温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,汇文网负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
网站客服:3074922707
ISO_IEC_11889
_2015
Information technology Trusted Platform Module Library Part 1:ArchitectureTechnologies de linformation Bibliothque de module de plate-forme de confiance Partie 1:ArchitectureINTERNATIONAL STANDARDISO/IEC11889-1Reference numberISO/IEC 11889-1:2015(E)Second edition 2015-12-15 ISO/IEC 2015Corrected version 2016-04-01 ii ISO/IEC 2015 All rights reservedCOPYRIGHT PROTECTED DOCUMENT ISO/IEC 2015,Published in SwitzerlandAll rights reserved.Unless otherwise specified,no part of this publication may be reproduced or utilized otherwise in any form or by any means,electronic or mechanical,including photocopying,or posting on the internet or an intranet,without prior written permission.Permission can be requested from either ISO at the address below or ISOs member body in the country of the requester.ISO copyright officeCh.de Blandonnet 8 CP 401CH-1214 Vernier,Geneva,SwitzerlandTel.+41 22 749 01 11Fax+41 22 749 09 47copyrightiso.orgwww.iso.orgISO/IEC 11889-1:2015(E)ISO/IEC 11889-1:2015(E)CONTENTS Foreword.xiv Introduction.xv 1 Scope.1 2 Normative references.2 3 Terms and definitions.3 4 Symbols and Abbreviated Terms.12 4.1 Symbols.12 4.2 Abbreviations.13 5 Conventions.15 5.1 Bit and Octet Numbering and Order.15 5.2 Sized Buffer References.15 5.3 Numbers.16 5.4 KDF Label Parameters.16 6 ISO/IEC 11889 Organization.17 7 Compliance.19 8 Changes from Previous Versions.20 9 Trusted Platforms.21 9.1 Trust.21 9.2 Trust Concepts.21 Trusted Building Block.21 9.2.1 Trusted Computing Base.21 9.2.2 Trust Boundaries.21 9.2.3 Transitive Trust.22 9.2.4 Trust Authority.22 9.2.59.3 Trusted Platform Module.23 9.4 Roots of Trust.23 Introduction.23 9.4.1 Root of Trust for Measurement(RTM).24 9.4.2 Root of Trust for Storage(RTS).24 9.4.3 Root of Trust for Reporting(RTR).24 9.4.49.5 Basic Trusted Platform Features.25 Introduction.25 9.5.1 Certification.26 9.5.2 Attestation and Authentication.26 9.5.3 Protected Location.29 9.5.4 Integrity Measurement and Reporting.30 9.5.510 TPM Protections.31 10.1 Introduction.31 10.2 Protection of Protected Capabilities.31 10.3 Protection of Shielded Locations.31 10.4 Exceptions and Clarifications.31 11 TPM Architecture.33 11.1 Introduction.33 11.2 TPM Command Processing Overview.33 11.3 I/O Buffer.37 11.4 Cryptography Subsystem.37 ii ISO/IEC 2015 All rights reserved ISO/IEC 11889-1:2015(E)Introduction.37 11.4.1 Hash Functions.37 11.4.2 HMAC Algorithm.38 11.4.3 Asymmetric Operations.38 11.4.4 Signature Operations.39 11.4.5 Symmetric Encryption.41 11.4.6 Extend.43 11.4.7 Key Generation.43 11.4.8 Key Derivation Function.43 11.4.911.4.10 Random Number Generator(RNG)Module.47 11.4.11 Algorithms.49 11.5 Authorization Subsystem.50 11.6 Random Access Memory.51 Introduction.51 11.6.1 Platform Configuration Registers(PCR).51 11.6.2 Object Store.52 11.6.3 Session Store.52 11.6.4 Size Requirements.52 11.6.511.7 Non-Volatile(NV)Memory.53 11.8 Power Detection Module.53 12 TPM Operational States.54 12.1 Introduction.54 12.2 Basic TPM Operational States.54 Power-off State.54 12.2.1 Initialization State.54 12.2.2 Startup State.55 12.2.3 Shutdown State.58 12.2.4 Startup Alternatives.58 12.2.512.3 Self-Test Modes.59 12.4 Failure Mode.60 12.5 Field Upgrade.61 Introduction.61 12.5.1 Field Upgrade Mode.61 12.5.2 Preserved TPM State.64 12.5.3 Field Upgrade Implementation Options.65 12.5.413 TPM Control Domains.66 13.1 Introduction.66 13.2 Controls.66 13.3 Platform Controls.67 13.4 Owner Controls.68 13.5 Privacy Administrator Controls.68 13.6 Primary Seed Authorizations.69 13.7 Lockout Control.69 13.8 TPM Ownership.70 Taking Ownership.70 13.8.1 Releasing Ownership.70 13.8.214 Primary Seeds.72 ISO/IEC 2015 All rights reserved iii ISO/IEC 11889-1:2015(E)14.1 Introduction.72 14.2 Rationale.72 14.3 Primary Seed Properties.73 Introduction.73 14.3.1 Endorsement Primary Seed(EPS).73 14.3.2 Platform Primary Seed(PPS).74 14.3.3 Storage Primary Seed(SPS).74 14.3.4 The Null Seed.74 14.3.514.4 Hierarchy Proofs.74 15 TPM Handles.76 15.1 Introduction.76 15.2 PCR Handles(MSO=0016).76 15.3 NV Index Handles(MSO=0116).76 15.4 Session Handles(MSO=0216 and 0316).76 15.5 Permanent Resource Handles(MSO=4016).77 15.6 Transient Object Handles(MSO=8016).77 15.7 Persistent Object Handles(MSO=8116).77 16 Names.78 17 PCR Operations.80 17.1 Initializing PCR.80 17.2 Extend of a PCR.80 17.3 Using Extend with PCR Banks.80 17.4 Recording Events.81 17.5 Selecting Multiple PCR.81 17.6 Reporting on PCR.82 Reading PCR.82 17.6.1 Attesting to PCR.82 17.6.217.7 PCR Authorizations.83 Introduction.83 17.7.1 PCR Not in a Set.83 17.7.2 Authorization Set.83 17.7.3 Policy Set.84 17.7.4 Order of Checking.84 17.7.517.8 PCR Allocation.84 17.9 PCR Change Tracking.84 17.10 Other Uses for PCR.85 18 TPM Command/Response Structure.86 18.1 Introduction.86 18.2 Command/Response Header Fields.88 Introduction.88 18.2.1 tag.88 18.2.2 commandSize/responseSize.88 18.2.3 commandCode.88 18.2.4 responseCode.88 18.2.518.3 Handles.89 18.4 Parameters.89 18.5 authorizationSize/parameterSize.90 iv