INCITS/ISO/IEC 11889-4 : 2009(R2014)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS
15-02-2020
12-01-2013
1. Scope
2. Normative references
3. Abbreviated Terms
4. Admin Startup and State
5. Admin Testing
6. Admin Opt-in
7. Admin Ownership
8. The Capability Commands
9. Auditing
10. Administrative Functions - Management
11. Storage functions
12. Migration
13. Maintenance Functions (optional)
14. Cryptographic Functions
15. Endorsement Key Handling
16. Identity Creation and Activation
17. Integrity Collection and Reporting
18. Changing AuthData
19. Authorization Sessions
20. Delegation Commands
21. Non-volatile Storage
22. Session Management
23. Eviction
24. Timing Ticks
25. Transport Sessions
26. Monotonic Counter
27. DAA commands
28. Deprecated commands
29. Deleted Commands
30. Bibliography
Describes the commands that allow software to communicate with and use the Trusted Platform Module (TPM), a device that enables trust in computing platforms in general. Also describes the command format as both the TPM and calling software must agree on the exact command format, as many of the commands require cryptographic authorization and the format of the authorization must be standardized.
Committee |
CS1
|
DocumentType |
Standard
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
ISO/IEC 11889-4:2015 | Identical |
ISO/IEC 8825-1:2015 | Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1: |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.