• There are no items in your cart

INCITS/ISO/IEC 11889-4 : 2009(R2014)

Superseded

Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by

INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS

Superseded date

15-02-2020

Published date

12-01-2013

Sorry this product is not available in your region.

1. Scope
2. Normative references
3. Abbreviated Terms
4. Admin Startup and State
5. Admin Testing
6. Admin Opt-in
7. Admin Ownership
8. The Capability Commands
9. Auditing
10. Administrative Functions - Management
11. Storage functions
12. Migration
13. Maintenance Functions (optional)
14. Cryptographic Functions
15. Endorsement Key Handling
16. Identity Creation and Activation
17. Integrity Collection and Reporting
18. Changing AuthData
19. Authorization Sessions
20. Delegation Commands
21. Non-volatile Storage
22. Session Management
23. Eviction
24. Timing Ticks
25. Transport Sessions
26. Monotonic Counter
27. DAA commands
28. Deprecated commands
29. Deleted Commands
30. Bibliography

Describes the commands that allow software to communicate with and use the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general. Also describes the command format as both the TPM and calling software must agree on the exact command format, as many of the commands require cryptographic authorization and the format of the authorization must be standardized.

Committee
CS1
DocumentType
Standard
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy

Standards Relationship
ISO/IEC 11889-4:2015 Identical

ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.