
Automatic initialization of the TPM with Windows

For more information, see the TCG Web site. If too many incorrect authorization guesses occur, the TPM will activate its dictionary attack logic and prevent further authorization value guesses.ĭifferent versions of the TPM are defined in specifications by the Trusted Computing Group (TCG). TPM-based keys can also be configured to require an authorization value to use them. This is good to mitigate phishing attacks because it prevents the key from being copied and used without the TPM. One option is to make a TPM-based key unavailable outside the TPM. TPM-based keys can be configured in a variety of ways. The integrity measurements can be used as evidence for how a system started and to make sure that a TPM-based key was used only when the correct software was used to boot the system. During the boot process of a system, the boot code that is loaded (including firmware and the operating system components) can be measured and recorded in the TPM. The most common TPM functions are used for system integrity measurements and for key creation and use.


This article describes the Trusted Platform Module (TPM) and how Windows uses it for access control and authentication.
