Definition

trusted platform module (TPM)

Part of the Hardware glossary:

A trusted platform module (TPM) is a specialized chip that can be installed on the motherboard of a personal computer for the purpose of hardware authentication . The TPM authenticates the computer in question rather than the user. To do so, TPM stores information specific to the host system, such as encryption keys, digital certificate s and password s.

Next Steps

TPM minimizes the risk that data on the computer will be compromised by physical theft or an attack by an external hacker . Hardware protection is inherently less vulnerable to software-based attacks and authentication processes are conducted through a secure subsystem. The device also enhances the security of Web browser s, email programs and other important applications.

TPM chips are available from a number of vendors, including Atmel, Broadcom, Infineon, Sinosun, STMicroelectronics and Winbond. TPM could, potentially, be used on any type of computing device. The devices are currently being installed on desktops, laptops and tablet PCs by most major manufacturers. TPM can be used with any major operating system and works best in conjunction with other security technologies such as firewall s, antivirus software , smart card s and biometric verification . The Trusted Computing Group is currently working on specifications for TPM chips for installation in peripheral s and external storage devices.

The term TPM is sometimes used in reference to the set of specifications applicable to TPM chips.

This was last updated in March 2011
Posted by: Margaret Rouse

Related Terms

Definitions

Glossaries

  • Hardware

    - Terms related to computer hardware, including definitions about cables, connectors and power supply units and words and phrases about computing peripheral devices including the keyboard, mouse, au...

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

  • Security management

    - Terms related to security management, including definitions about intrusion detection systems (IDS) and words and phrases about asset management, security policies, security monitoring, authorizati...

Dig Deeper

Continue Reading About trusted platform module (TPM)

People Who Read This Also Read...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.