Rate This Document
Findability
Accuracy
Completeness
Readability

Trusted Computing Framework

Secure boot establishes a hardware RoT (which is tamperproofing) to authenticate each layer from this root. This builds a trust chain across the entire system to achieve predictable system behavior.

Trusted boot establishes a hardware RoT (which is tamperproofing) to measure each layer from this root. This builds a trust chain across the entire system to achieve predictable system behavior through remote attestation.

Figure 1 Secure boot and trusted boot

Trusted computing 3.0 is built on the Trusted Cryptography Module (TCM) and establishes an RoT through the Trusted Platform Control Module (TPCM) within the security component. From this root, the computing component is measured and attested layer by layer. This builds a trust chain across the entire system to ensure predictable system behavior and provide capabilities such as proactive control and software trustlist control.

Figure 2 Dual-system architecture in trusted computing 3.0