The difference between TCM and TPM

The so-called TPM refers to a security chip that meets the TPM standard, which can effectively protect the PC and prevent illegal users from accessing it.

According to the embedded chip technology, a secure chip called Trusted Cryptography Module (TCM) is constructed by using the cryptographic algorithm and engine independently developed in China.

Total production maintenance (abbreviation of Total Productive Maintenance)

When it comes to trusted computing, we can't help but mention TPM security chip. The so-called TPM security chip refers to a security chip that meets TPM standards, which can effectively protect the PC and prevent illegal users from accessing it. Trusted Computing Organization (TCG) has established TPM standard. The predecessor of TCG is the Trusted Computing Platform Alliance (TCPA) jointly established by several IT giants. In March 2003, TCPA was reorganized into a trusted computing organization.

TCG is a non-profit organization dedicated to establishing trusted computing standards. It reconstructs a credible computer platform standard from all aspects of PC platform such as secure BIOS, secure hardware, secure operating system and secure network connection. As the foundation of security industry, TCG standard will penetrate into all fields of IT, including PC platform (desktop and notebook), mobile phone platform, trusted network access and application middleware, server platform, storage system and application software.

TCG put forward TPM standard, and the latest version is 1.2. The chip conforming to TPM standard should first have the function of generating encryption and decryption keys, in addition, it should be able to encrypt and decrypt data at high speed, and act as an auxiliary processor to protect BIOS and operating system from being modified.

Although TCG is a non-profit organization and TPM technology is open, international giants such as Microsoft, Intel and IBM still hold the core technology, so adopting TPM standard security equipment will pose a great threat to national information security.

TMC (Traditional Chinese Medicine)

From the perspective of security strategy, if foreign TPM technology is adopted, China's security system will be controlled by others, and all the information generated by China's future standard computers will not be a secret to foreigners, so it is impossible to talk about the dominance of security technology and industry. Besides, we must pay the patent fee. Therefore, domestic industrial and academic circles have expressed the same aspiration: independent and reliable computing technology systems and standards must be established. Only by having an independent and reliable computing technology system and laying a solid foundation for the national information security infrastructure can we ensure the ability and means to protect secrets and sovereignty in the future. Only by mastering these key technologies can we enhance the core competitiveness of China's information security.

Although there is a certain gap between China's information technology and international advanced technology. However, China and other international organizations are researching and deploying trusted computing platforms almost simultaneously. Among them, cryptography is the most important core technology for deploying trusted computing systems. The specific scheme is to build a secure chip called Trusted Cryptography Module (TCM) based on the cryptographic algorithm and engine independently developed in China and according to the embedded chip technology.

This is a trusted computing standard product with completely independent intellectual property rights independently developed according to China's cryptographic algorithm. Some insiders said that China missed the opportunity to develop CPU and operating system with independent intellectual property rights, and TCM is the last line of defense for China's information security.

TCM was jointly launched by twelve manufacturers, including Great Wall, ZTE, Lenovo, Tongfang, Founder and Asahi, and received strong support from the State Cryptography Administration. The role of TCM security chip in the system platform is to provide basic security services for the system platform and software, and to establish a more secure and reliable system platform environment.