Cyber Security TPM Module Description
The HMIYMINATPM201 is categorized as industrial module. It is compatible with the low pin count module. The Trusted Platform Module (TPM) is an international standard for a secure cryptoprocessor, which is a dedicated microcontroller designed to secure hardware by integrating cryptographic keys into devices.
The mother boards and the BIOS of Magelis Box iPC allows you to install the TPM module and activate encryption with the Windows BitLocker. Then, storage drives and operating system are encrypted according to password and keys managed within the hardware module.
According to part number, the HMIYMINATPM201 TPM module can default mounted following the CTO (configured to order) or can be user mounted afterward as an optional accessory module. The encryption can be activated with Windows BitLocker.
Plug the module onto the Box iPC pin header.
Part number |
Description |
HMIBMU/HMIBMP |
HMIBMI/HMIBMO |
---|---|---|---|
HMIYMINATPM201 |
TPM 2.0 module |
Yes(1) |
Yes |
NOTE: (1) Need to downgrade to TPM 1.2 module. |
Box iPC Optimized:
Box iPC Universal/Box iPC Performance:
Before installing or removing a mini PCIe card, shut down Windows operating system in an orderly fashion and remove the power from the device.
NOTICE |
ELECTROSTATIC DISCHARGE |
Take the necessary protective measures against electrostatic discharge before attempting to remove the Magelis Industrial PC cover. |
Failure to follow these instructions can result in equipment damage. |
|
OVERTORQUE AND LOOSE HARDWARE |
oDo not exert more than 0.5 Nm (4.5 lb-in) of torque when tightening the installation fastener, enclosure, accessory, or terminal block screws. Tightening the screws with excessive force can damage the installation fastener. oWhen fastening or removing screws, ensure that they do not fall inside the Magelis Industrial PC chassis. |
Failure to follow these instructions can result in injury or equipment damage. |
NOTE: Remove the power before attempting this procedure.
Step |
Action |
---|---|
1 |
Install TPM card: ![]()
|
Step |
Action |
---|---|
1 |
Release the screw: ![]()
|
2 |
Install the TPM card: ![]()
Lock the screw: ![]()
|
TPM Module Compatibility Table
|
TPM 1.2 |
TPM 2.0 |
---|---|---|
BIOS support |
Legacy or UEFI |
UEFI |
BitLocker support |
Yes |
Yes |
NOTE: TPM module is TPM 2.0 FW as default. It needs to downgrade to TPM 1.2 FW for HMIBMU/HMIBMP.
Model |
Default BIOS |
TPM 1.2 |
TPM 2.0 |
---|---|---|---|
HMIBMU/HMIBMP |
Legacy |
Support (need to downgrade TPM to 1.2) |
Not support |
HMIBMI/HMIBMO |
UEFI |
Support |
Support |
The BitLocker is a full disk encryption feature in Windows. It is designed to protect data by providing encryption for entire volumes. All the OS defaults have this function but for WES7, if System Reserved partition is combined with partition C:\, the BitLocker cannot be used to protect fixed drive.
NOTE: A keyboard is required to enter the BitLocker PIN during Box startup. The touch screen function is disabled during this step.
Step |
Action |
---|---|
1 |
Open Control Panel → BitLocker Drive Encryption. ![]()
|
2 |
Click TPM Administration to Change Owner Password. ![]()
|
3 |
Select Change Owner Password. ![]()
|
4 |
Choose either Automatically create the password or Manually create the password. ![]()
![]()
![]()
|
NOTE: If you enter the wrong password more than 30 times, the TPM gets locked.
Starting with Windows 10, version 1607, Windows do not retain the TPM owner password when provisioning the TPM. The password is set to a random high entropy value and then discarded.
Microsoft related link: https://docs.microsoft.com/en-us/windows/security/hardware-protection/tpm/change-the-tpm-owner-password
|
UNINTENED EQUIPEMENT OPERATION |
Follow Microsoft suggestion. We strongly recommend that you do not do this change. If you change the register value, then set the password manually. There are side effects happened and no guarantee and support from Microsoft and Schneider side. You need to take the responsibility for the result of this change. |
Failure to follow these instructions can result in injury or equipment damage. |
NOTE: A keyboard is required to enter the BitLocker PIN during Box startup. The touch screen function is disabled during this step.
Step |
Action |
---|---|
1 |
Open Control Panel → BitLocker Drive Encryption. ![]()
|
2 |
Click Turn on BitLocker. ![]()
|
3 |
Choose either Enter a PIN or Insert a USB flash drive or Let BitLocker automatically unlock my drive. ![]()
NOTE: The keyboard is required to enter BitLocker PIN during Box startup. The tactile function is disabled during this step. |
4 |
Enter a PIN. ![]()
|
5 |
Select any one of Save to your Microsoft account or Save to a file or Print the recovery key. ![]()
|
6 |
Select either Encrypt used disk space only or Encrypt entire drive. ![]()
|
7 |
Click the check box of Run BitLocker system check and select Continue. ![]()
|
8 |
The figure shows the process of the Encryption. ![]()
Encryption is completed. ![]()
|
Step |
Action |
---|---|
1 |
Open Control Panel → BitLocker Drive Encryption. ![]()
|
2 |
Click Turn off BitLocker. ![]()
|
The TPM module is TPM 2.0 firmware as default. It needs to downgrade to TPM 1.2 firmware for HMIPCCU2B/HMIPCCP2B series.
Step |
Action |
---|---|
1 |
Disable TPM in BIOS: 1.Go to Advanced > Trusted Computing. 2.Disable Security Device Support. ![]() ![]() |
2 |
Start the recovery USB memory key: 1.Boot up from the recovery USB memory key. 2.Click Cancel to leave the recovery process. ![]() Start the TPM downgrade tool. Type Alt + T to start the TPM downgrade tool: ![]()
|
3 |
Click Yes to start the downgrade process ![]()
|
4 |
Downgrade process starts. After the process is finished, press Enter to continue: ![]()
|
5 |
Click OK to reboot: ![]()
|
6 |
Enable TPM in BIOS: 1.Go to Advanced > Trusted Computing. 2.Enable Security Device Support. ![]()
|
7 |
Check the TPM version in Windows: oGo to Control Panel > BitLocker Drive Encryption > TPM Administrator. oCheck the TPM version is 1.2. ![]()
|
Instruction on How to Update the TPM 1.2 Firmware for Windows 7
Step |
Action |
---|---|
1 |
Select the check box to accept the license agreement. ![]()
|
2 |
Install TPM recovery driver if necessary. NOTE: Installation may require a restart of your computer. |
3 |
Check platform details. ![]()
|
4 |
Enter the Owner Password or the Owner Password Backup File if the Owner Password is not managed by the operating system. Do the following steps: oSelect I have the Owner Password Backup File. ![]() oSelect *.tpm file. ![]() oSelect Next. ![]() |
5 |
Perform the update as shown below: ![]()
![]()
|
6 |
Restart your computer. NOTE: Save all unsaved work in all user sessions before restarting in order to ensure prevention of data loss. |
Clearing and reinitializing the TPM after the update is recommended for the update paths included in this version of Infineon TPM firmware Update. For more information, see Microsoft Security Advisory ADV170012 or visit www.infineon.com/tpm-update.
|
HIGH RISK TO LOSE DATA |
Clearing the TPM resets it to factory defaults. You lose all created keys and data protected by those keys. |
Failure to follow these instructions can result in death, serious injury, or equipment damage. |
Instruction on How to Update the TPM 1.2 Firmware for Windows 8.1
Step |
Action |
---|---|
1 |
Select the check box to accept the license agreement. ![]()
|
2 |
Install TPM recovery driver if necessary. NOTE: Installation may require a restart of your computer. |
3 |
Check platform details ![]()
|
4 |
Perform the update as shown below: ![]()
![]()
|
5 |
Restart your computer. NOTE: Save all unsaved work in all user sessions before restarting in order to ensure prevention of data loss. |
Clearing and reinitializing the TPM after the update is recommended for the update paths included in this version of Infineon TPM firmware Update. For more information, see Microsoft Security Advisory ADV170012 or visit www.infineon.com/tpm-update.
|
HIGH RISK TO LOSE DATA |
Clearing the TPM resets it to factory defaults. You lose all created keys and data protected by those keys. |
Failure to follow these instructions can result in death, serious injury, or equipment damage. |
TPM 1.2 Firmware Update for Windows 10
If ownership of the TPM was taken with Windows 10® Version 1607 or later then by default the owner authorization is no longer stored on the local system. Refer to the Microsoft article for more information. To update the firmware, you need to clear the TPM and take ownership again with modified Windows setting. So, that the owner authorization is stored on the local system.
|
HIGH RISK TO LOSE DATA |
Clearing the TPM resets it to factory defaults. You lose all created keys and data protected by those keys. |
Failure to follow these instructions can result in death, serious injury, or equipment damage. |
Step |
Action |
---|---|
1 |
Set registry key HKLM\Software\Policies\Microsoft\TPM [REG_DWORD] OSManagedAuthLevel to 4. oSelect Run then type the text regedit as shown below: ![]() Click OK oChange the Value date to 4 for OSManagedAuthLevel . ![]() Click OK |
2 |
Start tpm.msc and click Clear TPM.... ![]()
|
3 |
Restart the computer. NOTE: Save all unsaved work in all user sessions before restart the computer in order to ensure prevention of data loss. |
4 |
Start tpm.msc and click Prepare the TPM.... ![]()
|
5 |
Wait for Windows to reprepare the TPM (Windows stores owner authorization on local system). When the preparation is completed, status field in tpm.msc displays The TPM is ready. ![]()
|
6 |
Run the TPM firmware update tool to update the firmware of the TPM as shown below: ![]()
![]()
![]()
|
7 |
Restart the computer. NOTE: Save all unsaved work in all user sessions before restart the computer in order to ensure prevention of data loss. |
8 |
Restore registry key HKLM\Software\Policies\Microsoft\TPM [REG_DWORD] OSManagedAuthLevel to its previous Value data 2. ![]()
Click OK |
9 |
Start tpm.msc and click on Clear TPM.... ![]()
|
10 |
Restart the computer. NOTE: Save all unsaved work in all user sessions before restart the computer in order to ensure prevention of data loss. |
11 |
Start tpm.msc and click Prepare the TPM.... ![]()
|
12 |
Wait for Windows to reprepare the TPM (using Windows 10 security measures). When the preparation is completed, in status field tpm.msc displays The TPM is ready for use. ![]()
Check the Manufacturer Version is 4.43. |