PP for a PC Client Specific Trusted Platform Module Family 2.0 Level 0 Revision 1.16

Others / Smart Card

Organismo de Certficación

Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI)

Espónsor

Trusted Computing Group (TCG)

Contacto

Trusted Computing Group (TCG), 3855 SW 153rd Drive, Beaverton, OR 97006, USA
certification@ssi.gouv.fr

ID

ANSSI-CC-PP-2015/07

Versión del PP

version 1.0

Versión CC

3.1 Revision 4

Conformidad con CC

CC part 2 extended
CC part 3 conformant
EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4

Estado de la certificación

Certified 6 May 2015

Idioma

Inglés

Sumario

This Protection Profile is established by Trusted Computing Group Administration. It describes the security requirements for the development of a TCG PC Client Specific Trusted Platform Module (PCCS TPM).

This TPM is hardware, firmware and software that implements the functions defined in the TCG Trusted Platform Module Main Specification, Family 2.0, Level 0, Revision 1.16, and the PC client specific interface specification.

The TCG Trusted Platform Module Specification describes the design principles, the TPM structures and the TPM commands.

The PC Client Interface Specification describes the platform-specific set of requirements of the TPM for the PC Client and the details of what interfaces and protocols are used to communicate with the TPM. The primitives provided by the TPM include cryptographic algorithms for key generation, digital signatures, random number generation, sealing data to system state, protected storage, binding information to the TPM and support of direct anonymous attestation.

Otros Perfiles de protección relacionados

The Protection Profile is an update of the PP for a PC Client Specific Trusted Platform Module Family 1.2 Level2 :

  • v1.1 (BSI-CC-PP-0030-2008)
  • v1.2 (BSI-CC-PP-0030-2008-MA-01)

The key changes to that Protection Profile as compared to those previous Perfiles de protección include:

  • Support for additional algorithms
  • Agility of algorithms for use by geographies or markets that require specific-use algorithms
  • Enhancements to the availability of the TPM to applications
  • Enhanced authorization for improved TPM management
  • Additional cryptographic services to enhance the security of platform services