一建绕过Windows 11系统的TPM 2.0和SecureBoot限制
2024-03-26 03:04:54 130B windows windows11
1
宏碁predator helios 300开启tpm安装win11最简单流程
2022-11-26 17:04:12 14KB 宏碁 predator helios tpm
1
可信协议栈,由 IBM 创建和发布的开源 TCG 软件栈,搭建TPM Emulator虚拟环境时必不可少的。在解压时为其指定一个解压目录,直接解压压缩包,它的各种文件会分散在父目录里面。
2022-11-04 15:42:35 1.31MB TPM TCG 可信计算 软件协议栈
1
Windows11 22H2自动应答文件(可绕过4G内存、TPM检测和联网创建账户)。为了方便大家使用,分为适用于包含单版本系统镜像和适用于包含多版本系统镜像(如消费者版包含家庭版、专业版、专业教育版、专业工作站版等多个版本)两个版本。
1
在linux平台,利用模拟TPM构建可信平台,在TDD层掉用模拟可信芯片散列算法计算文件散列值。
2022-09-24 22:00:21 2KB tpm 可信
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do cool things with the TPM. The approach is to ramp the reader up quickly and keep their interest.A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security explains security concepts, describes the TPM 2.0 architecture, and provides code and pseudo-code examples in parallel, from very simple concepts and code to highly complex concepts and pseudo-code. The book includes instructions for the available execution environments and real code examples to get readers up and talking to the TPM quickly. The authors then help the users expand on that with pseudo-code descriptions of useful applications using the TPM. What you’ll learn TPM 2.0 architecture fundamentals, including changes from TPM 1.2 TPM 2.0 security concepts Essential application development techniques A deep dive into the features of TPM 2.0 A primer on the execution environments available for application development. Learn as you go! Who this book is for Application software developers, OS developers, device-driver developers, and embedded-device specialists, who will benefit from mastering TPM 2.0 capabilities and building their own applications quickly. This book will give them the tools they need to experiment with and understand the technology. Software architects who need to understand the security guarantees provided by TPMs Managers who fund the projects that use TPMs. Non-technical users who may want to know why TPMs are on their computers and how to make use of them.
2022-07-04 01:54:27 5.34MB TPM 可信计算 Trused Computing
1
可迁移密钥与不可迁移密钥 在整个TPM/TCM的密钥体系中,每个密钥在开始创建的时候都需要指定密钥属性。密钥按照属性不同分为:可迁移密钥(Migratable Key) 、不可迁移密钥(Non-Migratable Key)。 可迁移存储密钥并不局限于某个特定平台,可以由平台用户的控制下在平台之间迁移。 不可迁移密钥则永久地与某个指定平台关联。不可迁移密钥能够用来加密保护可迁移密钥,反之则不行。
2022-06-01 11:21:04 214KB tpm mtm 可信计算
1
TCG发布的标准2.0, 包括:c066510_ISO_IEC_11889-1_2015 c066511_ISO_IEC_11889-2_2015 c066512_ISO_IEC_11889-3_2015 c066513_ISO_IEC_11889-4_2015
2022-04-15 15:30:14 16.51MB 可信计算 TPM
1
Trusted platform module basics - using TPM in embedded systems.pdf
2022-04-12 10:39:21 10.71MB Trusted platform TPM embedded
1
TPM-TSS协议栈
2022-04-06 00:17:28 905KB TPM TPM_TSS
1