Foreword
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and Abbreviated Terms
5 Conventions
6 ISO/IEC 11889 Organization
7 Compliance
8 Changes from Previous Versions
9 Trusted Platforms
10 TPM Protections
11 TPM Architecture
12 TPM Operational States
13 TPM Control Domains
14 Primary Seeds
15 TPM Handles
16 Names
17 PCR Operations
18 TPM Command/Response Structure
19 Authorizations and Acknowledgments
20 Audit Session
21 Session-based encryption
22 Protected Storage
23 Protected Storage Hierarchy
24 Credential Protection
25 Object Attributes
26 Object Structure Elements
27 Object Creation
28 Object Loading
29 Object Creation in Reference
Implementation
30 Context Management
31 Attestation
32 Cryptographic Support Functions
33 Locality
34 Hardware Core Root of Trust Measurement
(H-CRTM) Event Sequence
35 Command Audit
36 Timing Components
37 NV Memory
38 Multi-Tasking
39 Errors and Response Codes
40 General Purpose I/O
41 Minimums
Annex A (informative) - Policy Examples
Annex B (normative/informative) - RSA
Annex C (normative/informative) - ECC
Annex D (normative/informative) - Support for
SMx Family of Algorithms
Annex E (informative) - Acknowledgements
and contributors
Annex F (informative) - Bibliography