection-profile-tpm-2-0%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/tpm-2-0-mobile-reference-architecture-specification/">"TPM 2.0 Mobile Reference Architecture Specification – Trusted Computing Group"</a>. trustedcomputinggroup.org. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161101103322/https://www.trustedcomputinggroup.org/tpm-2-0-mobile-reference-architecture-specification/">Archived</a> from the original on November 1, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 31,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+2.0+Mobile+Reference+Architecture+Specification+%E2%80%93+Trusted+Computing+Group&amp;rft.pub=trustedcomputinggroup.org&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Ftpm-2-0-mobile-reference-architecture-specification%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/tcg-tpm-2-0-library-profile-automotive-thin/">"TCG TPM 2.0 Library Profile for Automotive-Thin"</a>. <i>trustedcomputinggroup.org</i>. 1 March 2015. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170426062330/https://trustedcomputinggroup.org/tcg-tpm-2-0-library-profile-automotive-thin/">Archived</a> from the original on April 26, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">April 25,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=trustedcomputinggroup.org&amp;rft.atitle=TCG+TPM+2.0+Library+Profile+for+Automotive-Thin&amp;rft.date=2015-03-01&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Ftcg-tpm-2-0-library-profile-automotive-thin%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-TPM1.2Rev116Part2-50"><span class="mw-cite-backlink">^ <a href="#cite_ref-TPM1.2Rev116Part2_50-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-TPM1.2Rev116Part2_50-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-TPM1.2Rev116Part2_50-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-TPM1.2Rev116Part2_50-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-TPM1.2Rev116Part2_50-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161030140755/http://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 30, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 29,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=http%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://trustedcomputinggroup.org/wp-content/uploads/mainP2Struct_rev85.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161030080258/http://trustedcomputinggroup.org/wp-content/uploads/mainP2Struct_rev85.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 30, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 29,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=http%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FmainP2Struct_rev85.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/mainP1DPrev103.pdf">"TPM Main Specification Level 2 Version 1.2, Revision 103: Part 1 Design Principles"</a> <span class="cs1-format">(PDF)</span>. July 9, 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">February 16,</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+Main+Specification+Level+2+Version+1.2%2C+Revision+103%3A+Part+1+Design+Principles&amp;rft.date=2007-07-09&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FmainP1DPrev103.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-PCClient-53"><span class="mw-cite-backlink">^ <a href="#cite_ref-PCClient_53-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-PCClient_53-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-PCClient_53-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-PCClient_53-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/TCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf">"TCG Protection Profile for PC Client Specific TPM 2.0 Library Revision 1.59; Version 1.3"</a> <span class="cs1-format">(PDF)</span>. September 29, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">February 16,</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TCG+Protection+Profile+for+PC+Client+Specific+TPM+2.0+Library+Revision+1.59%3B+Version+1.3&amp;rft.date=2021-09-29&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTCG_PCClient_PP_1p3_for_Library_1p59_pub_29sept2021.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_Algorithm_Registry_Rev_1.22.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161031085411/https://www.trustedcomputinggroup.org/wp-content/uploads/TCG_Algorithm_Registry_Rev_1.22.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 31, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTCG_Algorithm_Registry_Rev_1.22.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://trustedcomputinggroup.org/wp-content/uploads/TCG-_Algorithm_Registry_Rev_1.27_FinalPublication.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190123223556/https://trustedcomputinggroup.org/wp-content/uploads/TCG-_Algorithm_Registry_Rev_1.27_FinalPublication.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on January 23, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">January 23,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=https%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTCG-_Algorithm_Registry_Rev_1.27_FinalPublication.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161031085415/http://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 31, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 30,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=http%3A%2F%2Ftrustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-Main-Part-1-Design-Principles_v1.2_rev116_01032011.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-57"><span class="mw-cite-backlink"><b><a href="#cite_ref-57">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.16.pdf">"Archived copy"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161028083957/https://www.trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-1-Architecture-01.16.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 28, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 27,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Archived+copy&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Fwp-content%2Fuploads%2FTPM-Rev-2.0-Part-1-Architecture-01.16.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: archived copy as title (<a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">link</a>)</span></span> </li> <li id="cite_note-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-58">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2">"Section 23: Enhanced Authorization (EA) Commands", <a rel="nofollow" class="external text" href="http://www.trustedcomputinggroup.org/files/static_page_files/C213752B-1A4B-B294-D053D90DF2AB69C5/TPM%20Rev%202.0%20Part%203%20-%20Commands%2001.07-2014-03-13-code.pdf"><i>Trusted Platform Module Library; Part 3: Commands</i></a> <span class="cs1-format">(PDF)</span>, Trusted Computing Group, March 13, 2014, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140903132917/http://www.trustedcomputinggroup.org/files/static_page_files/C213752B-1A4B-B294-D053D90DF2AB69C5/TPM%20Rev%202.0%20Part%203%20-%20Commands%2001.07-2014-03-13-code.pdf">archived</a> <span class="cs1-format">(PDF)</span> from the original on September 3, 2014<span class="reference-accessdate">, retrieved <span class="nowrap">September 2,</span> 2014</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Section+23%3A+Enhanced+Authorization+%28EA%29+Commands&amp;rft.btitle=Trusted+Platform+Module+Library%3B+Part+3%3A+Commands&amp;rft.pub=Trusted+Computing+Group&amp;rft.date=2014-03-13&amp;rft_id=http%3A%2F%2Fwww.trustedcomputinggroup.org%2Ffiles%2Fstatic_page_files%2FC213752B-1A4B-B294-D053D90DF2AB69C5%2FTPM%2520Rev%25202.0%2520Part%25203%2520-%2520Commands%252001.07-2014-03-13-code.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStallman" class="citation web cs1">Stallman, Richard Matthew. <a rel="nofollow" class="external text" href="https://www.gnu.org/philosophy/can-you-trust.html">"Project GNU"</a>. Free Software Foundation. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110629082333/http://www.gnu.org/philosophy/can-you-trust.html">Archived</a> from the original on 29 June 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">21 July</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Project+GNU&amp;rft.pub=Free+Software+Foundation&amp;rft.aulast=Stallman&amp;rft.aufirst=Richard+Matthew&amp;rft_id=https%3A%2F%2Fwww.gnu.org%2Fphilosophy%2Fcan-you-trust.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.grc.com/misc/truecrypt/TrueCrypt%20User%20Guide.pdf">"TrueCrypt User Guide"</a> <span class="cs1-format">(PDF)</span>. <i>truecrypt.org</i>. TrueCrypt Foundation. 7 February 2012. p.&#160;129 &#8211; via grc.com.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=truecrypt.org&amp;rft.atitle=TrueCrypt+User+Guide&amp;rft.pages=129&amp;rft.date=2012-02-07&amp;rft_id=https%3A%2F%2Fwww.grc.com%2Fmisc%2Ftruecrypt%2FTrueCrypt%2520User%2520Guide.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-61">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.veracrypt.fr/en/FAQ.html">"FAQ"</a>. <i>veracrypt.fr</i>. IDRIX. 2 July 2017.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=veracrypt.fr&amp;rft.atitle=FAQ&amp;rft.date=2017-07-02&amp;rft_id=https%3A%2F%2Fwww.veracrypt.fr%2Fen%2FFAQ.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCulp2000" class="citation web cs1">Culp, Scott (2000). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151209191417/https://technet.microsoft.com/en-us/library/hh278941.aspx">"Ten Immutable Laws Of Security (Version 2.0)"</a>. <i><a href="/wiki/TechNet_Magazine" class="mw-redirect" title="TechNet Magazine">TechNet Magazine</a></i>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. Archived from <a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/hh278941.aspx">the original</a> on 9 December 2015 &#8211; via <a href="/wiki/Microsoft_TechNet" title="Microsoft TechNet">Microsoft TechNet</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TechNet+Magazine&amp;rft.atitle=Ten+Immutable+Laws+Of+Security+%28Version+2.0%29&amp;rft.date=2000&amp;rft.aulast=Culp&amp;rft.aufirst=Scott&amp;rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fhh278941.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohansson2008" class="citation web cs1">Johansson, Jesper M. (October 2008). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170410043155/https://technet.microsoft.com/en-us/library/2008.10.securitywatch.aspx">"Security Watch Revisiting the 10 Immutable Laws of Security, Part 1"</a>. <i><a href="/wiki/TechNet_Magazine" class="mw-redirect" title="TechNet Magazine">TechNet Magazine</a></i>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>. Archived from <a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/2008.10.securitywatch.aspx">the original</a> on 10 April 2017 &#8211; via <a href="/wiki/Microsoft_TechNet" title="Microsoft TechNet">Microsoft TechNet</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=TechNet+Magazine&amp;rft.atitle=Security+Watch+Revisiting+the+10+Immutable+Laws+of+Security%2C+Part+1&amp;rft.date=2008-10&amp;rft.aulast=Johansson&amp;rft.aufirst=Jesper+M.&amp;rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2F2008.10.securitywatch.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.gnu.org/philosophy/can-you-trust.en.html">"Can You Trust Your Computer? - GNU Project - Free Software Foundation"</a>. <i>www.gnu.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2023-09-06</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.gnu.org&amp;rft.atitle=Can+You+Trust+Your+Computer%3F+-+GNU+Project+-+Free+Software+Foundation&amp;rft_id=https%3A%2F%2Fwww.gnu.org%2Fphilosophy%2Fcan-you-trust.en.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNeowin_·2024" class="citation web cs1">Neowin ·, Sayan Sen (2024-10-23). <a rel="nofollow" class="external text" href="https://www.neowin.net/news/linus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling/">"Linus Torvalds seems frustrated with AMD Ryzen fTPM bugs and issues, suggests disabling"</a>. <i>Neowin</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2024-10-23</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Neowin&amp;rft.atitle=Linus+Torvalds+seems+frustrated+with+AMD+Ryzen+fTPM+bugs+and+issues%2C+suggests+disabling&amp;rft.date=2024-10-23&amp;rft.aulast=Neowin+%C2%B7&amp;rft.aufirst=Sayan+Sen&amp;rft_id=https%3A%2F%2Fwww.neowin.net%2Fnews%2Flinus-torvalds-seems-frustrated-with-amd-ryzen-ftpm-bugs-and-issues-suggests-disabling%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120130095246/https://www.networkworld.com/news/2010/020210-black-hat-processor-security.html">"Black Hat: Researcher claims hack of processor used to secure Xbox 360, other products"</a>. January 30, 2012. Archived from the original on January 30, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">August 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Black+Hat%3A+Researcher+claims+hack+of+processor+used+to+secure+Xbox+360%2C+other+products&amp;rft.date=2012-01-30&amp;rft_id=https%3A%2F%2Fwww.networkworld.com%2Fnews%2F2010%2F020210-black-hat-processor-security.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span><span class="cs1-maint citation-comment"><code class="cs1-code">{{<a href="/wiki/Template:Cite_web" title="Template:Cite web">cite web</a>}}</code>: CS1 maint: bot: original URL status unknown (<a href="/wiki/Category:CS1_maint:_bot:_original_URL_status_unknown" title="Category:CS1 maint: bot: original URL status unknown">link</a>)</span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSzczys2010" class="citation web cs1">Szczys, Mike (February 9, 2010). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20100212050338/https://hackaday.com/2010/02/09/tpm-crytography-cracked/">"TPM crytography cracked"</a>. <i>HACKADAY</i>. Archived from <a rel="nofollow" class="external text" href="https://hackaday.com/2010/02/09/tpm-crytography-cracked/">the original</a> on February 12, 2010.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=HACKADAY&amp;rft.atitle=TPM+crytography+cracked&amp;rft.date=2010-02-09&amp;rft.aulast=Szczys&amp;rft.aufirst=Mike&amp;rft_id=https%3A%2F%2Fhackaday.com%2F2010%2F02%2F09%2Ftpm-crytography-cracked%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMelissa_Michael2018" class="citation podcast cs1">Melissa Michael (8 October 2018). <a rel="nofollow" class="external text" href="https://blog.f-secure.com/podcast-reinventing-cold-boot-attack/">"Episode 14 Reinventing the Cold Boot Attack: Modern Laptop Version"</a> (Podcast). F-Secure Blog. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190928091354/https://blog.f-secure.com/podcast-reinventing-cold-boot-attack/">Archived</a> from the original on 28 September 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">28 September</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Episode+14+Reinventing+the+Cold+Boot+Attack%3A+Modern+Laptop+Version&amp;rft.pub=F-Secure+Blog&amp;rft.date=2018-10-08&amp;rft.au=Melissa+Michael&amp;rft_id=https%3A%2F%2Fblog.f-secure.com%2Fpodcast-reinventing-cold-boot-attack%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-sharedauth-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-sharedauth_69-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChenRyan2009" class="citation conference cs1">Chen, Liqun; Ryan, Mark (2009). <i>Attack, solution and verification for shared authorisation data in TCG TPM</i>. Sixth International Workshop on Formal Aspects in Security and Trust (FAST'09). LNCS Springer.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=Attack%2C+solution+and+verification+for+shared+authorisation+data+in+TCG+TPM&amp;rft.pub=LNCS+Springer&amp;rft.date=2009&amp;rft.aulast=Chen&amp;rft.aufirst=Liqun&amp;rft.au=Ryan%2C+Mark&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFScahillBegley2015" class="citation web cs1">Scahill, Jeremy ScahillJosh BegleyJeremy; Begley, Josh (March 10, 2015). <a rel="nofollow" class="external text" href="https://theintercept.com/2015/03/10/ispy-cia-campaign-steal-apples-secrets/">"The CIA Campaign to Steal Apple's Secrets"</a>. The Intercept. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170809064512/https://theintercept.com/2015/03/10/ispy-cia-campaign-steal-apples-secrets/">Archived</a> from the original on August 9, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">August 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+CIA+Campaign+to+Steal+Apple%27s+Secrets&amp;rft.pub=The+Intercept&amp;rft.date=2015-03-10&amp;rft.aulast=Scahill&amp;rft.aufirst=Jeremy+ScahillJosh+BegleyJeremy&amp;rft.au=Begley%2C+Josh&amp;rft_id=https%3A%2F%2Ftheintercept.com%2F2015%2F03%2F10%2Fispy-cia-campaign-steal-apples-secrets%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://theintercept.com/document/2015/03/10/tpm-vulnerabilities-power-analysis-exposed-exploit-bitlocker/">"TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker – The Intercept"</a>. <i>The Intercept</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170709222530/https://theintercept.com/document/2015/03/10/tpm-vulnerabilities-power-analysis-exposed-exploit-bitlocker/">Archived</a> from the original on July 9, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">August 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=The+Intercept&amp;rft.atitle=TPM+Vulnerabilities+to+Power+Analysis+and+An+Exposed+Exploit+to+Bitlocker+%E2%80%93+The+Intercept&amp;rft_id=https%3A%2F%2Ftheintercept.com%2Fdocument%2F2015%2F03%2F10%2Ftpm-vulnerabilities-power-analysis-exposed-exploit-bitlocker%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-Bleeping-72"><span class="mw-cite-backlink">^ <a href="#cite_ref-Bleeping_72-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-Bleeping_72-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCimpanu2018" class="citation web cs1">Cimpanu, Catalin (August 29, 2018). <a rel="nofollow" class="external text" href="https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/">"Researchers Detail Two New Attacks on TPM Chips"</a>. Bleeping Computer. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20181007062452/https://www.bleepingcomputer.com/news/security/researchers-detail-two-new-attacks-on-tpm-chips/">Archived</a> from the original on 7 October 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">28 September</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Researchers+Detail+Two+New+Attacks+on+TPM+Chips&amp;rft.pub=Bleeping+Computer&amp;rft.date=2018-08-29&amp;rft.aulast=Cimpanu&amp;rft.aufirst=Catalin&amp;rft_id=https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fresearchers-detail-two-new-attacks-on-tpm-chips%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-USENIX27-73"><span class="mw-cite-backlink">^ <a href="#cite_ref-USENIX27_73-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-USENIX27_73-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSeunghunWookJun-HyeokHyoungChun2018" class="citation conference cs1">Seunghun, Han; Wook, Shin; Jun-Hyeok, Park; HyoungChun, Kim (August 15–17, 2018). <a rel="nofollow" class="external text" href="https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-han.pdf"><i>A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping</i></a> <span class="cs1-format">(PDF)</span>. 27th USENIX Security Symposium. Baltimore, MD, USA: USENIX Association. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781939133045" title="Special:BookSources/9781939133045"><bdi>9781939133045</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180820032203/https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-han.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 20 August 2018.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=A+Bad+Dream%3A+Subverting+Trusted+Platform+Module+While+You+Are+Sleeping&amp;rft.place=Baltimore%2C+MD%2C+USA&amp;rft.pub=USENIX+Association&amp;rft.date=2018-08-15%2F2018-08-17&amp;rft.isbn=9781939133045&amp;rft.aulast=Seunghun&amp;rft.aufirst=Han&amp;rft.au=Wook%2C+Shin&amp;rft.au=Jun-Hyeok%2C+Park&amp;rft.au=HyoungChun%2C+Kim&amp;rft_id=https%3A%2F%2Fwww.usenix.org%2Fsystem%2Ffiles%2Fconference%2Fusenixsecurity18%2Fsec18-han.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/gadgets/2021/08/how-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes/">"Trusted platform module security defeated in 30 minutes, no soldering required"</a>. August 3, 2021.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+platform+module+security+defeated+in+30+minutes%2C+no+soldering+required&amp;rft.date=2021-08-03&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fgadgets%2F2021%2F08%2Fhow-to-go-from-stolen-pc-to-network-intrusion-in-30-minutes%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-ars20171016-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-ars20171016_75-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoodin2017" class="citation web cs1">Goodin, Dan (October 16, 2017). <a rel="nofollow" class="external text" href="https://arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/">"Millions of high-security crypto keys crippled by newly discovered flaw"</a>. Ars Technica. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20181019012939/https://arstechnica.com/information-technology/2017/10/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids/">Archived</a> from the original on October 19, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">October 18,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Millions+of+high-security+crypto+keys+crippled+by+newly+discovered+flaw&amp;rft.pub=Ars+Technica&amp;rft.date=2017-10-16&amp;rft.aulast=Goodin&amp;rft.aufirst=Dan&amp;rft_id=https%3A%2F%2Farstechnica.com%2Finformation-technology%2F2017%2F10%2Fcrypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.schneier.com/blog/archives/2015/03/can_the_nsa_bre_1.html">"Can the NSA Break Microsoft's BitLocker? – Schneier on Security"</a>. <i>www.schneier.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170810210547/https://www.schneier.com/blog/archives/2015/03/can_the_nsa_bre_1.html">Archived</a> from the original on August 10, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">August 10,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.schneier.com&amp;rft.atitle=Can+the+NSA+Break+Microsoft%27s+BitLocker%3F+%E2%80%93+Schneier+on+Security&amp;rft_id=https%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2015%2F03%2Fcan_the_nsa_bre_1.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.infineon.com/cms/en/product/promopages/tpm-update/">"<span class="cs1-kern-left"></span>"TPM Update - Infineon Technologies"<span class="cs1-kern-right"></span>"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210205072055/https://www.infineon.com/cms/en/product/promopages/tpm-update/">Archived</a> from the original on February 5, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">March 19,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=%22TPM+Update+-+Infineon+Technologies%22&amp;rft_id=https%3A%2F%2Fwww.infineon.com%2Fcms%2Fen%2Fproduct%2Fpromopages%2Ftpm-update%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.heise.de/newsticker/meldung/Trusted-Platform-Module-TPM-im-LAN-Adapter-143777.html">"Trusted Platform Module (TPM) im LAN-Adapter"</a>. Heise Online. March 12, 2005. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190107232935/https://www.heise.de/newsticker/meldung/Trusted-Platform-Module-TPM-im-LAN-Adapter-143777.html">Archived</a> from the original on January 7, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">January 7,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trusted+Platform+Module+%28TPM%29+im+LAN-Adapter&amp;rft.pub=Heise+Online&amp;rft.date=2005-03-12&amp;rft_id=https%3A%2F%2Fwww.heise.de%2Fnewsticker%2Fmeldung%2FTrusted-Platform-Module-TPM-im-LAN-Adapter-143777.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-AtmelTPMFrontPage-79"><span class="mw-cite-backlink">^ <a href="#cite_ref-AtmelTPMFrontPage_79-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-AtmelTPMFrontPage_79-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20161005162507/http://www.atmel.com/products/security-ics/embedded/">"Home – Microchip Technology"</a>. <i>www.atmel.com</i>. Archived from <a rel="nofollow" class="external text" href="http://www.atmel.com/products/security-ics/embedded/">the original</a> on October 5, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 4,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.atmel.com&amp;rft.atitle=Home+%E2%80%93+Microchip+Technology&amp;rft_id=http%3A%2F%2Fwww.atmel.com%2Fproducts%2Fsecurity-ics%2Fembedded%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20161005171009/http://www.atmel.com/Images/Atmel-8965-TPM-Part-No-Selection-Guide-ApplicationNote.pdf">"AN_8965 TPM Part Number Selection Guide – Application Notes – Microchip Technology Inc"</a> <span class="cs1-format">(PDF)</span>. <i>www.atmel.com</i>. Archived from <a rel="nofollow" class="external text" href="http://www.atmel.com/Images/Atmel-8965-TPM-Part-No-Selection-Guide-ApplicationNote.pdf">the original</a> <span class="cs1-format">(PDF)</span> on October 5, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 4,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.atmel.com&amp;rft.atitle=AN_8965+TPM+Part+Number+Selection+Guide+%E2%80%93+Application+Notes+%E2%80%93+Microchip+Technology+Inc.&amp;rft_id=http%3A%2F%2Fwww.atmel.com%2FImages%2FAtmel-8965-TPM-Part-No-Selection-Guide-ApplicationNote.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.microchip.com/en-us/products/security/security-ics/tpm">"<span class="cs1-kern-left"></span>"Trusted Platform Module"<span class="cs1-kern-right"></span>"</a>. Microchip Technology<span class="reference-accessdate">. Retrieved <span class="nowrap">2024-02-14</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=%22Trusted+Platform+Module%22&amp;rft.pub=Microchip+Technology&amp;rft_id=https%3A%2F%2Fwww.microchip.com%2Fen-us%2Fproducts%2Fsecurity%2Fsecurity-ics%2Ftpm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20161005165740/http://www.atmel.com/products/security-ics/embedded/?tab=tools">"Home – Microchip Technology"</a>. <i>www.atmel.com</i>. Archived from <a rel="nofollow" class="external text" href="http://www.atmel.com/products/security-ics/embedded/?tab=tools">the original</a> on October 5, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">October 4,</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.atmel.com&amp;rft.atitle=Home+%E2%80%93+Microchip+Technology&amp;rft_id=http%3A%2F%2Fwww.atmel.com%2Fproducts%2Fsecurity-ics%2Fembedded%2F%3Ftab%3Dtools&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/products/cloud-computing/security/trusted-platform-module-tpm">"Nuvoton TPM"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Nuvoton+TPM&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fproducts%2Fcloud-computing%2Fsecurity%2Ftrusted-platform-module-tpm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.st.com/content/ccc/resource/sales_and_marketing/promotional_material/flyer/group0/62/f7/89/67/99/9a/40/45/STSAFE_TPM_Flyer/files/STSAFE-TPM-Flyer.pdf/jcr:content/translations/en.STSAFE-TPM-Flyer.pdf">"STSAFE-TPM"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=STSAFE-TPM&amp;rft_id=https%3A%2F%2Fwww.st.com%2Fcontent%2Fccc%2Fresource%2Fsales_and_marketing%2Fpromotional_material%2Fflyer%2Fgroup0%2F62%2Ff7%2F89%2F67%2F99%2F9a%2F40%2F45%2FSTSAFE_TPM_Flyer%2Ffiles%2FSTSAFE-TPM-Flyer.pdf%2Fjcr%3Acontent%2Ftranslations%2Fen.STSAFE-TPM-Flyer.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-85"><span class="mw-cite-backlink"><b><a href="#cite_ref-85">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.trustedcomputinggroup.org/files/temp/4B551C9F-1D09-3519-AD45C1F0B5D61714/TPM%20Overview.pdf">"Replacing Vulnerable Software with Secure Hardware: The Trusted Platform Module (TPM) and How to Use It in the Enterprise"</a> <span class="cs1-format">(PDF)</span>. Trusted computing group. 2008. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140714233816/https://www.trustedcomputinggroup.org/files/temp/4B551C9F-1D09-3519-AD45C1F0B5D61714/TPM%20Overview.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on July 14, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">June 7,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Replacing+Vulnerable+Software+with+Secure+Hardware%3A+The+Trusted+Platform+Module+%28TPM%29+and+How+to+Use+It+in+the+Enterprise&amp;rft.pub=Trusted+computing+group&amp;rft.date=2008&amp;rft_id=https%3A%2F%2Fwww.trustedcomputinggroup.org%2Ffiles%2Ftemp%2F4B551C9F-1D09-3519-AD45C1F0B5D61714%2FTPM%2520Overview.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.broadcom.com/products/Ethernet-Controllers-and-Adapters/Enterprise-Client-Controllers/BCM5752">"NetXtreme Gigabit Ethernet Controller with Integrated TPM1.2 for Desktops"</a>. Broadcom. May 6, 2009. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140614134124/http://www.broadcom.com/products/Ethernet-Controllers-and-Adapters/Enterprise-Client-Controllers/BCM5752">Archived</a> from the original on June 14, 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">June 7,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=NetXtreme+Gigabit+Ethernet+Controller+with+Integrated+TPM1.2+for+Desktops&amp;rft.pub=Broadcom&amp;rft.date=2009-05-06&amp;rft_id=http%3A%2F%2Fwww.broadcom.com%2Fproducts%2FEthernet-Controllers-and-Adapters%2FEnterprise-Client-Controllers%2FBCM5752&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://support.hp.com/us-en/product/hp-prodesk-490-g3-microtower-pc/7633358/document/c05381064">"HP TPM Configuration Utility"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=HP+TPM+Configuration+Utility&amp;rft_id=https%3A%2F%2Fsupport.hp.com%2Fus-en%2Fproduct%2Fhp-prodesk-490-g3-microtower-pc%2F7633358%2Fdocument%2Fc05381064&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.thewindowsclub.com/tpm-vs-ptt-differences">"TPM vs PTT: What are the main differences between these technologies?"</a>. August 9, 2021.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+vs+PTT%3A+What+are+the+main+differences+between+these+technologies%3F&amp;rft.date=2021-08-09&amp;rft_id=https%3A%2F%2Fwww.thewindowsclub.com%2Ftpm-vs-ptt-differences&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-89"><span class="mw-cite-backlink"><b><a href="#cite_ref-89">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://cloud.google.com/shielded-vm">"Shielded VMs"</a>. Google Cloud. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190412112007/https://cloud.google.com/shielded-vm/">Archived</a> from the original on April 12, 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">April 12,</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Shielded+VMs&amp;rft.pub=Google+Cloud&amp;rft_id=https%3A%2F%2Fcloud.google.com%2Fshielded-vm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-90"><span class="mw-cite-backlink"><b><a href="#cite_ref-90">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/stefanberger/libtpms">"libtpms Virtual TPM"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. October 27, 2021.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=libtpms+Virtual+TPM&amp;rft.date=2021-10-27&amp;rft_id=https%3A%2F%2Fgithub.com%2Fstefanberger%2Flibtpms&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-91">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMicrosoft" class="citation web cs1">Microsoft. <a rel="nofollow" class="external text" href="https://www.microsoft.com/en-us/windows/windows-11-specifications">"Windows 11 Specs and System Requirements | Microsoft"</a>. <i>Windows</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-10-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Windows&amp;rft.atitle=Windows+11+Specs+and+System+Requirements+%7C+Microsoft&amp;rft.au=Microsoft&amp;rft_id=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fwindows%2Fwindows-11-specifications&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-92"><span class="mw-cite-backlink"><b><a href="#cite_ref-92">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChabaud2022" class="citation conference cs1">Chabaud, Florent (November 15–16, 2022). <a rel="nofollow" class="external text" href="https://ceur-ws.org/Vol-3329/paper-07.pdf">"Setting Hardware Root-of-Trust from Edge to Cloud, and How to Use it"</a> <span class="cs1-format">(PDF)</span>. In le Guernic, Gurvan (ed.). <i>Proceedings of the 29th Computer &amp; Electronics Security Application Rendezvous</i>. Rennes, France: C&amp;ESAR 2022. pp.&#160;115–130.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=Setting+Hardware+Root-of-Trust+from+Edge+to+Cloud%2C+and+How+to+Use+it&amp;rft.btitle=Proceedings+of+the+29th+Computer+%26+Electronics+Security+Application+Rendezvous&amp;rft.place=Rennes%2C+France&amp;rft.pages=115-130&amp;rft.pub=C%26ESAR+2022&amp;rft.date=2022-11-15%2F2022-11-16&amp;rft.aulast=Chabaud&amp;rft.aufirst=Florent&amp;rft_id=https%3A%2F%2Fceur-ws.org%2FVol-3329%2Fpaper-07.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span> Location: Université de Rennes 1, Campus de Beaulieu, IRISA/Inria Rennes, 263 avenue du Général Leclerc, 35042 RENNES cedex.</span> </li> <li id="cite_note-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-93">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.slashgear.com/windows-11-tpm-2-0-update-system-requirement-confusion-24679866/">"Windows 11 update: TPM 2.0 and PC Health Check confusion"</a>. <i>SlashGear</i>. 2021-06-24. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210624203318/https://www.slashgear.com/windows-11-tpm-2-0-update-system-requirement-confusion-24679866/">Archived</a> from the original on June 24, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">2021-06-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=SlashGear&amp;rft.atitle=Windows+11+update%3A+TPM+2.0+and+PC+Health+Check+confusion&amp;rft.date=2021-06-24&amp;rft_id=https%3A%2F%2Fwww.slashgear.com%2Fwindows-11-tpm-2-0-update-system-requirement-confusion-24679866%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-94">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://support.microsoft.com/en-us/topic/update-to-add-support-for-tpm-2-0-in-windows-7-and-windows-server-2008-r2-8ef7d943-995e-ee23-0c54-06600e368e1c">"Update to add support for TPM 2.0 in Windows 7 and Windows Server 2008 R2 - Microsoft Support"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Update+to+add+support+for+TPM+2.0+in+Windows+7+and+Windows+Server+2008+R2+-+Microsoft+Support&amp;rft_id=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Ftopic%2Fupdate-to-add-support-for-tpm-2-0-in-windows-7-and-windows-server-2008-r2-8ef7d943-995e-ee23-0c54-06600e368e1c&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-3.20-TPM-2.0-Security">"TPM 2.0 Support Sent In For The Linux 3.20 Kernel - Phoronix"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210228102638/https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-3.20-TPM-2.0-Security">Archived</a> from the original on February 28, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+2.0+Support+Sent+In+For+The+Linux+3.20+Kernel+-+Phoronix&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DLinux-3.20-TPM-2.0-Security&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=TPM-2.0-Security-Linux-4.4">"TPM 2.0 Support Continues Maturing In Linux 4.4 - Phoronix"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210305070203/https://www.phoronix.com/scan.php?page=news_item&amp;px=TPM-2.0-Security-Linux-4.4">Archived</a> from the original on March 5, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=TPM+2.0+Support+Continues+Maturing+In+Linux+4.4+-+Phoronix&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DTPM-2.0-Security-Linux-4.4&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-4.4-TPM-2.0">"With Linux 4.4, TPM 2.0 Gets Into Shape For Distributions - Phoronix"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200814003044/https://www.phoronix.com/scan.php?page=news_item&amp;px=Linux-4.4-TPM-2.0">Archived</a> from the original on August 14, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">April 5,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=With+Linux+4.4%2C+TPM+2.0+Gets+Into+Shape+For+Distributions+-+Phoronix&amp;rft_id=https%3A%2F%2Fwww.phoronix.com%2Fscan.php%3Fpage%3Dnews_item%26px%3DLinux-4.4-TPM-2.0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-98"><span class="mw-cite-backlink"><b><a href="#cite_ref-98">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://chrome.googleblog.com/2011/07/chromebook-security-browsing-more.html">"Chromebook security: browsing more securely"</a>. <i>Chrome Blog</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160425070152/https://chrome.googleblog.com/2011/07/chromebook-security-browsing-more.html">Archived</a> from the original on April 25, 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">April 7,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Chrome+Blog&amp;rft.atitle=Chromebook+security%3A+browsing+more+securely&amp;rft_id=https%3A%2F%2Fchrome.googleblog.com%2F2011%2F07%2Fchromebook-security-browsing-more.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-99"><span class="mw-cite-backlink"><b><a href="#cite_ref-99">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.oracle.com/us/products/servers-storage/solaris/solaris-and-sparc-t4-497273.pdf">"Oracle Solaris and Oracle SPARC T4 Servers— Engineered Together for Enterprise Cloud Deployments"</a> <span class="cs1-format">(PDF)</span>. Oracle. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121024150758/http://www.oracle.com/us/products/servers-storage/solaris/solaris-and-sparc-t4-497273.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on October 24, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">October 12,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Oracle+Solaris+and+Oracle+SPARC+T4+Servers%E2%80%94+Engineered+Together+for+Enterprise+Cloud+Deployments&amp;rft.pub=Oracle&amp;rft_id=http%3A%2F%2Fwww.oracle.com%2Fus%2Fproducts%2Fservers-storage%2Fsolaris%2Fsolaris-and-sparc-t4-497273.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-100"><span class="mw-cite-backlink"><b><a href="#cite_ref-100">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://docs.oracle.com/cd/E23824_01/html/821-1462/tpmadm-1m.html">"tpmadm"</a> (manpage). Oracle. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20121114112129/http://docs.oracle.com/cd/E23824_01/html/821-1462/tpmadm-1m.html">Archived</a> from the original on November 14, 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">October 12,</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=tpmadm&amp;rft.pub=Oracle&amp;rft_id=http%3A%2F%2Fdocs.oracle.com%2Fcd%2FE23824_01%2Fhtml%2F821-1462%2Ftpmadm-1m.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-101"><span class="mw-cite-backlink"><b><a href="#cite_ref-101">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSingh" class="citation cs2">Singh, Amit, <a rel="nofollow" class="external text" href="http://www.osxbook.com/book/bonus/chapter10/tpm/">"Trusted Computing for Mac OS X"</a>, <i>OS X book</i>, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110721080011/http://www.osxbook.com/book/bonus/chapter10/tpm/">archived</a> from the original on July 21, 2011<span class="reference-accessdate">, retrieved <span class="nowrap">August 2,</span> 2011</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Trusted+Computing+for+Mac+OS+X&amp;rft.btitle=OS+X+book&amp;rft.aulast=Singh&amp;rft.aufirst=Amit&amp;rft_id=http%3A%2F%2Fwww.osxbook.com%2Fbook%2Fbonus%2Fchapter10%2Ftpm%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span>.</span> </li> <li id="cite_note-102"><span class="mw-cite-backlink"><b><a href="#cite_ref-102">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.pcworld.com/article/157966/laptop_security.html">"Your Laptop Data Is Not Safe. So Fix It"</a>. <i>PC World</i>. January 20, 2009. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131104211218/http://www.pcworld.com/article/157966/laptop_security.html">Archived</a> from the original on November 4, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">August 22,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=PC+World&amp;rft.atitle=Your+Laptop+Data+Is+Not+Safe.+So+Fix+It&amp;rft.date=2009-01-20&amp;rft_id=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F157966%2Flaptop_security.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-103"><span class="mw-cite-backlink"><b><a href="#cite_ref-103">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.msi.com/product/windpad/WindPad-110W.html">"TPM. Complete protection for peace of mind"</a>. <i>Winpad 110W</i>. MSI. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130513043710/http://www.msi.com/product/windpad/WindPad-110W.html">Archived</a> from the original on May 13, 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">May 20,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Winpad+110W&amp;rft.atitle=TPM.+Complete+protection+for+peace+of+mind&amp;rft_id=http%3A%2F%2Fwww.msi.com%2Fproduct%2Fwindpad%2FWindPad-110W.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-104"><span class="mw-cite-backlink"><b><a href="#cite_ref-104">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc_50%2FGUID-E9B71B85-FBA3-447C-8A60-DEE2AE1A405A.html"><i>Security and the Virtualization Layer</i></a>, VMware, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131104213659/http://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.vsphere.security.doc_50%2FGUID-E9B71B85-FBA3-447C-8A60-DEE2AE1A405A.html">archived</a> from the original on November 4, 2013<span class="reference-accessdate">, retrieved <span class="nowrap">May 21,</span> 2013</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Security+and+the+Virtualization+Layer&amp;rft.pub=VMware&amp;rft_id=http%3A%2F%2Fpubs.vmware.com%2Fvsphere-50%2Findex.jsp%3Ftopic%3D%252Fcom.vmware.vsphere.security.doc_50%252FGUID-E9B71B85-FBA3-447C-8A60-DEE2AE1A405A.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span>.</span> </li> <li id="cite_note-105"><span class="mw-cite-backlink"><b><a href="#cite_ref-105">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="http://en.community.dell.com/techcenter/b/techcenter/archive/2012/06/13/enabling-intel-txt-on-dell-poweredge-servers-with-vmware-esxi.aspx"><i>Enabling Intel TXT on Dell PowerEdge Servers with VMware ESXi</i></a>, Dell, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140316165542/http://en.community.dell.com/techcenter/b/techcenter/archive/2012/06/13/enabling-intel-txt-on-dell-poweredge-servers-with-vmware-esxi.aspx">archived</a> from the original on March 16, 2014<span class="reference-accessdate">, retrieved <span class="nowrap">May 21,</span> 2013</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Enabling+Intel+TXT+on+Dell+PowerEdge+Servers+with+VMware+ESXi&amp;rft.pub=Dell&amp;rft_id=http%3A%2F%2Fen.community.dell.com%2Ftechcenter%2Fb%2Ftechcenter%2Farchive%2F2012%2F06%2F13%2Fenabling-intel-txt-on-dell-poweredge-servers-with-vmware-esxi.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span>.</span> </li> <li id="cite_note-106"><span class="mw-cite-backlink"><b><a href="#cite_ref-106">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://wiki.xenproject.org/wiki/Virtual_Trusted_Platform_Module_%28vTPM%29">"XEN Virtual Trusted Platform Module (vTPM)"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150915104249/http://wiki.xenproject.org/wiki/Virtual_Trusted_Platform_Module_(vTPM)">Archived</a> from the original on September 15, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">September 28,</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=XEN+Virtual+Trusted+Platform+Module+%28vTPM%29&amp;rft_id=http%3A%2F%2Fwiki.xenproject.org%2Fwiki%2FVirtual_Trusted_Platform_Module_%2528vTPM%2529&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-107"><span class="mw-cite-backlink"><b><a href="#cite_ref-107">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://wiki.qemu.org/ChangeLog/2.11#TPM">"QEMU 2.11 Changelog"</a>. <i>qemu.org</i>. December 12, 2017. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180209003144/https://wiki.qemu.org/ChangeLog/2.11#TPM">Archived</a> from the original on February 9, 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">February 8,</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=qemu.org&amp;rft.atitle=QEMU+2.11+Changelog&amp;rft.date=2017-12-12&amp;rft_id=https%3A%2F%2Fwiki.qemu.org%2FChangeLog%2F2.11%23TPM&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-108"><span class="mw-cite-backlink"><b><a href="#cite_ref-108">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.virtualbox.org/wiki/Changelog-7.0">"Changelog for VirtualBox 7.0"</a>. <i>virtualbox.org</i>. October 10, 2022. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221106172436/https://www.virtualbox.org/wiki/Changelog-7.0">Archived</a> from the original on November 6, 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">November 6,</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=virtualbox.org&amp;rft.atitle=Changelog+for+VirtualBox+7.0&amp;rft.date=2022-10-10&amp;rft_id=https%3A%2F%2Fwww.virtualbox.org%2Fwiki%2FChangelog-7.0&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-109"><span class="mw-cite-backlink"><b><a href="#cite_ref-109">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://msdn.microsoft.com/en-us/library/windows/hardware/hh748188.aspx">"Windows Hardware Certification Requirements"</a>. Microsoft. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210629081025/https://docs.microsoft.com/en-us/previous-versions/windows/hardware/cert-program/?redirectedfrom=MSDN">Archived</a> from the original on June 29, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">July 23,</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Windows+Hardware+Certification+Requirements&amp;rft.pub=Microsoft&amp;rft_id=http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fwindows%2Fhardware%2Fhh748188.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-110"><span class="mw-cite-backlink"><b><a href="#cite_ref-110">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://msdn.microsoft.com/en-us/library/windows/hardware/jj128256">"Windows Hardware Certification Requirements for Client and Server Systems"</a>. Microsoft. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150701150150/https://msdn.microsoft.com/en-US/library/windows/hardware/jj128256">Archived</a> from the original on July 1, 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">June 5,</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Windows+Hardware+Certification+Requirements+for+Client+and+Server+Systems&amp;rft.pub=Microsoft&amp;rft_id=https%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fwindows%2Fhardware%2Fjj128256&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-111"><span class="mw-cite-backlink"><b><a href="#cite_ref-111">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/what-s-new-in-hyper-v-on-windows">"What's new in Hyper-V on Windows Server 2016"</a>. Microsoft. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170325113136/https://technet.microsoft.com/en-us/windows-server-docs/compute/hyper-v/what-s-new-in-hyper-v-on-windows">Archived</a> from the original on March 25, 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">March 24,</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What%27s+new+in+Hyper-V+on+Windows+Server+2016&amp;rft.pub=Microsoft&amp;rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Fwindows-server-docs%2Fcompute%2Fhyper-v%2Fwhat-s-new-in-hyper-v-on-windows&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-112"><span class="mw-cite-backlink"><b><a href="#cite_ref-112">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/tpmtool">tpmtool | Microsoft Docs</a></span> </li> <li id="cite_note-113"><span class="mw-cite-backlink"><b><a href="#cite_ref-113">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/tpmvscmgr">tpmvscmgr | Microsoft Docs</a></span> </li> <li id="cite_note-114"><span class="mw-cite-backlink"><b><a href="#cite_ref-114">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://ftpm.amd.com/pki/aia/264D39A23CEB5D5B49D610044EEBD121"><i>AMD EK RSA Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=AMD+EK+RSA+Root+Certificate&amp;rft_id=https%3A%2F%2Fftpm.amd.com%2Fpki%2Faia%2F264D39A23CEB5D5B49D610044EEBD121&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-115"><span class="mw-cite-backlink"><b><a href="#cite_ref-115">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://ftpm.amd.com/pki/aia/23452201D41C5AB064032BD23F158FEF"><i>AMD EK ECC Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=AMD+EK+ECC+Root+Certificate&amp;rft_id=https%3A%2F%2Fftpm.amd.com%2Fpki%2Faia%2F23452201D41C5AB064032BD23F158FEF&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-116"><span class="mw-cite-backlink"><b><a href="#cite_ref-116">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://ftpm.amd.com/pki/aia/51ADE34A2F8253525E2321AD63F7B197"><i>AMD EK Ryzen 6000 RSA Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=AMD+EK+Ryzen+6000+RSA+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fftpm.amd.com%2Fpki%2Faia%2F51ADE34A2F8253525E2321AD63F7B197&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-117"><span class="mw-cite-backlink"><b><a href="#cite_ref-117">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://ftpm.amd.com/pki/aia/D30EE6F7557055BA66AD1A1DD1157D2C"><i>AMD EK Ryzen 6000 ECC Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=AMD+EK+Ryzen+6000+ECC+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fftpm.amd.com%2Fpki%2Faia%2FD30EE6F7557055BA66AD1A1DD1157D2C&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-118"><span class="mw-cite-backlink"><b><a href="#cite_ref-118">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.infineon.com/cms/en/product/promopages/optiga_tpm_certificates/"><i>Infineon Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Infineon+Root+Certificate&amp;rft_id=https%3A%2F%2Fwww.infineon.com%2Fcms%2Fen%2Fproduct%2Fpromopages%2Foptiga_tpm_certificates%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-119"><span class="mw-cite-backlink"><b><a href="#cite_ref-119">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://upgrades.intel.com/content/CRL/ekcert/EKRootPublicKey.cer"><i>Intel EK Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Intel+EK+Root+Certificate&amp;rft_id=https%3A%2F%2Fupgrades.intel.com%2Fcontent%2FCRL%2Fekcert%2FEKRootPublicKey.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-120"><span class="mw-cite-backlink"><b><a href="#cite_ref-120">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://upgrades.intel.com/content/CRL/ekcert/SPTHEPIDPROD_EK_Platform_Public_Key.cer"><i>Intel EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Intel+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fupgrades.intel.com%2Fcontent%2FCRL%2Fekcert%2FSPTHEPIDPROD_EK_Platform_Public_Key.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-121"><span class="mw-cite-backlink"><b><a href="#cite_ref-121">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://pki.nationz.com.cn/EkRootCA/EkRootCA.crt"><i>NationZ EK Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=NationZ+EK+Root+Certificate&amp;rft_id=https%3A%2F%2Fpki.nationz.com.cn%2FEkRootCA%2FEkRootCA.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-122"><span class="mw-cite-backlink"><b><a href="#cite_ref-122">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://pki.nationz.com.cn/EkMfrCA001/EkMfrCA001.crt"><i>NationZ EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=NationZ+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fpki.nationz.com.cn%2FEkMfrCA001%2FEkMfrCA001.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-123"><span class="mw-cite-backlink"><b><a href="#cite_ref-123">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://pki.nationz.com.cn/EkMfrCA002/EkMfrCA002.crt"><i>NationZ EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=NationZ+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fpki.nationz.com.cn%2FEkMfrCA002%2FEkMfrCA002.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-124"><span class="mw-cite-backlink"><b><a href="#cite_ref-124">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://pki.nationz.com.cn/EkMfrCA003/EkMfrCA003.crt"><i>NationZ EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=NationZ+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fpki.nationz.com.cn%2FEkMfrCA003%2FEkMfrCA003.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-125"><span class="mw-cite-backlink"><b><a href="#cite_ref-125">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/security/NTC-TPM-EK-Cert/Nuvoton%20TPM%20Root%20CA%201110.cer"><i>Nuvoton EK Root Certificate 1110</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Nuvoton+EK+Root+Certificate+1110&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fsecurity%2FNTC-TPM-EK-Cert%2FNuvoton%2520TPM%2520Root%2520CA%25201110.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-126"><span class="mw-cite-backlink"><b><a href="#cite_ref-126">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/security/NTC-TPM-EK-Cert/Nuvoton%20TPM%20Root%20CA%201111.cer"><i>Nuvoton EK Root Certificate 1111</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Nuvoton+EK+Root+Certificate+1111&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fsecurity%2FNTC-TPM-EK-Cert%2FNuvoton%2520TPM%2520Root%2520CA%25201111.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-127"><span class="mw-cite-backlink"><b><a href="#cite_ref-127">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/security/NTC-TPM-EK-Cert/Nuvoton%20TPM%20Root%20CA%202110.cer"><i>Nuvoton EK Root Certificate 2110</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Nuvoton+EK+Root+Certificate+2110&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fsecurity%2FNTC-TPM-EK-Cert%2FNuvoton%2520TPM%2520Root%2520CA%25202110.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-128"><span class="mw-cite-backlink"><b><a href="#cite_ref-128">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/security/NTC-TPM-EK-Cert/Nuvoton%20TPM%20Root%20CA%202111.cer"><i>Nuvoton EK Root Certificate 2111</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Nuvoton+EK+Root+Certificate+2111&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fsecurity%2FNTC-TPM-EK-Cert%2FNuvoton%2520TPM%2520Root%2520CA%25202111.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-129"><span class="mw-cite-backlink"><b><a href="#cite_ref-129">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://www.nuvoton.com/security/NTC-TPM-EK-Cert/Nuvoton%20TPM%20Root%20CA%202112.cer"><i>Nuvoton EK Root Certificate 2112</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Nuvoton+EK+Root+Certificate+2112&amp;rft_id=https%3A%2F%2Fwww.nuvoton.com%2Fsecurity%2FNTC-TPM-EK-Cert%2FNuvoton%2520TPM%2520Root%2520CA%25202112.cer&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-130"><span class="mw-cite-backlink"><b><a href="#cite_ref-130">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/gstpmroot.crt"><i>ST Micro EK GlobalSign Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+GlobalSign+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fgstpmroot.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-131"><span class="mw-cite-backlink"><b><a href="#cite_ref-131">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekroot.crt"><i>ST Micro EK Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Root+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekroot.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-132"><span class="mw-cite-backlink"><b><a href="#cite_ref-132">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekint01.crt"><i>ST Micro EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekint01.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-133"><span class="mw-cite-backlink"><b><a href="#cite_ref-133">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekint02.crt"><i>ST Micro EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekint02.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-134"><span class="mw-cite-backlink"><b><a href="#cite_ref-134">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekint03.crt"><i>ST Micro EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekint03.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-135"><span class="mw-cite-backlink"><b><a href="#cite_ref-135">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekint04.crt"><i>ST Micro EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekint04.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-136"><span class="mw-cite-backlink"><b><a href="#cite_ref-136">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/stmtpmekint05.crt"><i>ST Micro EK Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Fstmtpmekint05.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-137"><span class="mw-cite-backlink"><b><a href="#cite_ref-137">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/cacert/tpmeccroot.crt"><i>ST Micro EK GlobalSign ECC Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+GlobalSign+ECC+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fcacert%2Ftpmeccroot.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-138"><span class="mw-cite-backlink"><b><a href="#cite_ref-138">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/stmtpmeccroot01.crt"><i>ST Micro EK ECC Root Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+ECC+Root+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fstmtpmeccroot01.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-139"><span class="mw-cite-backlink"><b><a href="#cite_ref-139">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://secure.globalsign.com/stmtpmeccint01.crt"><i>ST Micro EK ECC Intermediate Certificate</i></a></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=ST+Micro+EK+ECC+Intermediate+Certificate&amp;rft_id=https%3A%2F%2Fsecure.globalsign.com%2Fstmtpmeccint01.crt&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-140"><span class="mw-cite-backlink"><b><a href="#cite_ref-140">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/tpm2-software/tpm2-tss"><i>tpm2-software/tpm2-tss</i></a>, Linux TPM2 &amp; TSS2 Software, 2020-11-18, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201112024052/https://github.com/tpm2-software/tpm2-tss">archived</a> from the original on November 12, 2020<span class="reference-accessdate">, retrieved <span class="nowrap">2020-11-20</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=tpm2-software%2Ftpm2-tss&amp;rft.pub=Linux+TPM2+%26+TSS2+Software&amp;rft.date=2020-11-18&amp;rft_id=https%3A%2F%2Fgithub.com%2Ftpm2-software%2Ftpm2-tss&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-123-141"><span class="mw-cite-backlink"><b><a href="#cite_ref-123_141-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/Fraunhofer-SIT/charra"><i>Fraunhofer-SIT/charra</i></a>, Fraunhofer Institute for Secure Information Technology, 2020-08-26, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201029163950/https://github.com/Fraunhofer-SIT/charra">archived</a> from the original on October 29, 2020<span class="reference-accessdate">, retrieved <span class="nowrap">2020-11-20</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Fraunhofer-SIT%2Fcharra&amp;rft.pub=Fraunhofer+Institute+for+Secure+Information+Technology&amp;rft.date=2020-08-26&amp;rft_id=https%3A%2F%2Fgithub.com%2FFraunhofer-SIT%2Fcharra&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-124-143"><span class="mw-cite-backlink"><b><a href="#cite_ref-124_143-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAG" class="citation web cs1">AG, Infineon Technologies. <a rel="nofollow" class="external text" href="https://www.infineon.com/cms/de/product/evaluation-boards/optiga-tpm-sli9670-a-tpm/">"OPTIGA™ TPM SLI 9670 A-TPM board - Infineon Technologies"</a>. <i>www.infineon.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200806175036/https://www.infineon.com/cms/de/product/evaluation-boards/optiga-tpm-sli9670-a-tpm/">Archived</a> from the original on August 6, 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">2020-11-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.infineon.com&amp;rft.atitle=OPTIGA%E2%84%A2+TPM+SLI+9670+A-TPM+board+-+Infineon+Technologies&amp;rft.aulast=AG&amp;rft.aufirst=Infineon+Technologies&amp;rft_id=https%3A%2F%2Fwww.infineon.com%2Fcms%2Fde%2Fproduct%2Fevaluation-boards%2Foptiga-tpm-sli9670-a-tpm%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-145"><span class="mw-cite-backlink"><b><a href="#cite_ref-145">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sourceforge.net/projects/ibmtpm20tss">"IBM TSS for TPM 2.0"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210629081044/https://sourceforge.net/projects/ibmtpm20tss/">Archived</a> from the original on June 29, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">June 2,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=IBM+TSS+for+TPM+2.0&amp;rft_id=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fibmtpm20tss&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-146"><span class="mw-cite-backlink"><b><a href="#cite_ref-146">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/kgoldman/ibmtss">"IBM TSS for TPM 2.0"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210629081026/https://github.com/kgoldman/ibmtss">Archived</a> from the original on June 29, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">June 2,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=IBM+TSS+for+TPM+2.0&amp;rft_id=https%3A%2F%2Fgithub.com%2Fkgoldman%2Fibmtss&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-147"><span class="mw-cite-backlink"><b><a href="#cite_ref-147">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://sourceforge.net/projects/ibmtpm20acs">"IBM TPM Attestation Client Server"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210302042105/https://sourceforge.net/projects/ibmtpm20acs/">Archived</a> from the original on March 2, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">November 20,</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=IBM+TPM+Attestation+Client+Server&amp;rft_id=https%3A%2F%2Fsourceforge.net%2Fprojects%2Fibmtpm20acs&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-148"><span class="mw-cite-backlink"><b><a href="#cite_ref-148">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://github.com/kgoldman/acs">"IBM TPM Attestation Client Server"</a>. <i><a href="/wiki/GitHub" title="GitHub">GitHub</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210629081029/https://github.com/kgoldman/acs">Archived</a> from the original on June 29, 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">June 2,</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GitHub&amp;rft.atitle=IBM+TPM+Attestation+Client+Server&amp;rft_id=https%3A%2F%2Fgithub.com%2Fkgoldman%2Facs&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-149"><span class="mw-cite-backlink"><b><a href="#cite_ref-149">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/google/go-tpm"><i>google/go-tpm</i></a>, 2020-11-18, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201214230835/https://github.com/google/go-tpm">archived</a> from the original on December 14, 2020<span class="reference-accessdate">, retrieved <span class="nowrap">2020-11-20</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=google%2Fgo-tpm&amp;rft.date=2020-11-18&amp;rft_id=https%3A%2F%2Fgithub.com%2Fgoogle%2Fgo-tpm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-150"><span class="mw-cite-backlink"><b><a href="#cite_ref-150">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/google/go-attestation"><i>google/go-attestation</i></a>, 2020-11-19, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201119091913/https://github.com/google/go-attestation">archived</a> from the original on November 19, 2020<span class="reference-accessdate">, retrieved <span class="nowrap">2020-11-20</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=google%2Fgo-attestation&amp;rft.date=2020-11-19&amp;rft_id=https%3A%2F%2Fgithub.com%2Fgoogle%2Fgo-attestation&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-151"><span class="mw-cite-backlink"><b><a href="#cite_ref-151">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/wolfSSL/wolfTPM"><i>wolfSSL/wolfTPM</i></a>, wolfSSL, 2020-11-18, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20201120123044/https://github.com/wolfSSL/wolfTPM">archived</a> from the original on November 20, 2020<span class="reference-accessdate">, retrieved <span class="nowrap">2020-11-20</span></span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=wolfSSL%2FwolfTPM&amp;rft.pub=wolfSSL&amp;rft.date=2020-11-18&amp;rft_id=https%3A%2F%2Fgithub.com%2FwolfSSL%2FwolfTPM&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> <li id="cite_note-152"><span class="mw-cite-backlink"><b><a href="#cite_ref-152">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation cs2"><a rel="nofollow" class="external text" href="https://github.com/Microsoft/TSS.MSR"><i>TSS.MSR</i></a>, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210626071123/https://github.com/microsoft/TSS.MSR/">archived</a> from the original on June 26, 2021<span class="reference-accessdate">, retrieved <span class="nowrap">June 17,</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=TSS.MSR&amp;rft_id=https%3A%2F%2Fgithub.com%2FMicrosoft%2FTSS.MSR&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3ATrusted+Platform+Module" class="Z3988"></span></span> </li> </ol></div> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><style data-mw-deduplicate="TemplateStyles:r886047488">.mw-parser-output .nobold{font-weight:normal}</style></div><div role="navigation" class="navbox" aria-labelledby="ISO_standards_by_standard_number" style="padding:3px"><table class="nowraplinks hlist mw-collapsible mw-collapsed navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:ISO_standards" title="Template:ISO standards"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:ISO_standards" title="Template talk:ISO standards"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:ISO_standards" title="Special:EditPage/Template:ISO standards"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="ISO_standards_by_standard_number" style="font-size:114%;margin:0 4em"><a href="/wiki/International_Organization_for_Standardization" title="International Organization for Standardization">ISO</a> standards <span class="nobold">by standard number</span></div></th></tr><tr><td class="navbox-abovebelow" colspan="2"><div>List of <a href="/wiki/List_of_ISO_standards" title="List of ISO standards">ISO standards</a> – <a href="/wiki/List_of_ISO_romanizations" title="List of ISO romanizations">ISO romanizations</a> – <a href="/wiki/List_of_IEC_standards" title="List of IEC standards">IEC standards</a></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">1–9999</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/ISO_1" title="ISO 1">1</a></li> <li><a href="/wiki/ISO_2" title="ISO 2">2</a></li> <li><a href="/wiki/Renard_series" title="Renard series">3</a></li> <li><a href="/wiki/ISO_4" title="ISO 4">4</a></li> <li><a href="/wiki/Film_speed" title="Film speed">6</a></li> <li><a href="/wiki/British_Standard_Pipe" title="British Standard Pipe">7</a></li> <li><a href="/wiki/ISO_9" title="ISO 9">9</a></li> <li><a href="/wiki/A440_(pitch_standard)" title="A440 (pitch standard)">16</a></li> <li><a href="/wiki/Renard_series" title="Renard series">17</a></li> <li><a href="/wiki/ISO_31" title="ISO 31">31</a> <ul><li><a href="/wiki/ISO_31-0" title="ISO 31-0">-0</a></li> <li><a href="/wiki/ISO_31-1" title="ISO 31-1">-1</a></li> <li><a href="/wiki/ISO_31-3" title="ISO 31-3">-3</a></li> <li><a href="/wiki/ISO_31-4" title="ISO 31-4">-4</a></li> <li><a href="/wiki/ISO_31-5" title="ISO 31-5">-5</a></li> <li><a href="/wiki/ISO_31-6" title="ISO 31-6">-6</a></li> <li><a href="/wiki/ISO_31-7" title="ISO 31-7">-7</a></li> <li><a href="/wiki/ISO_31-8" title="ISO 31-8">-8</a></li> <li><a href="/wiki/ISO_31-9" class="mw-redirect" title="ISO 31-9">-9</a></li> <li><a href="/wiki/ISO_31-10" title="ISO 31-10">-10</a></li> <li><a href="/wiki/ISO_31-11" title="ISO 31-11">-11</a></li> <li><a href="/wiki/ISO_31-12" class="mw-redirect" title="ISO 31-12">-12</a></li> <li><a href="/wiki/ISO_31-13" class="mw-redirect" title="ISO 31-13">-13</a></li></ul></li> <li><a href="/wiki/ISO_metric_screw_thread" title="ISO metric screw thread">68-1</a></li> <li><a href="/wiki/ISO_128" title="ISO 128">128</a></li> <li><a href="/wiki/ISO_216" title="ISO 216">216</a></li> <li><a href="/wiki/ISO_217" title="ISO 217">217</a></li> <li><a href="/wiki/Equal-loudness_contour" title="Equal-loudness contour">226</a></li> <li><a href="/wiki/British_Standard_Pipe" title="British Standard Pipe">228</a></li> <li><a href="/wiki/ISO_233" title="ISO 233">233</a></li> <li><a href="/wiki/ISO_259" title="ISO 259">259</a></li> <li><a href="/wiki/ISO_metric_screw_thread" title="ISO metric screw thread">261</a></li> <li><a href="/wiki/ISO_metric_screw_thread" title="ISO metric screw thread">262</a></li> <li><a href="/wiki/Kappa_number" title="Kappa number">302</a></li> <li><a href="/wiki/Vicat_softening_point" title="Vicat softening point">306</a></li> <li><a href="/wiki/Hazard_symbol#Ionizing_radiation_symbol" title="Hazard symbol">361</a></li> <li><a href="/wiki/Power_take-off" title="Power take-off">500</a></li> <li><a href="/wiki/Hot_shoe" title="Hot shoe">518</a></li> <li><a href="/wiki/Prontor-Compur" title="Prontor-Compur">519</a></li> <li><a href="/wiki/ISO_639" title="ISO 639">639</a> <ul><li><a href="/wiki/ISO_639-1" title="ISO 639-1">-1</a></li> <li><a href="/wiki/ISO_639-2" title="ISO 639-2">-2</a></li> <li><a href="/wiki/ISO_639-3" title="ISO 639-3">-3</a></li> <li><a href="/wiki/ISO_639-5" title="ISO 639-5">-5</a></li> <li><a href="/wiki/ISO_639-6" title="ISO 639-6">-6</a></li></ul></li> <li><a href="/wiki/ISO/IEC_646" title="ISO/IEC 646">646</a></li> <li><a href="/wiki/ISO_657" title="ISO 657">657</a></li> <li><a href="/wiki/ISO_668" title="ISO 668">668</a></li> <li><a href="/wiki/ISO_690" title="ISO 690">690</a></li> <li><a href="/wiki/ISO_704" title="ISO 704">704</a></li> <li><a href="/wiki/ISO_732" title="ISO 732">732</a></li> <li><a href="/wiki/Antimagnetic_watch" title="Antimagnetic watch">764</a></li> <li><a href="/wiki/Hole_punch" title="Hole punch">838</a></li> <li><a href="/wiki/ISO_843" title="ISO 843">843</a></li> <li><a href="/wiki/ISO_860" title="ISO 860">860</a></li> <li><a href="/wiki/ISO_898" title="ISO 898">898</a></li> <li><a href="/wiki/ISO_965" title="ISO 965">965</a></li> <li><a href="/wiki/ISO_999" title="ISO 999">999</a></li> <li><a href="/wiki/ISO_1000" title="ISO 1000">1000</a></li> <li><a href="/wiki/Magnetic_ink_character_recognition" title="Magnetic ink character recognition">1004</a></li> <li><a href="/wiki/135_film" title="135 film">1007</a></li> <li><a href="/wiki/OCR-A" title="OCR-A">1073-1</a></li> <li><a href="/wiki/OCR-B" title="OCR-B">1073-2</a></li> <li><a href="/wiki/Longitudinal_redundancy_check" title="Longitudinal redundancy check">1155</a></li> <li><a href="/wiki/Shock-resistant_watch#ISO_1413_shock-resistant_standard" title="Shock-resistant watch">1413</a></li> <li><a href="/wiki/ALGOL_60" title="ALGOL 60">1538</a></li> <li><a href="/wiki/ISO_1629" title="ISO 1629">1629</a></li> <li><a href="/wiki/ISO_1745" title="ISO 1745">1745</a></li> <li><a href="/wiki/COBOL" title="COBOL">1989</a></li> <li><a href="/wiki/ISO_2014" title="ISO 2014">2014</a></li> <li><a href="/wiki/ISO_2015" title="ISO 2015">2015</a></li> <li><a href="/wiki/ISO/IEC_2022" title="ISO/IEC 2022">2022</a></li> <li><a href="/wiki/ISO_2033" title="ISO 2033">2033</a></li> <li><a href="/wiki/ISO_2047" title="ISO 2047">2047</a></li> <li><a href="/wiki/ISBN" title="ISBN">2108</a></li> <li><a href="/wiki/ISO_2145" title="ISO 2145">2145</a></li> <li><a href="/wiki/ISO_2146" title="ISO 2146">2146</a></li> <li><a href="/wiki/Film_speed" title="Film speed">2240</a></li> <li><a href="/wiki/Water_Resistant_mark" title="Water Resistant mark">2281</a></li> <li><a href="/wiki/International_Standard_Atmosphere" title="International Standard Atmosphere">2533</a></li> <li><a href="/wiki/ISO_2709" title="ISO 2709">2709</a></li> <li><a href="/wiki/ISO_2711" title="ISO 2711">2711</a></li> <li><a href="/wiki/Film_speed" title="Film speed">2720</a></li> <li><a href="/wiki/ISO_2788" title="ISO 2788">2788</a></li> <li><a href="/wiki/ISO_2848" title="ISO 2848">2848</a></li> <li><a href="/wiki/ISO_2852" title="ISO 2852">2852</a></li> <li><a href="/wiki/ISO_2921" title="ISO 2921">2921</a></li> <li><a href="/wiki/126_film" title="126 film">3029</a></li> <li><a href="/wiki/ISO_3103" title="ISO 3103">3103</a></li> <li><a href="/wiki/ISO_3166" title="ISO 3166">3166</a> <ul><li><a href="/wiki/ISO_3166-1" title="ISO 3166-1">-1</a></li> <li><a href="/wiki/ISO_3166-2" title="ISO 3166-2">-2</a></li> <li><a href="/wiki/ISO_3166-3" title="ISO 3166-3">-3</a></li></ul></li> <li><a href="/wiki/International_Standard_Serial_Number" class="mw-redirect" title="International Standard Serial Number">3297</a></li> <li><a href="/wiki/ISO_3307" title="ISO 3307">3307</a></li> <li><a href="/wiki/O-ring" title="O-ring">3601</a></li> <li><a href="/wiki/Kunrei-shiki_romanization" title="Kunrei-shiki romanization">3602</a></li> <li><a href="/wiki/ISO_3864" title="ISO 3864">3864</a></li> <li><a href="/wiki/International_Standard_Recording_Code" title="International Standard Recording Code">3901</a></li> <li><a href="/wiki/FDI_World_Dental_Federation_notation" title="FDI World Dental Federation notation">3950</a></li> <li><a href="/wiki/ISO_3977" title="ISO 3977">3977</a></li> <li><a href="/wiki/ISO_4031" title="ISO 4031">4031</a></li> <li><a href="/wiki/ISO_4157" title="ISO 4157">4157</a></li> <li><a href="/wiki/ISO_4165" title="ISO 4165">4165</a></li> <li><a href="/wiki/ISO_4217" title="ISO 4217">4217</a></li> <li><a href="/wiki/ISO/IEC_4909" title="ISO/IEC 4909">4909</a></li> <li><a href="/wiki/ISO/IEC_5218" title="ISO/IEC 5218">5218</a></li> <li><a href="/wiki/ISO_5426" title="ISO 5426">5426</a></li> <li><a href="/wiki/ISO_5427" title="ISO 5427">5427</a></li> <li><a href="/wiki/ISO_5428" title="ISO 5428">5428</a></li> <li><a href="/wiki/Accuracy_and_precision" title="Accuracy and precision">5725</a></li> <li><a href="/wiki/ISO_5775" title="ISO 5775">5775</a></li> <li><a href="/wiki/ISO_5776" title="ISO 5776">5776</a></li> <li><a href="/wiki/Film_speed" title="Film speed">5800</a></li> <li><a href="/wiki/Flowchart" title="Flowchart">5807</a></li> <li><a href="/wiki/ISO_5964" title="ISO 5964">5964</a></li> <li><a href="/wiki/International_Securities_Identification_Number" title="International Securities Identification Number">6166</a></li> <li><a href="/wiki/ISO_6344" title="ISO 6344">6344</a></li> <li><a href="/wiki/ISO_6346" title="ISO 6346">6346</a></li> <li><a href="/wiki/Minimal_BASIC" title="Minimal BASIC">6373</a></li> <li><a href="/wiki/ISO_6385" title="ISO 6385">6385</a></li> <li><a href="/wiki/Water_Resistant_mark" title="Water Resistant mark">6425</a></li> <li><a href="/wiki/ANSI_escape_code" title="ANSI escape code">6429</a></li> <li><a href="/wiki/ISO_6438" title="ISO 6438">6438</a></li> <li><a href="/wiki/ISO/IEC_6523" title="ISO/IEC 6523">6523</a></li> <li><a href="/wiki/ISO_6709" title="ISO 6709">6709</a></li> <li><a href="/wiki/ISO_6943" title="ISO 6943">6943</a></li> <li><a href="/wiki/ISO_7001" title="ISO 7001">7001</a></li> <li><a href="/wiki/ISO_7002" title="ISO 7002">7002</a></li> <li><a href="/wiki/ISO_7010" title="ISO 7010">7010</a></li> <li><a href="/wiki/ISO_7027" title="ISO 7027">7027</a></li> <li><a href="/wiki/ISO/IEC_7064" title="ISO/IEC 7064">7064</a></li> <li><a href="/wiki/Pinyin" title="Pinyin">7098</a></li> <li><a href="/wiki/Pascal_(programming_language)" title="Pascal (programming language)">7185</a></li> <li><a href="/wiki/ISO_7200" title="ISO 7200">7200</a></li> <li><a href="/wiki/OSI_model" title="OSI model">7498</a> <ul><li><a href="/wiki/OSI_model" title="OSI model">-1</a></li></ul></li> <li><a href="/wiki/ISO_7637" title="ISO 7637">7637</a></li> <li><a href="/wiki/ISO_7736" title="ISO 7736">7736</a></li> <li><a href="/wiki/ISO/IEC_7810" title="ISO/IEC 7810">7810</a></li> <li><a href="/wiki/ISO/IEC_7811" title="ISO/IEC 7811">7811</a></li> <li><a href="/wiki/ISO/IEC_7812" title="ISO/IEC 7812">7812</a></li> <li><a href="/wiki/ISO/IEC_7813" title="ISO/IEC 7813">7813</a></li> <li><a href="/wiki/ISO/IEC_7816" title="ISO/IEC 7816">7816</a></li> <li><a href="/wiki/Graphical_Kernel_System" title="Graphical Kernel System">7942</a></li> <li><a href="/wiki/ISO_8000" title="ISO 8000">8000</a></li> <li><a href="/wiki/On-board_diagnostics" title="On-board diagnostics">8093</a></li> <li><a href="/wiki/ISO_8178" title="ISO 8178">8178</a></li> <li><a href="/wiki/Fuel_oil" title="Fuel oil">8217</a></li> <li><a href="/wiki/ISO_8373" class="mw-redirect" title="ISO 8373">8373</a></li> <li><a href="/wiki/ISO_8501-1" title="ISO 8501-1">8501-1</a></li> <li><a href="/wiki/FTAM" title="FTAM">8571</a></li> <li><a href="/wiki/ISO_8583" title="ISO 8583">8583</a></li> <li><a href="/wiki/ISO_8601" title="ISO 8601">8601</a></li> <li><a href="/wiki/Open_Document_Architecture" title="Open Document Architecture">8613</a></li> <li><a href="/wiki/Computer_Graphics_Metafile" title="Computer Graphics Metafile">8632</a></li> <li><a href="/wiki/Graphical_Kernel_System" title="Graphical Kernel System">8651</a></li> <li><a href="/wiki/ISO/IEC_8652" title="ISO/IEC 8652">8652</a></li> <li><a href="/wiki/ISO_8691" title="ISO 8691">8691</a></li> <li><a href="/wiki/Graphical_Kernel_System" title="Graphical Kernel System">8805/8806</a></li> <li><a href="/wiki/Language_Of_Temporal_Ordering_Specification" class="mw-redirect" title="Language Of Temporal Ordering Specification">8807</a></li> <li><a href="/wiki/Fuse_(automotive)" class="mw-redirect" title="Fuse (automotive)">8820-5</a></li> <li><a href="/wiki/ISO/IEC_8859" title="ISO/IEC 8859">8859</a> <ul><li><a href="/wiki/ISO/IEC_8859-1" title="ISO/IEC 8859-1">-1</a></li> <li><a href="/wiki/ISO/IEC_8859-2" title="ISO/IEC 8859-2">-2</a></li> <li><a href="/wiki/ISO/IEC_8859-3" title="ISO/IEC 8859-3">-3</a></li> <li><a href="/wiki/ISO/IEC_8859-4" title="ISO/IEC 8859-4">-4</a></li> <li><a href="/wiki/ISO/IEC_8859-5" title="ISO/IEC 8859-5">-5</a></li> <li><a href="/wiki/ISO/IEC_8859-6" title="ISO/IEC 8859-6">-6</a></li> <li><a href="/wiki/ISO/IEC_8859-7" title="ISO/IEC 8859-7">-7</a></li> <li><a href="/wiki/ISO/IEC_8859-8" title="ISO/IEC 8859-8">-8</a></li> <li><a href="/wiki/ISO-8859-8-I" title="ISO-8859-8-I">-8-I</a></li> <li><a href="/wiki/ISO/IEC_8859-9" title="ISO/IEC 8859-9">-9</a></li> <li><a href="/wiki/ISO/IEC_8859-10" title="ISO/IEC 8859-10">-10</a></li> <li><a href="/wiki/ISO/IEC_8859-11" title="ISO/IEC 8859-11">-11</a></li> <li><a href="/wiki/ISO/IEC_8859-12" class="mw-redirect" title="ISO/IEC 8859-12">-12</a></li> <li><a href="/wiki/ISO/IEC_8859-13" title="ISO/IEC 8859-13">-13</a></li> <li><a href="/wiki/ISO/IEC_8859-14" title="ISO/IEC 8859-14">-14</a></li> <li><a href="/wiki/ISO/IEC_8859-15" title="ISO/IEC 8859-15">-15</a></li> <li><a href="/wiki/ISO/IEC_8859-16" title="ISO/IEC 8859-16">-16</a></li></ul></li> <li><a href="/wiki/Standard_Generalized_Markup_Language" title="Standard Generalized Markup Language">8879</a></li> <li><a href="/wiki/ISO_9000" class="mw-redirect" title="ISO 9000">9000/9001</a></li> <li><a href="/wiki/ASMO_449" title="ASMO 449">9036</a></li> <li><a href="/wiki/SQL" title="SQL">9075</a></li> <li><a href="/wiki/ISO/IEC_9126" title="ISO/IEC 9126">9126</a></li> <li><a href="/wiki/On-board_diagnostics" title="On-board diagnostics">9141</a></li> <li><a href="/wiki/Salt_spray_test" title="Salt spray test">9227</a></li> <li><a href="/wiki/ISO_9241" title="ISO 9241">9241</a></li> <li><a href="/wiki/File_Allocation_Table" title="File Allocation Table">9293</a></li> <li><a href="/wiki/Fiber_Distributed_Data_Interface" title="Fiber Distributed Data Interface">9314</a></li> <li><a href="/wiki/ISO_9362" title="ISO 9362">9362</a></li> <li><a href="/wiki/Shoe_size" title="Shoe size">9407</a></li> <li><a href="/wiki/CHILL" title="CHILL">9496</a></li> <li><a href="/wiki/Manufacturing_Message_Specification" title="Manufacturing Message Specification">9506</a></li> <li><a href="/wiki/ISO/IEC_9529" title="ISO/IEC 9529">9529</a></li> <li><a href="/wiki/ISO_9564" title="ISO 9564">9564</a></li> <li><a href="/wiki/PHIGS" title="PHIGS">9592/9593</a></li> <li><a href="/wiki/X.500" title="X.500">9594</a></li> <li><a href="/wiki/ISO_9660" title="ISO 9660">9660</a></li> <li><a href="/wiki/ISO/IEC_9797-1" title="ISO/IEC 9797-1">9797-1</a></li> <li><a href="/wiki/ISO_9897" title="ISO 9897">9897</a></li> <li><a href="/wiki/ANSI_C" title="ANSI C">9899</a></li> <li><a href="/wiki/POSIX" title="POSIX">9945</a></li> <li><a href="/wiki/Romanization_of_Georgian" title="Romanization of Georgian">9984</a></li> <li><a href="/wiki/Romanization_of_Armenian" title="Romanization of Armenian">9985</a></li> <li><a href="/wiki/ISO/IEC_9995" title="ISO/IEC 9995">9995</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">10000–19999</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/ISO_10006" title="ISO 10006">10006</a></li> <li><a href="/wiki/ISO_10007" title="ISO 10007">10007</a></li> <li><a href="/wiki/ISO/IEC_10116" title="ISO/IEC 10116">10116</a></li> <li><a href="/wiki/Whirlpool_(hash_function)" title="Whirlpool (hash function)">10118-3</a></li> <li><a href="/wiki/ISO_10160" title="ISO 10160">10160</a></li> <li><a href="/wiki/ISO_10161" title="ISO 10161">10161</a></li> <li><a href="/wiki/Guidelines_for_the_Definition_of_Managed_Objects" title="Guidelines for the Definition of Managed Objects">10165</a></li> <li><a href="/wiki/Document_Style_Semantics_and_Specification_Language" title="Document Style Semantics and Specification Language">10179</a></li> <li><a href="/wiki/Pascal_(programming_language)#ISO/IEC_10206:1990_Extended_Pascal" title="Pascal (programming language)">10206</a></li> <li><a href="/wiki/ISO_10218" title="ISO 10218">10218</a></li> <li><a href="/wiki/Full_BASIC" title="Full BASIC">10279</a></li> <li><a href="/wiki/ISO_10303" title="ISO 10303">10303</a> <ul><li><a href="/wiki/EXPRESS_(data_modeling_language)" title="EXPRESS (data modeling language)">-11</a></li> <li><a href="/wiki/ISO_10303-21" title="ISO 10303-21">-21</a></li> <li><a href="/wiki/ISO_10303-22" title="ISO 10303-22">-22</a></li> <li><a href="/wiki/ISO_10303-28" title="ISO 10303-28">-28</a></li> <li><a href="/wiki/STEP-NC" title="STEP-NC">-238</a></li></ul></li> <li><a href="/wiki/Market_Identifier_Code" title="Market Identifier Code">10383</a></li> <li><a href="/wiki/ArmSCII" title="ArmSCII">10585</a></li> <li><a href="/wiki/IS-IS" title="IS-IS">10589</a></li> <li><a href="/wiki/ISO_10628" title="ISO 10628">10628</a></li> <li><a href="/wiki/Universal_Coded_Character_Set" title="Universal Coded Character Set">10646</a></li> <li><a href="/wiki/Torx" title="Torx">10664</a></li> <li><a href="/wiki/RM-ODP" title="RM-ODP">10746</a></li> <li><a href="/wiki/Multibus" title="Multibus">10861</a></li> <li><a href="/wiki/International_Standard_Music_Number" title="International Standard Music Number">10957</a></li> <li><a href="/wiki/ISO_10962" title="ISO 10962">10962</a></li> <li><a href="/wiki/ISO/IEC_10967" title="ISO/IEC 10967">10967</a></li> <li><a href="/wiki/ISO/IEEE_11073" title="ISO/IEEE 11073">11073</a></li> <li><a href="/wiki/ISO_11170" title="ISO 11170">11170</a></li> <li><a href="/wiki/MPEG-1" title="MPEG-1">11172</a></li> <li><a href="/wiki/ISO/IEC_11179" title="ISO/IEC 11179">11179</a></li> <li><a href="/wiki/ISO/IEC_11404" title="ISO/IEC 11404">11404</a></li> <li><a href="/wiki/JBIG" title="JBIG">11544</a></li> <li><a href="/wiki/ISO_11783" title="ISO 11783">11783</a></li> <li><a href="/wiki/ISO_11784_and_ISO_11785" title="ISO 11784 and ISO 11785">11784</a></li> <li><a href="/wiki/ISO_11784_and_ISO_11785" title="ISO 11784 and ISO 11785">11785</a></li> <li><a href="/wiki/ISO/IEC_11801" title="ISO/IEC 11801">11801</a></li> <li><a class="mw-selflink selflink">11889</a></li> <li><a href="/wiki/CAN_bus#CAN_lower-layer_standards" title="CAN bus">11898</a></li> <li><a href="/wiki/ISO_11940" title="ISO 11940">11940</a> (<a href="/wiki/ISO_11940-2" title="ISO 11940-2">-2</a>)</li> <li><a href="/wiki/ISO/TR_11941" title="ISO/TR 11941">11941</a></li> <li><a href="/wiki/ISO/TR_11941" title="ISO/TR 11941">11941 (TR)</a></li> <li><a href="/wiki/ISO_11992" title="ISO 11992">11992</a></li> <li><a href="/wiki/ISO_12006" title="ISO 12006">12006</a></li> <li><a href="/wiki/DICOM" title="DICOM">12052</a></li> <li><a href="/wiki/ISO/IEC_TR_12182" title="ISO/IEC TR 12182">12182</a></li> <li><a href="/wiki/ISO/IEC_12207" title="ISO/IEC 12207">12207</a></li> <li><a href="/wiki/TIFF/EP" title="TIFF/EP">12234-2</a></li> <li><a href="/wiki/Linguistic_categories#ISO_12620_(ISO_TC37_Data_Category_Registry,_ISOcat)" title="Linguistic categories">12620</a></li> <li><a href="/wiki/Prolog" title="Prolog">13211</a> <ul><li><a href="/wiki/Prolog" title="Prolog">-1</a></li> <li><a href="/wiki/Prolog" title="Prolog">-2</a></li></ul></li> <li><a href="/wiki/Isofix" title="Isofix">13216</a></li> <li><a href="/wiki/Topic_map" title="Topic map">13250</a></li> <li><a href="/wiki/ISO_13399" title="ISO 13399">13399</a></li> <li><a href="/wiki/ISO_13406-2" title="ISO 13406-2">13406-2</a></li> <li><a href="/wiki/110_film" title="110 film">13450</a></li> <li><a href="/wiki/ISO_13485" title="ISO 13485">13485</a></li> <li><a href="/wiki/ISO_13490" title="ISO 13490">13490</a></li> <li><a href="/wiki/ISO_13567" title="ISO 13567">13567</a></li> <li><a href="/wiki/Z_notation" title="Z notation">13568</a></li> <li><a href="/wiki/ISO_13584" title="ISO 13584">13584</a></li> <li><a href="/wiki/International_Bank_Account_Number" title="International Bank Account Number">13616</a></li> <li><a href="/wiki/ISLISP" title="ISLISP">13816</a></li> <li><a href="/wiki/MPEG-2" title="MPEG-2">13818</a></li> <li><a href="/wiki/ISO_14000" class="mw-redirect" title="ISO 14000">14000</a></li> <li><a href="/wiki/ISO_14031" title="ISO 14031">14031</a></li> <li><a href="/wiki/ISO_14224" title="ISO 14224">14224</a></li> <li><a href="/wiki/PDF/UA" title="PDF/UA">14289</a></li> <li><a href="/wiki/Horsepower" title="Horsepower">14396</a></li> <li><a href="/wiki/ISO/IEC_14443" title="ISO/IEC 14443">14443</a></li> <li><a href="/wiki/MPEG-4" title="MPEG-4">14496</a> <ul><li><a href="/wiki/MPEG-4_Part_2" title="MPEG-4 Part 2">-2</a></li> <li><a href="/wiki/MPEG-4_Part_3" title="MPEG-4 Part 3">-3</a></li> <li><a href="/wiki/Delivery_Multimedia_Integration_Framework" title="Delivery Multimedia Integration Framework">-6</a></li> <li><a href="/wiki/Advanced_Video_Coding" title="Advanced Video Coding">-10</a></li> <li><a href="/wiki/MPEG-4_Part_11" title="MPEG-4 Part 11">-11</a></li> <li><a href="/wiki/ISO_base_media_file_format" title="ISO base media file format">-12</a></li> <li><a href="/wiki/MP4_file_format" title="MP4 file format">-14</a></li> <li><a href="/wiki/MP4_file_format" title="MP4 file format">-17</a></li> <li><a href="/wiki/MP4_file_format" title="MP4 file format">-20</a></li></ul></li> <li><a href="/wiki/ISO_14617" title="ISO 14617">14617</a></li> <li><a href="/wiki/ISO_14644" title="ISO 14644">14644</a></li> <li><a href="/wiki/STEP-NC" title="STEP-NC">14649</a></li> <li><a href="/wiki/ISO/IEC_14651" title="ISO/IEC 14651">14651</a></li> <li><a href="/wiki/ISO_14698" title="ISO 14698">14698</a></li> <li><a href="/wiki/Software_maintenance" title="Software maintenance">14764</a></li> <li><a href="/wiki/C%2B%2B" title="C++">14882</a></li> <li><a href="/wiki/ISO_14971" title="ISO 14971">14971</a></li> <li><a href="/wiki/ISO_15022" title="ISO 15022">15022</a></li> <li><a href="/wiki/ISO_15189" title="ISO 15189">15189</a></li> <li><a href="/wiki/ISO/IEC_15288" title="ISO/IEC 15288">15288</a></li> <li><a href="/wiki/Ada_Semantic_Interface_Specification" title="Ada Semantic Interface Specification">15291</a></li> <li><a href="/wiki/ISO_15398" title="ISO 15398">15398</a></li> <li><a href="/wiki/Common_Criteria" title="Common Criteria">15408</a></li> <li><a href="/wiki/JPEG_2000" title="JPEG 2000">15444</a> <ul><li><a href="/wiki/Motion_JPEG_2000" title="Motion JPEG 2000">-3</a></li> <li><a href="/wiki/JPIP" title="JPIP">-9</a></li></ul></li> <li><a href="/wiki/HTML" title="HTML">15445</a></li> <li><a href="/wiki/PDF417" title="PDF417">15438</a></li> <li><a href="/wiki/ISO/IEC_15504" title="ISO/IEC 15504">15504</a></li> <li><a href="/wiki/International_Standard_Identifier_for_Libraries_and_Related_Organizations" title="International Standard Identifier for Libraries and Related Organizations">15511</a></li> <li><a href="/wiki/ISO_15686" title="ISO 15686">15686</a></li> <li><a href="/wiki/ISO/IEC_15693" title="ISO/IEC 15693">15693</a></li> <li><a href="/wiki/International_Standard_Audiovisual_Number" title="International Standard Audiovisual Number">15706</a> <ul><li><a href="/wiki/International_Standard_Audiovisual_Number" title="International Standard Audiovisual Number">-2</a></li></ul></li> <li><a href="/wiki/International_Standard_Musical_Work_Code" title="International Standard Musical Work Code">15707</a></li> <li><a href="/wiki/ISO/IEC_15897" title="ISO/IEC 15897">15897</a></li> <li><a href="/wiki/ISO_15919" title="ISO 15919">15919</a></li> <li><a href="/wiki/ISO_15924" title="ISO 15924">15924</a></li> <li><a href="/wiki/ISO_15926" title="ISO 15926">15926</a></li> <li><a href="/wiki/ISO_15926_WIP" title="ISO 15926 WIP">15926 WIP</a></li> <li><a href="/wiki/PDF/X" title="PDF/X">15930</a></li> <li><a href="/wiki/MPEG-7" title="MPEG-7">15938</a></li> <li><a href="/wiki/MaxiCode" title="MaxiCode">16023</a></li> <li><a href="/wiki/ECMAScript" title="ECMAScript">16262</a></li> <li><a href="/wiki/Quality_function_deployment" title="Quality function deployment">16355-1</a></li> <li><a href="/wiki/Mixed_raster_content" title="Mixed raster content">16485</a></li> <li><a href="/wiki/PDF/VT" title="PDF/VT">16612-2</a></li> <li><a href="/wiki/ISO_16750" title="ISO 16750">16750</a></li> <li><a href="/wiki/IATF_16949" title="IATF 16949">16949 (TS)</a></li> <li><a href="/wiki/ISO/IEC_17024" title="ISO/IEC 17024">17024</a></li> <li><a href="/wiki/ISO/IEC_17025" title="ISO/IEC 17025">17025</a></li> <li><a href="/wiki/ISO_17100" title="ISO 17100">17100</a></li> <li><a href="/wiki/Open_Virtualization_Format" title="Open Virtualization Format">17203</a></li> <li><a href="/wiki/SDMX" title="SDMX">17369</a></li> <li><a href="/wiki/Legal_Entity_Identifier" title="Legal Entity Identifier">17442</a></li> <li><a href="/wiki/COLLADA" title="COLLADA">17506</a></li> <li><a href="/wiki/ISO/IEC_27002" title="ISO/IEC 27002">17799</a></li> <li><a href="/wiki/QR_code" title="QR code">18004</a></li> <li><a href="/wiki/ISO/IEC_18014" title="ISO/IEC 18014">18014</a></li> <li><a href="/wiki/JPEG_XL" title="JPEG XL">18181</a></li> <li><a href="/wiki/ISO_18245" title="ISO 18245">18245</a></li> <li><a href="/wiki/Process_Specification_Language" title="Process Specification Language">18629</a></li> <li><a href="/wiki/Photographic_Activity_Test" title="Photographic Activity Test">18916</a></li> <li><a href="/wiki/PDF/A" title="PDF/A">19005</a></li> <li><a href="/wiki/ISO_19011" title="ISO 19011">19011</a></li> <li><a href="/wiki/ISO_19092-1" class="mw-redirect" title="ISO 19092-1">19092</a> <ul><li><a href="/wiki/ISO_19092-1" class="mw-redirect" title="ISO 19092-1">-1</a></li> <li><a href="/wiki/ISO_19092-2" class="mw-redirect" title="ISO 19092-2">-2</a></li></ul></li> <li><a href="/wiki/ISO_19114" title="ISO 19114">19114</a></li> <li><a href="/wiki/Geospatial_metadata#ISO_19115:_Geographic_information_–_Metadata" title="Geospatial metadata">19115</a></li> <li><a href="/wiki/Simple_Features" title="Simple Features">19125</a></li> <li><a href="/wiki/Geography_Markup_Language#ISO_19136" title="Geography Markup Language">19136</a></li> <li><a href="/wiki/Shoe_size" title="Shoe size">19407</a></li> <li><a href="/wiki/ISO_19439" title="ISO 19439">19439</a></li> <li><a href="/wiki/Common_Object_Request_Broker_Architecture" title="Common Object Request Broker Architecture">19500</a></li> <li><a href="/wiki/Unified_Modeling_Language" title="Unified Modeling Language">19501</a></li> <li><a href="/wiki/Meta-Object_Facility" title="Meta-Object Facility">19502</a></li> <li><a href="/wiki/XML_Metadata_Interchange" title="XML Metadata Interchange">19503</a></li> <li><a href="/wiki/Unified_Modeling_Language" title="Unified Modeling Language">19505</a></li> <li><a href="/wiki/Knowledge_Discovery_Metamodel" title="Knowledge Discovery Metamodel">19506</a></li> <li><a href="/wiki/Object_Constraint_Language" title="Object Constraint Language">19507</a></li> <li><a href="/wiki/Meta-Object_Facility" title="Meta-Object Facility">19508</a></li> <li><a href="/wiki/XML_Metadata_Interchange" title="XML Metadata Interchange">19509</a></li> <li><a href="/wiki/Business_Process_Model_and_Notation" title="Business Process Model and Notation">19510</a></li> <li><a href="/wiki/ISO_19600" title="ISO 19600">19600</a></li> <li><a href="/wiki/ISO/IEC_19752" title="ISO/IEC 19752">19752</a></li> <li><a href="/wiki/RELAX_NG" title="RELAX NG">19757</a></li> <li><a href="/wiki/ISO/IEC_19770" title="ISO/IEC 19770">19770</a></li> <li><a href="/wiki/X3D" title="X3D">19775-1</a></li> <li><a href="/wiki/ISO/IEC_19794-5" title="ISO/IEC 19794-5">19794-5</a></li> <li><a href="/wiki/Cloud_Infrastructure_Management_Interface" title="Cloud Infrastructure Management Interface">19831</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">20000–29999</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/ISO/IEC_20000" title="ISO/IEC 20000">20000</a></li> <li><a href="/wiki/ISO_20022" title="ISO 20022">20022</a></li> <li><a href="/wiki/ISO_20121" title="ISO 20121">20121</a></li> <li><a href="/wiki/ISO_20400" title="ISO 20400">20400</a></li> <li><a href="/wiki/Open_Data_Protocol" title="Open Data Protocol">20802</a></li> <li><a href="/wiki/Han_Xin_code" title="Han Xin code">20830</a></li> <li><a href="/wiki/MPEG-21" title="MPEG-21">21000</a></li> <li><a href="/wiki/ISO_21001" title="ISO 21001">21001</a></li> <li><a href="/wiki/International_Standard_Text_Code" title="International Standard Text Code">21047</a></li> <li><a href="/wiki/JPEG_XS" title="JPEG XS">21122</a></li> <li><a href="/wiki/ISO_21500" title="ISO 21500">21500</a></li> <li><a href="/wiki/ISO/IEC_21827" title="ISO/IEC 21827">21827</a></li> <li><a href="/wiki/ISO_22000" title="ISO 22000">22000</a></li> <li><a href="/wiki/ECMAScript" title="ECMAScript">22275</a></li> <li><a href="/wiki/ISO_22300" title="ISO 22300">22300</a></li> <li><a href="/wiki/ISO_22301" title="ISO 22301">22301</a></li> <li><a href="/wiki/ISO_22395" title="ISO 22395">22395</a></li> <li><a href="/wiki/ECMAScript_for_XML" title="ECMAScript for XML">22537</a></li> <li><a href="/wiki/MPEG-A" title="MPEG-A">23000</a></li> <li><a href="/wiki/MPEG-D" title="MPEG-D">23003</a></li> <li><a href="/wiki/MPEG-H" title="MPEG-H">23008</a></li> <li><a href="/wiki/Dynamic_Adaptive_Streaming_over_HTTP" title="Dynamic Adaptive Streaming over HTTP">23009</a></li> <li><a href="/wiki/Versatile_Video_Coding" title="Versatile Video Coding">23090-3</a></li> <li><a href="/wiki/MPEG-G" title="MPEG-G">23092</a></li> <li><a href="/wiki/Essential_Video_Coding" title="Essential Video Coding">23094-1</a></li> <li><a href="/wiki/LCEVC" title="LCEVC">23094-2</a></li> <li><a href="/wiki/C_Sharp_(programming_language)" title="C Sharp (programming language)">23270</a></li> <li><a href="/wiki/Common_Language_Infrastructure" title="Common Language Infrastructure">23271</a></li> <li><a href="/wiki/Linux_Standard_Base" title="Linux Standard Base">23360</a></li> <li><a href="/wiki/Rectangular_Micro_QR_Code" title="Rectangular Micro QR Code">23941</a></li> <li><a href="/wiki/PDF/E" title="PDF/E">24517</a></li> <li><a href="/wiki/Lexical_Markup_Framework" title="Lexical Markup Framework">24613</a></li> <li><a href="/wiki/ISO-TimeML" title="ISO-TimeML">24617</a></li> <li><a href="/wiki/Common_Logic" title="Common Logic">24707</a></li> <li><a href="/wiki/MicroPDF417" title="MicroPDF417">24728</a></li> <li><a href="/wiki/ISO_25178" title="ISO 25178">25178</a></li> <li><a href="/wiki/ISO_25964" title="ISO 25964">25964</a></li> <li><a href="/wiki/ISO_26000" title="ISO 26000">26000</a></li> <li><a href="/wiki/ISO_26262" title="ISO 26262">26262</a></li> <li><a href="/wiki/OpenDocument" title="OpenDocument">26300</a></li> <li><a href="/wiki/Digital_object_identifier" title="Digital object identifier">26324</a></li> <li><a href="/wiki/ISO/IEC_27000-series" class="mw-redirect" title="ISO/IEC 27000-series">27000 series</a></li> <li><a href="/wiki/ISO/IEC_27000" title="ISO/IEC 27000">27000</a></li> <li><a href="/wiki/ISO/IEC_27001" title="ISO/IEC 27001">27001</a></li> <li><a href="/wiki/ISO/IEC_27002" title="ISO/IEC 27002">27002</a></li> <li><a href="/wiki/ISO/IEC_27005" title="ISO/IEC 27005">27005</a></li> <li><a href="/wiki/ISO/IEC_27006" title="ISO/IEC 27006">27006</a></li> <li><a href="/wiki/International_Standard_Name_Identifier" title="International Standard Name Identifier">27729</a></li> <li><a href="/wiki/ISO_28000" title="ISO 28000">28000</a></li> <li>29110</li> <li><a href="/wiki/Requirements_engineering" title="Requirements engineering">29148</a></li> <li><a href="/wiki/JPEG_XR" title="JPEG XR">29199-2</a></li> <li><a href="/wiki/Office_Open_XML" title="Office Open XML">29500</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">30000+</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Ruby_(programming_language)" title="Ruby (programming language)">30170</a></li> <li><a href="/wiki/ISO_31000" title="ISO 31000">31000</a></li> <li><a href="/wiki/PDF" title="PDF">32000</a></li> <li><a href="/wiki/ISO_37001" title="ISO 37001">37001</a></li> <li><a href="/wiki/ISO/IEC_38500" title="ISO/IEC 38500">38500</a></li> <li><a href="/wiki/Graph_Query_Language" title="Graph Query Language">39075</a></li> <li><a href="/wiki/Web_Content_Accessibility_Guidelines" title="Web Content Accessibility Guidelines">40500</a></li> <li><a href="/wiki/ISO/IEC_42010" title="ISO/IEC 42010">42010</a></li> <li><a href="/wiki/ISO_45001" title="ISO 45001">45001</a></li> <li><a href="/wiki/ISO_50001" title="ISO 50001">50001</a></li> <li><a href="/wiki/ISO_55000" title="ISO 55000">55000</a></li> <li><a href="/wiki/ISO_56000" title="ISO 56000">56000</a></li> <li><a href="/wiki/ISO/IEC_80000" title="ISO/IEC 80000">80000</a></li></ul> </div></td></tr><tr><td class="navbox-abovebelow" colspan="2"><div> <ul><li><span class="noviewer" typeof="mw:File"><span title="Category"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/16px-Symbol_category_class.svg.png" decoding="async" width="16" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/23px-Symbol_category_class.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/9/96/Symbol_category_class.svg/31px-Symbol_category_class.svg.png 2x" data-file-width="180" data-file-height="185" /></span></span> <a href="/wiki/Category:ISO_standards" title="Category:ISO standards">Category</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Firmware_and_booting" style="padding:3px"><table class="nowraplinks hlist mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Firmware_and_booting" title="Template:Firmware and booting"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Firmware_and_booting" title="Template talk:Firmware and booting"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Firmware_and_booting" title="Special:EditPage/Template:Firmware and booting"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Firmware_and_booting" style="font-size:114%;margin:0 4em"><a href="/wiki/Firmware" title="Firmware">Firmware</a> and <a href="/wiki/Booting" title="Booting">booting</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Processes</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows" title="Booting process of Windows">Windows</a></span> <ul><li><span class="nowrap"><a href="/wiki/Architecture_of_Windows_9x#Boot_sequence" title="Architecture of Windows 9x">9x</a></span></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Windows_NT" class="mw-redirect" title="Booting process of Windows NT">NT</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Booting_process_of_Linux" title="Booting process of Linux">Linux</a></span> <ul><li><span class="nowrap"><a href="/wiki/Booting_process_of_Android_devices" title="Booting process of Android devices">Android</a></span></li></ul></li></ul> </div></td><td class="noviewer navbox-image" rowspan="10" style="width:1px;padding:0 0 0 2px"><div><span typeof="mw:File"><a href="/wiki/File:WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/100px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg" decoding="async" width="100" height="100" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/150px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f8/WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg/200px-WD_Blue_WD5000LPVX_-_controller_-_Winbond_25X20CLVIG-0182.jpg 2x" data-file-width="1535" data-file-height="1535" /></a></span></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Booting <a href="/wiki/Firmware#Computers" title="Firmware">firmware</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Types</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Proprietary_firmware" title="Proprietary firmware">Proprietary firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Open-source_firmware" title="Open-source firmware">Open-source firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/Custom_firmware" title="Custom firmware">Custom firmware</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Interfaces</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/UEFI" title="UEFI">UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS" title="BIOS">BIOS</a></span> <ul><li><span class="nowrap"><a href="/wiki/Video_BIOS" title="Video BIOS">Video BIOS</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Open_Firmware" title="Open Firmware">Open Firmware</a></span></li> <li><span class="nowrap"><a href="/wiki/ACPI" title="ACPI">ACPI</a></span></li> <li><span class="nowrap"><a href="/wiki/MultiProcessor_Specification" title="MultiProcessor Specification">MultiProcessor Specification</a></span></li> <li><span class="nowrap"><a href="/wiki/Advanced_Power_Management" title="Advanced Power Management">APM</a></span></li> <li><span class="nowrap"><a href="/wiki/Legacy_Plug_and_Play" title="Legacy Plug and Play">Legacy Plug and Play</a></span></li> <li><span class="nowrap"><a href="/wiki/ARC_(specification)" title="ARC (specification)">AlphaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/SRM_firmware" title="SRM firmware">SRM</a></span></li> <li><span class="nowrap"><a href="/wiki/Simple_Firmware_Interface" title="Simple Firmware Interface">SFI</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/SeaBIOS" title="SeaBIOS">SeaBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Award_Software" title="Award Software">Award BIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/American_Megatrends" title="American Megatrends">American Megatrends</a></span> <ul><li><span class="nowrap"><a href="/wiki/AMIBIOS" class="mw-redirect" title="AMIBIOS">AMIBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/AMI_Aptio" class="mw-redirect" title="AMI Aptio">AMI Aptio</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/Insyde_Software" title="Insyde Software">InsydeH2O</a></span></li> <li><span class="nowrap"><a href="/wiki/Phoenix_Technologies" title="Phoenix Technologies">Phoenix SecureCore UEFI</a></span></li> <li><span class="nowrap"><a href="/wiki/TianoCore_EDK_II" title="TianoCore EDK II">TianoCore EDK II</a></span></li> <li><span class="nowrap"><a href="/wiki/OpenBIOS" title="OpenBIOS">OpenBIOS</a></span></li> <li><span class="nowrap"><a href="/wiki/Coreboot" title="Coreboot">Coreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Libreboot" title="Libreboot">Libreboot</a></span></li> <li><span class="nowrap"><a href="/wiki/LinuxBoot" title="LinuxBoot">LinuxBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Kickstart_(Amiga)" title="Kickstart (Amiga)">Kickstart</a></span></li> <li><span class="nowrap"><a href="/wiki/Run-Time_Abstraction_Services" title="Run-Time Abstraction Services">Run-Time Abstraction Services</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hybrid firmware bootloader</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Common_Firmware_Environment" title="Common Firmware Environment">Common Firmware Environment</a> </span></li> <li><span class="nowrap"><a href="/wiki/Das_U-Boot" title="Das U-Boot">Das U-Boot</a></span></li> <li><span class="nowrap"><a href="/wiki/ARCS_(computing)" title="ARCS (computing)">ARCS</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Bootloaders" class="mw-redirect" title="Bootloaders">Bootloaders</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bootloader_unlocking" title="Bootloader unlocking">Bootloader unlocking</a></span></li> <li><span class="nowrap"><a href="/wiki/Comparison_of_bootloaders" title="Comparison of bootloaders">Comparison of bootloaders</a></span></li></ul> </div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th id="Implementations" scope="row" class="navbox-group" style="width:1%">Implementations</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Acronis_OS_Selector" class="mw-redirect" title="Acronis OS Selector">Acronis OS Selector</a></span></li> <li><span class="nowrap"><a href="/wiki/Barebox" title="Barebox">Barebox</a></span></li> <li><span class="nowrap"><a href="/wiki/BootManager" class="mw-redirect" title="BootManager">BootManager</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Apple)" title="BootX (Apple)">BootX (Apple)</a></span></li> <li><span class="nowrap"><a href="/wiki/BootX_(Linux)" title="BootX (Linux)">BootX (Linux)</a></span></li> <li><span class="nowrap"><a href="/wiki/GNU_GRUB" title="GNU GRUB">GNU GRUB</a></span></li> <li><span class="nowrap"><a href="/wiki/IBoot" title="IBoot">iBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Systemd-boot" title="Systemd-boot">systemd-boot</a></span></li> <li><span class="nowrap"><a href="/wiki/Loadlin" title="Loadlin">loadlin</a></span></li> <li><span class="nowrap"><a href="/wiki/NTLDR" title="NTLDR">NTLDR</a></span></li> <li><span class="nowrap"><a href="/wiki/OpeniBoot" title="OpeniBoot">OpeniBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/RedBoot" title="RedBoot">RedBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/REFInd" title="REFInd">rEFInd</a></span></li> <li><span class="nowrap"><a href="/wiki/REFIt" title="REFIt">rEFIt</a></span></li> <li><span class="nowrap"><a href="/wiki/SYSLINUX" title="SYSLINUX">SYSLINUX</a></span></li> <li><span class="nowrap"><a href="/wiki/Windows_Boot_Manager" title="Windows Boot Manager">Windows Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/XOSL" title="XOSL">xOSL</a></span></li> <li><span class="nowrap"><a href="/wiki/Yaboot" title="Yaboot">Yaboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Plop_Boot_Manager" title="Plop Boot Manager">Plop Boot Manager</a></span></li> <li><span class="nowrap"><a href="/wiki/MILO_(bootloader)" title="MILO (bootloader)">MILO</a></span></li></ul> </div></td></tr></tbody></table><div> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Partition layouts</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/GUID_Partition_Table" title="GUID Partition Table">GUID Partition Table</a></span></li> <li><span class="nowrap"><a href="/wiki/Master_boot_record" title="Master boot record">Master boot record</a></span></li> <li><span class="nowrap"><a href="/wiki/Apple_Partition_Map" title="Apple Partition Map">Apple Partition Map</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/System_partition_and_boot_partition" title="System partition and boot partition">Partitions</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/EFI_system_partition" title="EFI system partition">EFI system partition</a></span></li> <li><span class="nowrap"><a href="/wiki/BIOS_boot_partition" title="BIOS boot partition">BIOS boot partition</a></span></li> <li><span class="nowrap"><a href="/wiki//boot/" title="/boot/">/boot/</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Utilities</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"></div><table class="nowraplinks navbox-subgroup" style="border-spacing:0"><tbody><tr><th scope="row" class="navbox-group" style="width:1%">Software</th><td class="navbox-list-with-group navbox-list navbox-even" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Flashrom_(utility)" title="Flashrom (utility)">flashrom</a></span></li> <li><span class="nowrap"><a href="/wiki/Fwupd" title="Fwupd">fwupd</a></span></li> <li><span class="nowrap"><a href="/wiki/UEFITool" title="UEFITool">UEFITool</a></span></li> <li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)" title="Odin (firmware flashing software)">Odin</a></span> <ul><li><span class="nowrap"><a href="/wiki/Odin_(firmware_flashing_software)#Heimdall" title="Odin (firmware flashing software)">Heimdall</a></span></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Hardware</th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Bus_Pirate" title="Bus Pirate">Bus Pirate</a></span></li> <li><span class="nowrap"><a href="/wiki/Raspberry_Pi" title="Raspberry Pi">Raspberry Pi</a></span></li> <li><span class="nowrap"><a href="/wiki/FTDI" title="FTDI">ft2232</a></span></li></ul> </div></td></tr></tbody></table><div></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Network_booting" title="Network booting">Network boot</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Preboot_Execution_Environment" title="Preboot Execution Environment">Preboot Execution Environment</a></span> <ul><li><span class="nowrap"><a href="/wiki/GPXE" title="GPXE">gPXE</a></span></li> <li><span class="nowrap"><a href="/wiki/IPXE" title="IPXE">iPXE</a></span></li></ul></li> <li><span class="nowrap"><a href="/wiki/NetBoot" title="NetBoot">NetBoot</a></span></li> <li><span class="nowrap"><a href="/wiki/Remote_Initial_Program_Load" title="Remote Initial Program Load">Remote Initial Program Load</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-LAN" title="Wake-on-LAN">Wake-on-LAN</a></span></li> <li><span class="nowrap"><a href="/wiki/Wake-on-ring" title="Wake-on-ring">Wake-on-ring</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">ROM variants</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Read-only_memory" title="Read-only memory">ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/Programmable_ROM" title="Programmable ROM">PROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EPROM" title="EPROM">EPROM</a></span></li> <li><span class="nowrap"><a href="/wiki/EEPROM" title="EEPROM">EEPROM</a></span></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><span class="nowrap"><a href="/wiki/Boot_ROM" title="Boot ROM">Boot ROM</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_hacking" title="ROM hacking">ROM hacking</a></span></li> <li><span class="nowrap"><a href="/wiki/ROM_image" title="ROM image">ROM image</a></span></li> <li><span class="nowrap"><a href="/wiki/Execute_in_place" title="Execute in place">Execute in place</a></span></li> <li><span class="nowrap"><a href="/wiki/Devicetree" title="Devicetree">Devicetree</a></span></li> <li><span class="nowrap"><a href="/wiki/Fastboot" title="Fastboot">Fastboot</a></span></li> <li><span class="nowrap"><a href="/wiki/Instant-on" title="Instant-on">Instant-on</a></span></li> <li><span class="nowrap"><a href="/wiki/Power-on_self-test" title="Power-on self-test">Power-on self-test</a></span></li> <li><span class="nowrap"><a href="/wiki/Qualcomm_EDL_mode" title="Qualcomm EDL mode">EDL mode</a></span></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐fp8vw Cached time: 20241124064541 Cache expiry: 580471 Reduced expiry: true Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.299 seconds Real time usage: 1.479 seconds Preprocessor visited node count: 9664/1000000 Post‐expand include size: 339595/2097152 bytes Template argument size: 9790/2097152 bytes Highest expansion depth: 17/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 533745/5000000 bytes Lua time usage: 0.738/10.000 seconds Lua memory usage: 7472961/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1237.134 1 -total 52.81% 653.287 2 Template:Reflist 29.06% 359.491 96 Template:Cite_web 16.08% 198.931 41 Template:Citation 9.15% 113.171 5 Template:Navbox 8.52% 105.343 1 Template:ISO_standards 7.12% 88.049 3 Template:Efn 6.77% 83.722 2 Template:R 6.48% 80.120 7 Template:No 6.27% 77.534 2 Template:R/ref --> <!-- Saved in parser cache with key enwiki:pcache:idhash:2936835-0!canonical and timestamp 20241124064541 and revision id 1256857161. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Trusted_Platform_Module&amp;oldid=1256857161">https://en.wikipedia.org/w/index.php?title=Trusted_Platform_Module&amp;oldid=1256857161</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Computer_hardware_standards" title="Category:Computer hardware standards">Computer hardware standards</a></li><li><a href="/wiki/Category:Computer_security_hardware" title="Category:Computer security hardware">Computer security hardware</a></li><li><a href="/wiki/Category:Cryptographic_hardware" title="Category:Cryptographic hardware">Cryptographic hardware</a></li><li><a href="/wiki/Category:Cryptographic_software" title="Category:Cryptographic software">Cryptographic software</a></li><li><a href="/wiki/Category:Cryptography_standards" title="Category:Cryptography standards">Cryptography standards</a></li><li><a href="/wiki/Category:ISO_standards" title="Category:ISO standards">ISO standards</a></li><li><a href="/wiki/Category:Random_number_generation" title="Category:Random number generation">Random number generation</a></li><li><a href="/wiki/Category:Trusted_computing" title="Category:Trusted computing">Trusted computing</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:CS1_maint:_archived_copy_as_title" title="Category:CS1 maint: archived copy as title">CS1 maint: archived copy as title</a></li><li><a href="/wiki/Category:CS1_maint:_bot:_original_URL_status_unknown" title="Category:CS1 maint: bot: original URL status unknown">CS1 maint: bot: original URL status unknown</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:All_articles_with_vague_or_ambiguous_time" title="Category:All articles with vague or ambiguous time">All articles with vague or ambiguous time</a></li><li><a href="/wiki/Category:Vague_or_ambiguous_time_from_December_2022" title="Category:Vague or ambiguous time from December 2022">Vague or ambiguous time from December 2022</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_September_2021" title="Category:Articles with unsourced statements from September 2021">Articles with unsourced statements from September 2021</a></li><li><a href="/wiki/Category:Articles_containing_potentially_dated_statements_from_2012" title="Category:Articles containing potentially dated statements from 2012">Articles containing potentially dated statements from 2012</a></li><li><a href="/wiki/Category:All_articles_containing_potentially_dated_statements" title="Category:All articles containing potentially dated statements">All articles containing potentially dated statements</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 11 November 2024, at 22:27<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Trusted_Platform_Module&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-mczds","wgBackendResponseTime":182,"wgPageParseReport":{"limitreport":{"cputime":"1.299","walltime":"1.479","ppvisitednodes":{"value":9664,"limit":1000000},"postexpandincludesize":{"value":339595,"limit":2097152},"templateargumentsize":{"value":9790,"limit":2097152},"expansiondepth":{"value":17,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":533745,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1237.134 1 -total"," 52.81% 653.287 2 Template:Reflist"," 29.06% 359.491 96 Template:Cite_web"," 16.08% 198.931 41 Template:Citation"," 9.15% 113.171 5 Template:Navbox"," 8.52% 105.343 1 Template:ISO_standards"," 7.12% 88.049 3 Template:Efn"," 6.77% 83.722 2 Template:R"," 6.48% 80.120 7 Template:No"," 6.27% 77.534 2 Template:R/ref"]},"scribunto":{"limitreport-timeusage":{"value":"0.738","limit":"10.000"},"limitreport-memusage":{"value":7472961,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-fp8vw","timestamp":"20241124064541","ttl":580471,"transientcontent":true}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Trusted Platform Module","url":"https:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module","sameAs":"http:\/\/www.wikidata.org\/entity\/Q1140366","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q1140366","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2005-10-18T17:52:23Z","dateModified":"2024-11-11T22:27:57Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/b\/be\/TPM.svg","headline":"international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10