Let's take a look at what TCB is!

Hi ALL!

Acronym

  • TC (Trusted Computing) Trusted Computing (Trusted Computing, referred to as TC) is a technology promoted and developed by TCG (Trusted Computing Group).
  • TPM (Trusted Platform Module) Trusted Platform Module is a chip that is planted inside a computer to provide a root of trust for the computer. The chip's specifications were developed by the Trusted Computing Group.
  • TCM (trusted cryptography module) trusted cryptography module is a hardware module of trusted computing platform, which provides cryptographic operation function for trusted computing platform and has protected storage space. It is a domestic research in my country and corresponds to TPM.
  • TPCM (Trusted Platform Control Module) Trusted Platform Control Module enables the Trusted Platform Module to control platform resources.
  • TSS (TCG Software Stack) trusted software stack is the supporting software of TPM on the trusted computing platform. The main role of the TSS is to provide an interface for the operating system and application software to use the TPM.
  • TNC (Trusted Network Connect) trusted network connection technology is used to realize the trusted extension from the platform to the network to ensure the credibility of the network.

Preface

Recently, when I was visiting the Red Hat forum, I saw a concept TCB proposed by Lily Sterman. This is the first time I have come into contact with it. When I further studied the blog of the big brother, I found some new understandings and views on security and trustworthiness. It is wonderful, so here is a Chinese study note, and I will share it with you.

Guess you like

Origin blog.csdn.net/weixin_45264425/article/details/132381610