{"id":7499,"date":"2019-09-20T16:41:00","date_gmt":"2019-09-20T16:41:00","guid":{"rendered":"https:\/\/teguar.com\/eu\/?p=7499"},"modified":"2025-10-29T15:18:24","modified_gmt":"2025-10-29T15:18:24","slug":"what-is-a-tpm-computer-chip","status":"publish","type":"post","link":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/","title":{"rendered":"What is Trusted Platform Module?"},"content":{"rendered":"\n<p><img decoding=\"async\" alt=\"TPM chip\" src=\"https:\/\/teguar.com\/eu\/wp-content\/uploads\/sites\/2\/2020\/08\/TPM-chip.jpg\" style=\"float:right;padding:10px\">Trusted Platform Module (TPM) chips are used in all types of computers from personal laptops, to business computers, to industrial panel PCs, to medical computers. TPM secures your data with a secure algorithm integrated into your computer hardware. It provides a higher level of security than software alone and protects your data from hackers, malware and thieves. This is especially important for industrial computers, which can store massive amounts of data about your business, and medical computers, which can store sensitive patient data. TPM is widely accepted as the most secure method of protecting information stored on a computer. This blog provides an overview of TPM and how it is used in industrial and medical computers. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-who-created-tpm\">Who Created TPM?<\/h3>\n\n\n\n<p><a href=\"https:\/\/trustedcomputinggroup.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trusted Computing Group<\/a>&nbsp;(TCG) created TPM in 2003, the first widely used version being TPM 1.1. TPM 1.1 was updated to TPM 1.2, and then to TPM 2.0, the current version and standard. TPM 2.0 is standardized by ISO (International Organization for Standardization) and IEC (International Exchange Commission) under ISO\/IEC 11889.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-is-tpm\">What is TPM?<\/h3>\n\n\n\n<p>There are five types of TPM: Discrete, Integrated, Firmware, Software, and Virtual. You can read about them in this&nbsp;<a href=\"https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/2019_TCG_TPM2_BriefOverview_DR02web.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">brief from TCG<\/a>, but this blog will focus on Discrete TPM, because it is the most common form, it\u2019s the most secure form, and it\u2019s what we use in Teguar computers.<\/p>\n\n\n\n<p>Discrete TPM is in the form of surface mount integrated circuit and is mated to the computer\u2019s motherboard. Other types of TPM are favorable for smaller devices, such as smart phones, as they would not take up valuable real state on smaller computing devices, but they do not have the full tamper proof protection of Discrete TPMs. Many computers, including several product lines from Teguar, come with a TPM chip by default, but the TPM is inactive until it is enabled in the BIOS. It will not affect the computer in anyway, the chip will lay dormant, until activated. However, when activated, a user may notice a slower boot up process with the OS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-does-tpm-do\">What does TPM do?<\/h3>\n\n\n\n<p><img decoding=\"async\" alt=\"Computer monitor filled with code and highlighted phrases, including Data Breach, Cyber Attack, System Safety Compromised\" src=\"https:\/\/teguar.com\/eu\/wp-content\/uploads\/sites\/2\/2020\/08\/TPM-security-cyber-attack.jpg\" style=\"float:left;padding:10px\">TPM is a hardware based security feature and it safeguards the data on your computer. It ensures that no unintended users gain access to your data by either stealing your computer or hard drive or via a software attack or brute force attack. A brute force attack is a \u201ctrial and error method,\u201d as explained by&nbsp;<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/brute-force-cracking\" target=\"_blank\" rel=\"noreferrer noopener\">SearchSecurity.com<\/a>, and the attacks \u201ccommonly use automated tools to guess various combinations of usernames and passwords until they find the correct input.\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/2019_TCG_TPM2_BriefOverview_DR02web.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TCG explains<\/a>&nbsp;that Discrete TPM protects your device from being hacked, \u201cvia even sophisticated methods. To accomplish this, a discrete chip is designed, built and evaluated for the highest level of security that can resist tampering with the chip, including probing it and freezing it with all sorts of sophisticated attacks.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-how-does-tpm-work\">How does TPM Work?<\/h3>\n\n\n\n<p>When you boot a computer, TPM checks the state of the computer and the state of the computer\u2019s environment. If the computer is in a trustworthy state (i.e. it has not been tampered with), it will operate normally. If the computer is not in a trustworthy state, it will not boot, meaning there is no way to access or extract any data from the computer. Things that would trigger an untrustworthy state include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>the computer hard drive has been placed into another computer (Someone may do this to bypass or deactivate a password protected log-in),<\/li>\n\n\n\n<li>the computer is being booted and accessed remotely from an unauthorized source,<\/li>\n\n\n\n<li>the computer has been attacked by a software virus, or<\/li>\n\n\n\n<li>someone is using a brute-force attack to access the computer.<\/li>\n<\/ul>\n\n\n\n<p>TPM works by creating encryption codes. Half of the encryption key is stored on the TPM chip and the other half is stored on the computer hard drive. Unless programmed to do so, the TPM chip will never release its half of the encryption key, meaning without that TPM chip, the computer will not boot.<\/p>\n\n\n\n<p>Firmware such as Microsoft\u2019s BitLocker requires TPM.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-countermeasures\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft explains<\/a>, \u201cBitLocker uses the enhanced security capabilities of the TPM to make data accessible only if the computer\u2019s BIOS firmware code and configuration, original boot sequence, boot components, and BCD configuration all appear unaltered and the encrypted disk is located in the original computer.\u201d If any of these things are changed, the computer will not boot.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-else-can-tpm-do\">What else can TPM do?<\/h3>\n\n\n\n<p><img decoding=\"async\" alt=\"Depiction of a TPM connecting hardware in a room\" src=\"https:\/\/teguar.com\/eu\/wp-content\/uploads\/sites\/2\/2020\/08\/healthcare-cyber-security-tpm.jpg\" style=\"float:right;padding:10px\">Besides monitoring the health and security of the computer\u2019s boot environment, other functions of TPM include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>monitoring specific applications on your computer, like email and file systems,<\/li>\n\n\n\n<li>denying a user access when suspicious changes are detected,<\/li>\n\n\n\n<li>granting remote access to a trusted third party, and<\/li>\n\n\n\n<li>verifying system updates for an entire fleet of computers.<\/li>\n<\/ul>\n\n\n\n<p>These functions are particularly important for industrial and medical computers, as there may be hundreds or even of thousands of computers to update and secure. Without TPM, updates can still be rolled out to a fleet of computers by providing access to the computer network, but this leaves the system vulnerable to hackers. Or, each computer can be updated at the hardware level, manually and individually, which may be very time consuming. TPM ensures the computer fleet is only updated by a verified source.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-where-is-tpm-used\">Where is TPM used?<\/h3>\n\n\n\n<p>In a recent&nbsp;<a href=\"https:\/\/trustedcomputinggroup.org\/trusted-computing-enters-new-frontiers\/\" target=\"_blank\" rel=\"noreferrer noopener\">blog from TCG<\/a>, the company says \u201call Windows laptops, desktops, and servers include a TPM.\u201d TPM has become standard in many consumer grade computers over the last few years, but the blog goes on to explain new frontiers of TPM stating that \u201cin February [2019], the TPM was recommended for use in securing high-risk industrial devices in the newly released international standard IEC 62443-4-2.\u201d TPM prevents hackers from getting sensitive data about your business, and it also prevents them from manipulating or freezing your machines.<\/p>\n\n\n\n<p>In the automotive industry, TPM is used to guard a vehicle\u2019s software. If someone can hack the software of your vehicle, they can control the vehicle\u2019s break system, GPS and more. Likewise, if a hacker gains access to your machinery, they can freeze or alter the machine\u2019s behavior.<\/p>\n\n\n\n<p>In healthcare, TPM is important for protecting patient data. It provides an extra level of security if your computer or tablet is stolen or lost and it protects your IT infrastructure from unauthorized users. While TPM is the hardware focused part of the security measure, Intel VPro is the software that gives a user control and adds more features to TPM. VPro can do a secured remote diagnostic through TPM. For example, say an onboard computer in an ambulance has a problem, as long as there is internet, the hospital IT can run a check and reboot remotely without the ambulance ever returning to the hospital.&nbsp;<\/p>\n\n\n\n<p>To learn more or discuss your project&nbsp;<a href=\"https:\/\/teguar.com\/eu\/contactus\" target=\"_blank\" rel=\"noreferrer noopener\">contact us<\/a>.<\/p>\n\n\n<div class=\"hs-cta-embed hs-cta-embed-167100924447\" style=\"max-width:100%; max-height:100%; width:1410px;height:318.8999938964844px\" data-hubspot-wrapper-cta-id=\"167100924447\">\n  <link rel=\"stylesheet\" href=\"https:\/\/js.hscta.com\/embeddable_cta_placeholder_v1.css\">\n<div class=\"hs-cta-loading-dot__container\">\n<div class=\"hs-cta-loading-dot\"><\/div>\n<div class=\"hs-cta-loading-dot\"><\/div>\n<div class=\"hs-cta-loading-dot\"><\/div>\n<\/p><\/div>\n<div class=\"hs-cta-embed__skeleton\"><\/div>\n<picture><source srcset=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" media=\"(max-width: 480px)\" \/><img decoding=\"async\" alt=\"Let's talk about your project. &nbsp; Enter your name and a convenient contact email address and a Teguar account manager will reach out to you within one business day to get your project started.\" loading=\"lazy\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/21497995\/interactive-167100924447.png\" style=\"height: 100%; width: 100%; object-fit: fill\" onerror=\"this.style.display='none'\" \/>\n  <\/picture>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-teguar-computers-with-tpm\">Teguar Computers with TPM<\/h3>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Series<\/strong><\/td><td><strong>Availability<\/strong><\/td><td><strong>Version<\/strong><\/td><td><strong>Note<\/strong><\/td><\/tr><tr><td><a href=\"https:\/\/teguar.com\/eu\/industrial-computer\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Industrial&nbsp;Computers<\/a><\/td><td><strong>Industrial<\/strong><\/td><td><strong>Industrial<\/strong><\/td><td><strong>Industrial<\/strong><\/td><\/tr><tr><td>TP-2920<\/td><td>Standard<\/td><td>TPM 1.2<\/td><td>&nbsp;<\/td><\/tr><tr><td>TP-4040<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>(Exception of TP-4040-10)<\/td><\/tr><tr><td>TP-5040<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>(Exception of TP-5040-10)<\/td><\/tr><tr><td>TP-4010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TP-5010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TP-5045<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TSX-5010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TR-5520<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TR-0810<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TRT-4380<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TRT-5180<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/teguar.com\/eu\/waterproof-computers\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Waterproof Computers<\/a><\/td><td><strong>Waterproof<\/strong><\/td><td><strong>Waterproof<\/strong><\/td><td><strong>Waterproof<\/strong><\/td><\/tr><tr><td>TS-4010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TS-4510<\/td><td>Option<\/td><td>TPM 2.0<\/td><td><\/td><\/tr><tr><td>TS-5010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TS-5045<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TS-5610<\/td><td>Option<\/td><td>TPM 2.0<\/td><td><\/td><\/tr><tr><td>TSP-5045<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TWR-2920<\/td><td>Standard<\/td><td>TPM 1.2<\/td><td>&nbsp;<\/td><\/tr><tr><td>TWB-5520<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/teguar.com\/eu\/medical-computers\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Medical Computers<\/a><\/td><td><strong>Medical<\/strong><\/td><td><strong>Medical<\/strong><\/td><td><strong>Medical<\/strong><\/td><\/tr><tr><td>TM-5040<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td><\/td><\/tr><tr><td>TM-5557<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TM-5510<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TM-5010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TMT-3495<\/td><td>Standard<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TMB-5010<\/td><td>Option<\/td><td>TPM 2.0<\/td><td>&nbsp;<\/td><\/tr><tr><td>TMB-5710<\/td><td>Option<\/td><td>TPM 2.0<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Sources:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Arthur W., Challener D., Goldman K. (2015) History of the TPM. In: A Practical Guide to TPM 2.0. Apress, Berkeley, CA\u00a0\u00a0<a href=\"https:\/\/doi.org\/10.1007\/978-1-4302-6584-9_1\" target=\"_blank\" rel=\"noreferrer noopener\">doi.org\/10.1007\/978-1-4302-6584-9_1<\/a><\/li>\n\n\n\n<li>\u201cBitLocker Countermeasures (Windows 10).\u201d (Windows 10) | Microsoft Docs, 27 Feb. 2019,\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-countermeasures\" target=\"_blank\" rel=\"noreferrer noopener\">docs.microsoft.com\/en-us\/windows\/security\/information-protection\/bitlocker\/bitlocker-countermeasures.<\/a><\/li>\n\n\n\n<li>Bond, Mike, and Peter Landrock. \u201cThe Trusted Platform Module Explained.\u201d Cryptomathic, 12 Sept. 2011,\u00a0<a href=\"https:\/\/www.cryptomathic.com\/news-events\/blog\/the-trusted-platform-module-explained\" target=\"_blank\" rel=\"noreferrer noopener\">cryptomathic.com\/news-events\/blog\/the-trusted-platform-module-explained.<\/a><\/li>\n\n\n\n<li>Hoffman, Chris. \u201cWhat Is a TPM, and Why Does Windows Need One For Disk Encryption?\u201d How-To Geek, 11 July 2017,\u00a0<a href=\"http:\/\/www.howtogeek.com\/237232\/what-is-a-tpm-and-why-does-windows-need-one-for-disk-encryption\/\" target=\"_blank\" rel=\"noreferrer noopener\">howtogeek.com\/237232\/what-is-a-tpm-and-why-does-windows-need-one-for-disk-encryption\/.<\/a><\/li>\n\n\n\n<li>Rouse, Margaret. \u201cWhat Is Brute Force Attack? &#8211; Definition from WhatIs.com.\u201d SearchSecurity, Jan. 2019,\u00a0<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/brute-force-cracking\" target=\"_blank\" rel=\"noreferrer noopener\">searchsecurity.techtarget.com\/definition\/brute-force-cracking.<\/a><\/li>\n\n\n\n<li>\u201cTPM 2.0 A Brief Introduction.\u201d Trusted Computing Group, Jun. 2019,\u00a0<a href=\"https:\/\/trustedcomputinggroup.org\/wp-content\/uploads\/2019_TCG_TPM2_BriefOverview_DR02web.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">trustedcomputinggroup.org\/wp-content\/uploads\/2019_TCG_TPM2_BriefOverview_DR02web.pdf<\/a><\/li>\n\n\n\n<li>\u201cWhat Can You Do With the Trusted Platform Module (TPM)?\u201d Trusted Computing Group, 1 Jan. 2015,\u00a0<a href=\"https:\/\/trustedcomputinggroup.org\/what-can-you-do-with-the-trusted-platform-module-tpm\/\" target=\"_blank\" rel=\"noreferrer noopener\">trustedcomputinggroup.org\/what-can-you-do-with-the-trusted-platform-module-tpm\/.<\/a><\/li>\n\n\n\n<li>\u00a0\u201cTrusted Computing Enters New Frontiers\u201d Trusted Computing Group, 5 Apr. 2019,\u00a0<a href=\"https:\/\/trustedcomputinggroup.org\/trusted-computing-enters-new-frontiers\/\" target=\"_blank\" rel=\"noreferrer noopener\">trustedcomputinggroup.org\/trusted-computing-enters-new-frontiers\/.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Trusted Platform Module (TPM) chips are used in all types of computers from personal laptops, to business computers, to industrial panel PCs, to medical computers. TPM secures your data with a secure algorithm integrated into your computer hardware. It provides a higher level of security than software alone and protects your data from hackers, malware [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":7502,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2283],"tags":[2333,2279,2297,2327,2313],"class_list":["post-7499","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-articles-industry-trends","tag-cybersecurity","tag-industrial-computer","tag-medical-computer","tag-tpm-computer","tag-waterproof-computers"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a Trusted Platform Module? TPM Definition | Teguar<\/title>\n<meta name=\"description\" content=\"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Trusted Platform Module?\" \/>\n<meta property=\"og:description\" content=\"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\" \/>\n<meta property=\"og:site_name\" content=\"Teguar\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-20T16:41:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T15:18:24+00:00\" \/>\n<meta name=\"author\" content=\"Tom Poplawski\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Poplawski\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\"},\"author\":{\"name\":\"Tom Poplawski\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f\"},\"headline\":\"What is Trusted Platform Module?\",\"datePublished\":\"2019-09-20T16:41:00+00:00\",\"dateModified\":\"2025-10-29T15:18:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\"},\"wordCount\":1414,\"image\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"cybersecurity\",\"industrial computer\",\"medical computer\",\"TPM Computer\",\"waterproof computers\"],\"articleSection\":[\"Technical Articles &amp; Industry Trends\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\",\"url\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\",\"name\":\"What is a Trusted Platform Module? TPM Definition | Teguar\",\"isPartOf\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-09-20T16:41:00+00:00\",\"dateModified\":\"2025-10-29T15:18:24+00:00\",\"author\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f\"},\"description\":\"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.\",\"breadcrumb\":{\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/teguar.com\/eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Trusted Platform Module?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/#website\",\"url\":\"https:\/\/teguar.com\/eu\/en\/\",\"name\":\"Teguar\",\"description\":\"Industrial PCs, Medical Computers, and Rugged Tablets\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/teguar.com\/eu\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f\",\"name\":\"Tom Poplawski\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g\",\"caption\":\"Tom Poplawski\"},\"url\":\"https:\/\/teguar.com\/eu\/en\/author\/tom-poplawski\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is a Trusted Platform Module? TPM Definition | Teguar","description":"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/","og_locale":"en_US","og_type":"article","og_title":"What is Trusted Platform Module?","og_description":"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.","og_url":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/","og_site_name":"Teguar","article_published_time":"2019-09-20T16:41:00+00:00","article_modified_time":"2025-10-29T15:18:24+00:00","author":"Tom Poplawski","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Poplawski","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#article","isPartOf":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/"},"author":{"name":"Tom Poplawski","@id":"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f"},"headline":"What is Trusted Platform Module?","datePublished":"2019-09-20T16:41:00+00:00","dateModified":"2025-10-29T15:18:24+00:00","mainEntityOfPage":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/"},"wordCount":1414,"image":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage"},"thumbnailUrl":"","keywords":["cybersecurity","industrial computer","medical computer","TPM Computer","waterproof computers"],"articleSection":["Technical Articles &amp; Industry Trends"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/","url":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/","name":"What is a Trusted Platform Module? TPM Definition | Teguar","isPartOf":{"@id":"https:\/\/teguar.com\/eu\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage"},"image":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-09-20T16:41:00+00:00","dateModified":"2025-10-29T15:18:24+00:00","author":{"@id":"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f"},"description":"A summary of how the Trusted Platform Module (TPM) works and how it is used in medical and industrial computer hardware.","breadcrumb":{"@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/teguar.com\/eu\/en\/what-is-a-tpm-computer-chip\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/teguar.com\/eu\/en\/"},{"@type":"ListItem","position":2,"name":"What is Trusted Platform Module?"}]},{"@type":"WebSite","@id":"https:\/\/teguar.com\/eu\/en\/#website","url":"https:\/\/teguar.com\/eu\/en\/","name":"Teguar","description":"Industrial PCs, Medical Computers, and Rugged Tablets","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/teguar.com\/eu\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/teguar.com\/eu\/en\/#\/schema\/person\/c9d38e92ac067e0d6df323aa0cf15f7f","name":"Tom Poplawski","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/41633ae2ec4a64eb2f35f01606a774c5d1b4fc00c54aa7968c3bfc8e43aa2b46?s=96&d=mm&r=g","caption":"Tom Poplawski"},"url":"https:\/\/teguar.com\/eu\/en\/author\/tom-poplawski\/"}]}},"_links":{"self":[{"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/posts\/7499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/comments?post=7499"}],"version-history":[{"count":1,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/posts\/7499\/revisions"}],"predecessor-version":[{"id":2242465,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/posts\/7499\/revisions\/2242465"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/media?parent=7499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/categories?post=7499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/teguar.com\/eu\/en\/wp-json\/wp\/v2\/tags?post=7499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}