Infosec glossary entry

TPM

TPM :
Trusted Platform Module
specific implementation of a RoT

[…] is used to improve the security of your PC. It’s used […] to securely create and store cryptographic keys, and to confirm that the operating system and firmware on your device are what they’re supposed to be, and haven’t been tampered with.

Typically, it’s a separate chip on the motherboard though the TPM 2.0 standard allows manufacturers like Intel or AMD to build the TPM capability into their chipsets rather than requiring a separate chip.
https://support.microsoft.com/en-us/topic/what-is-tpm-705f241d-025d-4470-80c5-4feeb24fa1ee

Related entries

By jean-christoph

February 18, 2023

cryptography
Leave a Reply

Your email address will not be published. Required fields are marked

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}

this might interest you as well