
BDM-610000088 Rev A
Chapter 4: Using the cpuModule 71
Trusted Platform Module
The CME34BT cpuModule includes a Trusted Platform Module (TPM) that is fully compliant to the
Trusted Computing Group (TCG) TPM version 2.0 specification.
TPM stands for “Trusted Platform Module”. The TPM is a controller on your cpuModule that provides
tamper resistant storage using hardware-based cryptography. The TPM can be used to store passwords,
certificates, and keys to encrypted file systems. The TPM protects the data on your drives from being read
should your system or drive be stolen. An un-encrypted drive can be removed from your system and
connected to another, bypassing the need for a user account and password. With a TPM encrypted drive the
only way to access the data is by logging into the system as a user with access to the files containing your
sensitive information. TPM 2.0 controllers can generate and store
-256-
encryption keys
to ensure your data can not be decrypted. As such, it is highly recommended to save a copy of any file
system encryption keys either on paper or a USB drive in the event your device experiences a hardware
failure. Without this key your data will be lost with NO chance of recovery. For best results, this key should
never be saved locally, even temporarily, as the key may leave a lasting trace on flash or magnetic drives.
TPM chips are still vulnerable to software attacks, malware, and viruses. Once the system has booted and
a user is logged in, the encrypted drives are unlocked with the keys from the TPM, allowing any software
attacks full access to any important data and even the keys within the TPM. As such, it is still highly
recommended to maintain firewalls, anti-virus, and any other internet security methods.
Before using the TPM chip it must be enabled and cleared in the Security Tab of the BIOS. Windows must
also be installed in UEFI mode to allow TPM access. UEFI boot mode can be set in the Boot tab of the bios.
For Debian-based Linux distributions refer to “TPM Implementation White Paper”. For Red Hat Linux
refer to guides found on the Red Hat Customer Portal for your version.
For more information, refer to the Trusted Platform Module version 2.0 specification.
Table 49 Additional References:
Title
Description
Source
TPM Specifications
TPM specs, versions, updates
https://trustedcomputinggroup.org/resourc
TPM Summary and
Operation
An in-depth white paper on how
the TPM works.
https://trustedcomputinggroup.org/resourc
e/trusted-platform-module-tpm-summary/
TPM Implementation White
Paper
An in-depth white paper on how to
set up TPM drivers in Windows
and Linux
Contact RTD Techsupport
Red Hat Customer Portal
Customer portal for Red Hat
Subscribers
Summary of Contents for cpuModules CME34BT
Page 3: ... Accessing the Analog World www rtd com ISO9001 and AS9100 CME34BT cpuModules ...
Page 34: ...26 CME34BT cpuModule BDM 610000088 Rev A ...
Page 82: ...74 CME34BT cpuModule BDM 610000088 Rev A ...
Page 88: ...80 CME34BT cpuModule BDM 610000088 Rev A Figure 12 CME34BTQ1910 Heatsink Edge near PCIe 104 ...
Page 90: ...82 CME34BT cpuModule BDM 610000088 Rev A ...
Page 105: ...BDM 610000088 Rev A Appendix C IDAN Dimensions and Pinout 97 ...
Page 106: ...98 CME34BT cpuModule BDM 610000088 Rev A ...