TPM 2.0 Technology: C&T’s Cybersecurity Armor for Connected Computing
Embedded and rugged edge computer systems collecting and processing sensitive data become targets for cyber attacks as they connect to the IoT. Intellectual property, personal data and machine commands become increasingly susceptible to exfiltration or manipulation with increased connectivity. To protect its systems — as wells as the people, products and services dependent on their security — C&T integrates trusted platform modules (TPMs) with TPM 2.0 standards.
The Security Standard
TPM 2.0 is the international standard for microcontrollers dedicated to hardware security.
The Discrete Module
The tamper-resistant TPM cryptoprocessor is physically connected to the motherboard.
IoT Core Edition
Control access to protected data at connected endpoints and cloud interfaces.
TPM technology secures connected systems at the hardware level. C&T’s embedded and rugged edge computers are deployable with TPM microcontrollers protecting systems and data. This enterprise-level security is extended to IoT devices connected to systems through authentication and key management.
Trusted Platform Module 2.0
TPM standards ensure secure data storage, as well as platform authentication and integrity auditing. TPM 2.0’s three hierarchies permit multiple root keys for improved security over TPM 1.2 standards. This provides better resistance to malware and rogue applications affecting legitimate processes.
-
Safeguards data with a secure hardware-integrated algorithm
-
Protects against hackers, malware and physical theft
-
Resists brute force decryption attack
-
Creates quality random numbers
-
Provides support for encryption in the platform
-
Establishes platform identities
-
Store keys and data
-
Signs and verifies digital signatures
-
Audits key usage and data access