74 CMA24BT cpuModule
BDM-610000087 Rev A
Trusted Platform Module
The CMA24BT cpuModule includes a Trusted Platform Module (TPM) that is fully compliant to the
Trusted Computing Group (TCG) TPM version 2.0 specification.
TPM stands for “Trusted Platform Module”. The TPM is a controller on your cpuModule that provides
tamper resistant storage using hardware-based cryptography. The TPM can be used to store passwords,
certificates, and keys to encrypted file systems. The TPM protects the data on your drives from being
read should your system or drive be stolen. An un-encrypted drive can be removed from your system and
connected to another, bypassing the need for a user account and password. With a TPM encrypted drive
the only way to access the data is by logging into the system as a user with access to the files containing
your sensitive information. TPM 2.0 controllers can generate and store
-256-
encryption
keys to ensure your data can not be decrypted. As such, it is highly recommended to save a copy of any
file system encryption keys either on paper or a USB drive in the event your device experiences a
hardware failure. Without this key your data will be lost with NO chance of recovery. For best results, this
key should never be saved locally, even temporarily, as the key may leave a lasting trace on flash or
magnetic drives.
TPM chips are still vulnerable to software attacks, malware, and viruses. Once the system has booted and
a user is logged in, the encrypted drives are unlocked with the keys from the TPM, allowing any software
attacks full access to any important data and even the keys within the TPM. As such, it is still highly
recommended to maintain firewalls, anti-virus, and any other internet security methods.
Before using the TPM chip it must be enabled and cleared in the Security Tab of the BIOS. Windows must
also be installed in UEFI mode to allow TPM access. UEFI boot mode can be set in the Boot tab of the
bios. For Debian-based Linux distributions refer to “TPM Implementation White Paper”. For Red Hat
Linux refer to guides found on the Red Hat Customer Portal for your version.
For more information, refer to the Trusted Platform Module version 2.0 specification.
Table 50
Additional References:
Title
Description
Source
TPM Specifications
TPM specs, versions, updates
https://trustedcomputinggroup.org/resource/tpm-li
TPM Summary and Operation
An in-depth white paper on how the TPM
works.
https://trustedcomputinggroup.org/resource/truste
d-platform-module-tpm-summary/
TPM Implementation White Paper
An in-depth white paper on how to set up
TPM drivers in Windows and Linux
Contact RTD Techsupport
Red Hat Customer Portal
Customer portal for Red Hat Subscribers
Содержание cpuModules CMA24BT
Страница 3: ...Accessing the Analog World www rtd com ISO9001 and AS9100 CMA24BT cpuModules...
Страница 5: ...BDM 610000087 Rev A v...
Страница 6: ...vi CMA24BT cpuModule BDM 610000087 Rev A...
Страница 41: ...BDM 610000087 Rev A Chapter 3 Connecting the cpuModule 31 1 12 V not required for operation of the cpuModule...
Страница 66: ...56 CMA24BT cpuModule BDM 610000087 Rev A...
Страница 87: ...BDM 610000087 Rev A Chapter 4 Using the cpuModule 77...
Страница 88: ...78 CMA24BT cpuModule BDM 610000087 Rev A...
Страница 94: ...84 CMA24BT cpuModule BDM 610000087 Rev A Figure 11 CMA24BTQ1910 Heatsink Edge near PCIe 104...
Страница 96: ...86 CMA24BT cpuModule BDM 610000087 Rev A...
Страница 111: ...BDM 610000087 Rev A Appendix C IDAN Dimensions and Pinout 101...
Страница 112: ...102 CMA24BT cpuModule BDM 610000087 Rev A...
Страница 114: ...104 CMA24BT cpuModule BDM 610000087 Rev A...
Страница 116: ...106 CMA24BT cpuModule BDM 610000087 Rev A...