CAN/CSA-ISO/IEC 11889-1:16
Current
The latest, up-to-date edition.
Hardcopy , PDF
English
01-01-2016
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and Abbreviated Terms
5 Conventions
6 ISO/IEC 11889 Organization
7 Compliance
8 Changes from Previous Versions
9 Trusted Platforms
10 TPM Protections
11 TPM Architecture
12 TPM Operational States
13 TPM Control Domains
14 Primary Seeds
15 TPM Handles
16 Names
17 PCR Operations
18 TPM Command/Response Structure
19 Authorizations and Acknowledgments
20 Audit Session
21 Session-based encryption
22 Protected Storage
23 Protected Storage Hierarchy
24 Credential Protection
25 Object Attributes
26 Object Structure Elements
27 Object Creation
28 Object Loading
29 Object Creation in Reference Implementation
30 Context Management
31 Attestation
32 Cryptographic Support Functions
33 Locality
34 Hardware Core Root of Trust Measurement (H-CRTM)
Event Sequence
35 Command Audit
36 Timing Components
37 NV Memory
38 Multi-Tasking
39 Errors and Response Codes
40 General Purpose I/O
41 Minimums
Annex A (normative) - RSA
Annex B (normative) - ECC
Annex C (normative) - Support for SMx Family of Algorithms
Annex D (informative) - Key Generation
Annex E (informative) - Policy Examples
Annex F (informative) - Acknowledgements and contributors
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.