tpm Questions

2

In Window, I'm trying to create a key in the TPM with the help of the NCrypt library and restrict the access to only my application in C++, but I get the error: "The security descriptor struct...
Sumpter asked 30/4 at 20:46

2

Solved

I am currently working on a small sample program using Crypto Next Generation (Windows Crypto API) to generate a key, store it in the TPM on my computer, encrypt some data and then retrieve it and ...
Perretta asked 15/4, 2020 at 1:7

1

Solved

It seems that both trusted computing and confidential computing can protect data in use. Is trusted computing based on TPM and confidential computing based on Intel SGX? Any other difference?
Riant asked 10/8, 2020 at 6:46

2

Are Intel PTT (Intel Platform Trust Technology) and TPM chips functionally equivalent? If I had a board with a Intel processor that supported PTT, would I have the same functions as if I had a hard...
Kenric asked 26/9, 2020 at 7:54

3

I am trying to initialize the TPM set an owner create AIKs Any help/link would be appreciated.
Subtorrid asked 25/9, 2010 at 20:1

4

How can I encrypt bytes using a machine's TPM module? CryptProtectData Windows provides a (relatively) simple API to encrypt a blob using the CryptProtectData API, which we can wrap an easy to use ...
Cargian asked 4/3, 2015 at 19:6

1

Solved

I need to run .exe on client machine, which will create key pair within TPM. And then I will create CSR with public key part of key pair generated by TPM. My concerns are how do i ensure that ...
However asked 3/12, 2018 at 10:14

1

So far I know that the TPM is using thermal noise for generating true random numbers. But I'm also sure that the TPM uses more sources for the entropy. In that that keystroke timings, drive seek t...
Pye asked 26/11, 2015 at 15:15

2

Solved

I'd like to perform a TPM Seal operation in windows. I'm familiar with C++ programming but have no idea what libraries I'd even use. I'm currently stuck with the following two questions: C...
Armure asked 10/6, 2014 at 16:7

1

Solved

As there are 24 PCR's in TPM 1.2 specification. Some of these PCRs are reserved and cannot be extended by user's code. Below are the PCR Index their PCR Usage CRTM, BIOS and Platform Extensions P...
Marya asked 31/10, 2013 at 11:42

2

Solved

What is the difference between Intel TXT and TPM? What more Intel TXT has to offer as compared to TPM? Basically, I wanted to know how TXT works? Any easy to follow literature for beginners will be...
Jacquejacquelin asked 21/10, 2013 at 16:34

7

Solved

At my company we are developing a large system, comprised of several servers. The system is comprised from about 5 logical components. Data is stored in XMLs, MS SQL, and SQLite. It's a .Net system...
Revoice asked 1/2, 2011 at 21:29

1

Solved

I've been asked to implement what amounts to a license-dongle using TPM for an x86_64 appliance which has a TPM chip. Essentially what is desired is to ensure that software released for the applian...
Incised asked 2/2, 2012 at 18:23

3

Solved

I am wondering if it's possible to program TPM ( http://en.wikipedia.org/wiki/Trusted_Platform_Module ) present in most of Intel chips, in such a way to: - decide what to store in the persistent m...
Wafd asked 7/12, 2011 at 9:17

2

Solved

I'm reading up on my upcoming project that involves using my laptop's TPM on authentication software written in Java. A few entries came out on Google, but most of them are quite old, and I have n...
Frisk asked 19/8, 2011 at 21:50
1

© 2022 - 2024 — McMap. All rights reserved.