Security is more important than ever in an ever changing IoT landscape. Keeping your business safe should be a top priority in the new year. One of the best ways to do this is through a Trusted Platform Module. Today, let’s dive into TPM 2.0, its benefits, and how to take advantage of it.
An Intro To TPM
A Trusted Platform Module, or TPM, is a security measure in the form of a microprocessor that protects your data using cryptographic methods. Benefits of TPM are numerous with regards to security and protecting your data. Using cryptographic keys, a TPM can help you prove your identity, protect your device, and guard against firmware or ransomware attacks. Cryptographic keys encrypt important data or information to keep your device secure, much like traditional cryptography codes used in secret communication.
Why Use TPM 2.0?
TPM 2.0 is meant to act as a more robust version of TPM. The main theme of TPM 2.0 is that it can simply do more. What does “doing more” mean?
More Cryptographic Support
TPM 2.0 can handle more cryptographic formats than the previous version, 1.2. This includes all formats, like asymmetric, symmetric, and hash. For example, TPM 1.2 does not support SHA 2-256, while TPM 2.0 can.
Different Hierarchy Behavior
The most striking difference between TPM 1.2 and 2.0 is the way it handles hierarchies. Control is split into two different hierarchies for encryption and signing, the endorsement and the storage hierarchy. 2.0 also contains a Platform Hierarchy for maintenance and a Null hierarchy. Besides simply having more hierarchies, TPM 2.0 uses a different owner for each hierarchy. This means that TPM 2.0 can support four different authorizations rather than a single one through a single owner, as in TPM 1.2.
Anti-Hammering Protection
TPM 2.0 has more robust anti-hammering protection, to prevent brute forcing of information like passwords or login details. A chip will lock after a certain number of incorrect authorization attempts to stop a false entry.
Sleek and Secure: The Interceptor Modular Line of IIoT Edge Devices and TPM 2.0
The revolutionary Interceptor modular line of IIoT edge devices uses TPM 2.0 in the Interceptor as well as the Paradox. TPM 2.0 can be added as an extra feature for added peace of mind. More than just secure, the Interceptor and the Paradox are hardy IIoT devices with a plethora of powerful tech:
The Interceptor
- Operating Systems: Ubuntu, Debian, and ROS2.
- Memory and Storage: Options of 1 GB or 2 GB DDR3 RAM, and up to 256GB eMMC Flash Storage.
- Processor and Graphics: ARM® Cortex®-A9 32-Bit RISC Processor with SGX530 Graphics Engine.
- Connectivity: 2.4GHz Wi-Fi, Bluetooth 4.2 BLE/EDR.
- Display Interface: 16-bit RGB, convertible to HDMI or LVDS.
- Industrial Rating: Capable of operating in extreme temperatures from -40°C to 105°C.
- Security: Crypto Hardware Accelerators and optional Trusted Platform Module (TPM 2.0).
The Paradox
- CPU: Arm® 32-bit Cortex®-M4 with FPU, ART Accelerator.
- Storage: 1Gb NAND Flash Memory with TPM 2.0 support.
- Wi-Fi and Bluetooth: Dual-band support with high transmit power and sensitivity.
- IMU: High-Precision 6-Axis MEMS MotionTracking® Device.
- Temperature Range: Operates between -40 ºC to +85 ºC.
The stackable Interceptor line of modular edge devices can perform communication, data retrieval, data storage functionality, and more, with a myriad of applications. This powerful modular line of Industrial IoT devices is designed to be customizable and scalable. Need a customized Interceptor stackup? Not a problem. With the Interceptor and Paradox plus TPM 2.0, you can rest assured that your devices will virtually unhackable, while still being reliable and efficient.
If you’re interested in the Interceptor’s capabilities, contact BlackPearl Technology at Interceptor.io to learn more.
Step into the future of IIoT with the Interceptor.