Technical Product Specification
Functional Architecture Intel® Workstation System SC5650SCWS TPS
Revision 1.2
Intel order number: E81822-002
54
Two general-purpose I/Os
Register bits provide software control of contender bit, power class bits, link active
control bit, and IEEE Std 1394a-2000 features.
Fabricated in advanced low-power CMOS process.
PCI and CardBus register support.
Isochronous receive dual-buffer mode.
Out-of-order pipelining for asynchronous transmit requests.
Register access fail interrupt when the PHY SCLK is not active.
PCI power-management D0, D1, D2, and D3 power states.
Initial bandwidth available and initial channels available registers.
PME support per 1394 Open Host Controller Interface Specification.
3.15 Trusted Platform Module (TPM)
3.15.1 Overview
Trusted Platform Module (TPM) is a hardware-based security device that addresses the growing
concern on boot process integrity and offers better data protection. TPM protects the system
start-up process by ensuring it is tamper-free before releasing system control to the operating
system. A TPM device provides secured storage to store data, such as security keys and
passwords. In addition, a TPM device has encryption and hash functions. The Intel
®
Workstation System SC5650SCWS implements TPM as per TPM PC Client specifications
revision 1.2 by the Trusted Computing Group (TCG).
A TPM device is affixed to the motherboard of the server and is secured from external software
attacks and physical theft. A pre-boot environment, such as the BIOS and operating system
loader, uses the TPM to collect and store unique measurements from multiple factors within the
boot process to create a system fingerprint. This unique fingerprint remains the same unless the
pre-boot environment is tampered with. Therefore, it is used to compare to future
measurements to verify the integrity of the boot process.
After the BIOS completes the measurement of its boot process, it hands off control to the
operating system loader and in turn to the operating system. If the operating system is TPM-
enabled, it compares the BIOS TPM measurements to those of previous boots to make sure the
system was not tampered with before continuing the operating system boot process. Once the
operating system is in operation, it optionally uses TPM to provide additional system and data
security (for example, Microsoft Vista* supports Bitlocker drive encryption).
3.15.2 TPM security BIOS
The BIOS TPM support conforms to the TPM PC Client Specific – Implementation Specification
for Conventional BIOS, version 1.2, and to the TPM Interface specification, version 1.2. The
BIOS adheres to the Microsoft Vista* BitLocker requirement. The role of the BIOS for TPM
security includes the following:
- Measures and stores the boot process in the TPM microcontroller to allow a TPM
enabled operating system to verify system boot integrity.
- Produces EFI and legacy interfaces to a TPM-enabled operating system for using TPM.