Supermicro TPM MODULE TCG 2.0 I5/I7/E3

AOM-TPM-9665V-C

(Provisioned for Client vertical TPM 2.0 supporting LPC 20 pi)

Product Image
Image accuracy is not guaranteed. Please do not rely on the image for your purchase.

View Product Demo

£30.75 | £36.90 inc.VAT

Overseas Customers with EU-VAT number do not pay VAT. - Verify it here

PLEASE NOTE: there is a 14 day lead time on dispatch for this item.
  • Quick Code: B5113184
  • MPN: AOM-TPM-9665V-C
  • Manufacturer: Supermicro
  • EAN code:
icon_cash_tag_large.jpg (130×105) Get Cash Back if paying by Debit Card or Bank Transfer!

Learn more

Need a specialist for your solution?

Make sure you ask us for advice

Email us at supermicro@lambda-tek.com

Notify me when price drops
NOTE: The information below is provided for your convenience only and we cannot guarantee its accuracy. If necessary, please verify with us before purchasing.

Supermicro TPM MODULE TCG 2.0 I5/I7/E3AOM-TPM-9665V-C - Vertical, Client, Intel Core i5/i7 & Xeon® E3

Supermicro's Trusted Platform Module AOM-TPM-9665V(-S/-C) with TCG 2.0, stores information such as keys; password and digital certificates, and provides additional security against external software attacks and from physical theft to systems.

TPM implements Root-of-Trust, which initiates during system boot process to establish trust level; gathering measurements about the running environment, OS, for trusted reporting. Security of the whole system is based on the protection and secrecy of the cryptographic system, especially against reading out or manipulation of the key material.

Supermicro's AOM-TPM-9665V(-S/-C) provides a computing system the ability to run applications more securely, run a more secured remote access environment, as well as perform electronic transactions and digital communications more safely and security.

- TCG 2.0 compliant trusted platform module (TPM)
- Microcontroller in 0.22/0.09 ìm CMOS technology
- Compliant embedded software
- EEPROM for TCG firmware enhancements and for user data and keys
- Hardware accelerator for SHA-1 and SHA-256 hash algorithm
- True Random Number Generator (TRNG)
- Tick counter with tamper detection
- Protection against Dictionary Attack
- General Purpose Input/output
- Intel® Trusted Execution Technology (TXT) Support
- Full personalization with Endorsement Key (EK) and EK certificate
- Power saving sleep mode
- 3.3 V power supply

Security Features
- Over/Under voltage detection
- Low frequency sensor
- High frequency filter
- Reset filter
- Memory Encryption/Decryption (MED)

TPM 2.0 improvements
- Improved encryption capability
- Improved TPM to application integration
- Enhanced authorization mechanisms
- Simplified TPM management with additional
capabilities to enhance platform security
- Provides specific-use algorithms to meet
geographies based or market specific requirement

Application Supports
- Microsoft Outlook® and Outlook Express®
- Microsoft Office 2010, Office 2000, Office XP and Office 2003
- Microsoft Internet Explorer®
- Mozilla Firefox™
- Mozilla Thunderbird™
- Netscape Communicator®
- Microsoft Encrypted File System
- RSA Secure ID®
- Check Point™ SecuRemote/SecureClient
- Check Point™ VPN-1®/FireWall-1 NG®
- Entrust™ Desktop Manager Solutions
- Adobe™ Acrobat 6.0 Professional