<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: TPM 2.0 on Bay Trail in Embedded Intel Atom® Processors</title>
    <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268542#M3336</link>
    <description>&lt;P&gt;Thank you very much for your response Josue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version TPM 1.2 mentioned in section 34.2.1 refers to using a TPM device over the LPC interface not the TPM functionality built into the TXE.  We want to use the TPM2.0 functionality offered by the Intel PTT as part of the TXE firmware.  Is there any documentation on how to enable that functionality?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Fred Young&lt;/P&gt;</description>
    <pubDate>Wed, 25 Feb 2015 22:05:00 GMT</pubDate>
    <dc:creator>FYoun1</dc:creator>
    <dc:date>2015-02-25T22:05:00Z</dc:date>
    <item>
      <title>TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268540#M3334</link>
      <description>&lt;P&gt;I'm hoping that someone can help use with some TXE questions for the Bay Trail Soc. We plan to use coreboot to boot Linux via a custom coreboot payload with an E3845 Soc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've been trying to determine how to make use of the TPM 2.0 functionality that's built into the TXE device on the Bay Trail Soc. &lt;/P&gt;&lt;P&gt;                       &lt;/P&gt;&lt;P&gt;We're able to start the MEI Linux drivers from drivers/misc/mei and run the TXEInfo command. Can we use this driver to issue TPM 2.0 requests to the TXE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this doesn't work; can we use the TPM drivers from drivers/char/tpm instead? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the tpm_tis driver work on Bay Trail? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do we need to add a TPM2 table to ACPI so that the tpm_tis driver sees the TXE device? We tried using Linux kernel 3.19 with the latest tpmdd-devel patches (which include Jarkko Sakkinen's patches to add TPM 2.0 support to the tpm driver) and made sure to enable CONFIG_TCG_TPM, CONFIG_TCG_TIS, and CONFIG_TCG_CRB in our kernel. However, the TPM 2.0 device was not seen by the tpm_tis driver (though the TXEInfo command worked fine).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there sample TPM 2.0 source available that makes use of these drivers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 19:19:43 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268540#M3334</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-02-24T19:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268541#M3335</link>
      <description>&lt;P&gt;Hello Fred Young&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to &lt;A href="http://www.intel.com/content/www/us/en/intelligent-systems/bay-trail/atom-e3800-family-datasheet.html"&gt;http://www.intel.com/content/www/us/en/intelligent-systems/bay-trail/atom-e3800-family-datasheet.html&lt;/A&gt; Intel® Atom™ Processor E3800 Product Family datasheet, section 34.2.1 Features, family e3800 supports only TPM 1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check the chapter 3 from &lt;A href="http://pcache-www.intel.com/cd/00/00/55/58/555803_TPM2_Migration_Guide.pdf?HashKey=1424810059_219bc004154b1e57e551238f83c6d38f"&gt;http://pcache-www.intel.com/cd/00/00/55/58/555803_TPM2_Migration_Guide.pdf?HashKey=1424810059_219bc004154b1e57e551238f83c6d38f&lt;/A&gt; TPM2 Migration Guide, and section 1.2 references.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at it and do not hesitate to contact me if you have any question!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 21:59:58 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268541#M3335</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-02-24T21:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268542#M3336</link>
      <description>&lt;P&gt;Thank you very much for your response Josue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Version TPM 1.2 mentioned in section 34.2.1 refers to using a TPM device over the LPC interface not the TPM functionality built into the TXE.  We want to use the TPM2.0 functionality offered by the Intel PTT as part of the TXE firmware.  Is there any documentation on how to enable that functionality?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Fred Young&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 22:05:00 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268542#M3336</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-02-25T22:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268543#M3337</link>
      <description>&lt;P&gt;Hi, Fred Young&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There may be a need to access some Intel Confidential content. For example section &lt;I&gt;7 Intel® Platform Trust Technology (PTT) from &lt;/I&gt;Document Number: 541924:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;Bay Trail-T (Entry Type 3) Platform Intel® Trusted Execution Engine (Intel® TXE) Firmware Compliance Guide &lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you please apply for an EDC Privileged account: &lt;A href="https://www-ssl.intel.com/content/www/us/en/forms/intelligent-systems/registration-po.html"&gt;https://www-ssl.intel.com/content/www/us/en/forms/intelligent-systems/registration-po.html&lt;/A&gt; Apply for an Intel® Embedded Design Center Privileged Account.  Once you submit it, please let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Feb 2015 23:19:28 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268543#M3337</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-02-25T23:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268544#M3338</link>
      <description>&lt;P&gt;Thanks for your reply, Josue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have access to the document you referred to. Section 7 of the document describes test cases that can be run under Windows to ensure that TPM/PTT is working. There's nothing in the document that indicates how to start TPM/PTT in the TXE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know how enable TPM/PTT in the TXE?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Fred Young&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 04:32:39 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268544#M3338</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-02-26T04:32:39Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268545#M3339</link>
      <description>&lt;P&gt;Hello Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are investigating this issue, I will let you know as soon we have any update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 19:30:51 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268545#M3339</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-02-26T19:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268546#M3340</link>
      <description>&lt;P&gt;I don't have the answer to your questions, but you might want to check out document numbers 514966 and 544255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ross&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2015 19:35:45 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268546#M3340</guid>
      <dc:creator>RWata1</dc:creator>
      <dc:date>2015-02-27T19:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268547#M3341</link>
      <description>&lt;P&gt;Sorry Fred,&lt;/P&gt;&lt;P&gt;We threw it around the company this morning and it does not appear that anyone has implemented this type of capability in a generic coreboot implementation yet.&lt;/P&gt;&lt;P&gt;According to our CTO, Intel has done some work to make the integrated TPM capability available,and Google has done some unrelated work to enable TPM capability in conjunction with Chrome OS, but there doesn't seem to be any reason to believe that general coreboot solution has been worked through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;Sage is working on a mainstream solution, but BayTrail will not be our lead solution.  &lt;P&gt;Very sorry not be able to help, but good luck.&lt;/P&gt;&lt;P&gt;jeff&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Feb 2015 21:37:51 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268547#M3341</guid>
      <dc:creator>JThom27</dc:creator>
      <dc:date>2015-02-27T21:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268548#M3342</link>
      <description>&lt;P&gt;Thanks rosswatanabe for the contribution!  Fred, if you got to &lt;A href="http://edc.intel.com/"&gt;http://edc.intel.com/&lt;/A&gt; &lt;A href="http://edc.intel.com"&gt;http://edc.intel.com&lt;/A&gt; and type 514966 in the search box you can access that document.  Probably by Monday night document 544255 will be added to the EDC as well.  I'm working on it!  Have a nice weekend!  LynnZ.&lt;/P&gt;</description>
      <pubDate>Sun, 01 Mar 2015 03:36:29 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268548#M3342</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-01T03:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268549#M3343</link>
      <description>&lt;P&gt;Document 544255 is now located at &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-firmware-external-architecture-spec.html?wapkw=544255"&gt;https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-firmware-external-architecture-spec.html?wapkw=544255&lt;/A&gt; &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-firmware-external-arch"&gt;https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-firmware-external-arch&lt;/A&gt;…. &lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 00:04:31 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268549#M3343</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-03T00:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268550#M3344</link>
      <description>&lt;P&gt;Hi, Fred Young&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm sorry to inform you  that there is no Bay Trail TPM 2.0 related documentation available for linux or Windows, Bay Trail does not support TPM 2.0. &lt;/P&gt;&lt;P&gt;TXE FW does not support TPM2.0, an additional TPM chip should be used if it is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 17:18:35 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268550#M3344</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-03T17:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268551#M3345</link>
      <description>&lt;P&gt;Hi Josue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.  Your news is unexpected for us since document 544255 (Section 5.1) stated the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;Intel® Platform Trust Technology&lt;/B&gt;: Also referred as Intel® PTT, is Intel implementation of TCG TPM 2.0 specification in Intel® TXE FW. Intel® PTT uses TXE as the security processor and SPI flash for secure storage. PTT is designed to meet MSFT windows certification requirements for connected standby platforms. A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This suggests that there is an implementation of the Intel PTT within the Intel TXE Firmware that supports some functionality of TCG TPM 2.0.  Could you help me understand why you think the TXE FW does not support TPM2.0 and would require an additional TPM chip?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 21:58:41 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268551#M3345</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-03T21:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268552#M3346</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document 544255: Bay Trail-M/D Platform Intel® TXE Firmware External Architecture Specification does not apply for E3845 SoC, this is because E3845 SoC is&lt;B&gt; &lt;/B&gt;a&lt;B&gt; Bay Trail - I &lt;/B&gt;(Embedded)&lt;B&gt; &lt;/B&gt;processor not a Bay Trail-M/D (Mobile/Desktop) processor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2015 23:13:16 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268552#M3346</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-03T23:13:16Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268553#M3347</link>
      <description>&lt;P&gt;Thanks Josue, for this information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If E3845's TXE does not offer TPM2 functionality, does it offer simpler hardware security functionality?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In particular, we essentially need the ability for the TXE to securely protect a key and enable usage of the secret key to the application only when the system is booted under a trusted environment.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2015 02:50:15 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268553#M3347</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-04T02:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268554#M3348</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TXE is used for storing hash and secure boot manifest during Secure Boot Flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check Document Number: 521918: "&lt;B&gt;&lt;I&gt;Bay Trail – Intel® Trusted Execution Engine (Intel® TXE) and Firmware Applications".&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;This is Intel&lt;B&gt;&lt;I&gt;®&lt;/I&gt;&lt;/B&gt; confidential.&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please &lt;A href="https://www-ssl.intel.com/content/www/us/en/forms/intelligent-systems/registration-po.html"&gt;https://www-ssl.intel.com/content/www/us/en/forms/intelligent-systems/registration-po.html&lt;/A&gt; Apply for an Intel® Embedded Design Center Privileged Account.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this is useful.&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2015 21:11:06 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268554#M3348</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-05T21:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268555#M3349</link>
      <description>&lt;P&gt;Hi, Fred.  I want to clarify some details with you.  You already have a Basic account on the EDC and therefore just need to request an upgrade to Privileged.  To do this, please go to &lt;A href="https://www-ssl.intel.com/content/www/us/en/intelligent-systems/embedded-design-center-contact-us.html"&gt;https://www-ssl.intel.com/content/www/us/en/intelligent-systems/embedded-design-center-contact-us.html&lt;/A&gt; Intel® Embedded Design Center Contact and Support and go to the "Manage your Intel EDC Account" and click on the link "Manage my Intel Profile".  Once there you should see an "upgrade to Privileged" option.  After you complete the form and agree to the T&amp;amp;Cs, please let us know so we can help expedite the review process for you.&lt;/P&gt;&lt;P&gt;Document 521918 is not currently on the EDC.  But it will be by the time you submit your upgrade request.  Once it is published you can go to &lt;A href="http://edc.intel.com/"&gt;http://edc.intel.com/&lt;/A&gt; &lt;A href="http://edc.intel.com"&gt;http://edc.intel.com&lt;/A&gt; and type 521918 in the search box and the document will surface. &lt;/P&gt;&lt;P&gt;Hope this helps!  LynnZ&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2015 23:08:57 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268555#M3349</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-05T23:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268556#M3350</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The file is already in the &lt;A href="http://www.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-and-firmware-applications-course-tpt-101.html"&gt;http://www.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-and-firmware-applications-course-tpt-101.html&lt;/A&gt; EDC Library.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2015 21:26:46 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268556#M3350</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-06T21:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268557#M3351</link>
      <description>&lt;P&gt;Hi Josue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Bay Trail TXE firmware is capable for more than just Secure Boot.  In the E3800 datasheet, under Section 22 titled "Intel Trusted Execution Engine (TXE)", "Chip Unique Key encryption key wrapping of other platform keys (Flash)" is listed as a supported feature by the firmware.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since this is no longer a discussion of the TPM2.0 functionality, I will start a new thread.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you, Fred Young&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2015 16:17:11 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268557#M3351</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-09T16:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268558#M3352</link>
      <description>&lt;P&gt;Hi Lynn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I upgraded my account to be Privileged and now I can download document 521918. That document definitely provides some useful information to understand the TXE/BIOS interactions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot, Fred Young&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 18:29:20 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268558#M3352</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-11T18:29:20Z</dc:date>
    </item>
    <item>
      <title>Re: TPM 2.0 on Bay Trail</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268559#M3353</link>
      <description>&lt;P&gt;Hi, Fred!  I love when things work out like this!  So glad that we could be of help to you!!  Happy reading!   Lynn.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 19:09:06 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/TPM-2-0-on-Bay-Trail/m-p/268559#M3353</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-11T19:09:06Z</dc:date>
    </item>
  </channel>
</rss>

