Home>Posts>Tech Explained>Intel Platform Trust Technology (PTT): TPM For The Masses

Intel Platform Trust Technology (PTT): TPM For The Masses

By ·Categories: Tech Explained·Published On: July 6th, 2021·3.1 min read·

In the last few years, Intel Platform Trust Technology (PTT) has truly arrived. For years, the last word in securing personal computers, industrial PCs and servers has been the Trusted Platform Module (TPM) specification. TPM established a set of standards and interfaces that enable system makers to bake their digital bona fides into system hardware.

By employing unique cryptographic keys burned into physical media soldered directly onto the motherboard, TPM creates what is known as the “root of trust.” From that foundation, operating system makers like Microsoft can enable secure, whole-disk encryption to lock up data even if a disk is removed, and enable system checks that verify low-level boot code before allowing it to execute.

This model for system security got a face-lift when Intel introduced the Intel Platform Trust Technology (PTT) architecture, which implements TPM in system firmware. To your operating system and applications, PTT looks and acts like TPM. The difference is, computers with Intel PTT don’t require a dedicated processor or memory. Instead they rely on secure access to the system’s host processor and memory to perform low-level system authentication and verification.

The result: PTT is being deployed on low-power PCs, tablets and other devices that in the past could not bear the additional cost, complexity, power consumption or required physical space that comes with hardware-based TPM

Understanding TPM

TPM is currently in version 2.0, and its role has become more vital as cyber threats continue to target the lowest levels of system operation—including the Master Boot Record, system firmware and operating system fileswhere traditional anti-malware solutions can be vulnerable.

TPM works by storing protected key information in a tamper-proof chip that includes a unique Endorsement Key baked into the silicon at manufacturelike a digital fingerprintto authenticate host system hardware. A dedicated cryptographic microprocessor processes key data and verifies the integrity of low-level system assets like boot files and system firmware. If a change is detected, TPM prevents the compromised files or software from loading, halting attacks before they can start.

Implementing TPM in dedicated hardware has a key benefit. TPM isolates the security infrastructure from the host system, making it exceedingly difficult to spoof, tamper or defeat. But it adds cost and complexity to system designs, which means that a lot of devices that could benefit from this level of security, simply don’t have it.

Inside Platform Trust Technology

PTT vs TPM Comparison

That shortfall is changing with firmware-based implementations of TPM. Intel’s PTT was Introduced in 2013 on select fourth-generation Intel Core processors and chipsets, including Intel Haswell ULT multichip packages, as well as on Atom-based, system-on-a-chip solutions like Bay Trail. PTT enables low-cost and low-power devices to support the same root of trust concepts enabled by hardware-based TPM. Furthermore, it supports all of Microsoft’s requirements for firmware Trusted Platform Module (fTPM) 2.0.

A similar implementationARM’s TrustZone schemeprovides TPM capabilities for low-power, ARM processor-based portable devices like tablets.

PTT is especially important in the industrial PC space. It lets organizations establish the same, rigorous levels of security in its compact, fanless systems and devices as it does for desktop PCs, workstations and servers. PTT-enabled IPCs radically shrink the attack surface for systems that often sit unattended in remote or public spaces.

There was a time when IT managers were forced to choose between IPCs with robust security or compact, low-power designs. Computers with Intel PTT put an end to that need to choose. If you’d like to learn more, download our one-pager (link below) and contact our technical sales team who can answer all your security questions. 

PTT White Paper Download

Note: This article was originally written on December 20, 2017. It was updated for content on July 06, 2021. 


About the Author: Darek Fanton

Darek is the Communications Manager at OnLogic. His passion for both journalism and technology has led him from the newsrooms of local papers to the manufacturing floor of IBM. His background in news gathering has him always on the lookout for the latest in emerging tech and the best ways to share that information with readers. In addition to his affinity for words, Darek is a music lover, juggler and huge fan of terrible jokes.
Follow OnLogic on LinkedIn

Leave A Comment


Have a project? Let's talk

More Articles


Learn the 5 ways Fanless Computers can help your business

Get the Whitepaper
View All Articles

OnLogic Industrial Computers

Discover OnLogic's multitude of industrial computers that will help you to advance your IoT project

Shop OnLogic

Learn more at OnLogic.com

OnLogic Industrial PCs: Designed to last. Built to order. Delivered in days. Visit our online store at OnLogic.com