Search Results for

    Show / Hide Table of Contents

    · 03/17/2024 ·

    Intel® Transparent Supply Chain Auto Verify tool

    The Intel® Transparent Supply Chain is a set of policies and procedures that OEMs/ODMs utilize in the manufacturing of their products. This information is collected during manufacturing prior to shipping the platforms to the End Customer. The information produced by Intel Transparent Supply Chain tools is used by IT departments to validate that the platforms they receive from the OEM are the platforms that were manufactured at the OEM’s factory.

    The Intel Transparent Supply Chain is composed of 5 separate components:

    1. Platform data at the OEM’s factory is collected in real time using Intel Transparent Supply Chain manufacturing tools.
    2. The Platform Data collected at the OEM’s factory is securely transmitted to Intel using a Secure File Transfer Protocol (SFTP).
    3. Once Intel receives the Platform Data from the OEM, it is signed at Intel’s High-Security signing facility using Intel’s Signing Certificate Authority.
    4. The Signed Platform Data files are then uploaded to the Intel TSC database for storage and retrieval by the Web Portal.
    5. The Intel TSC Web Portal allows the end user to download the signed Platform Data files and the Intel Transparent Supply Chain Auto Verify Tool.

    Transparent Supply Chain Process

    Intel® Transparent Supply Chain Web Portal

    The Intel Transparent Supply Chain Web Portal enables the user to request an account, enter the system serial numbers, and download the Platform Data. Once access has been granted, the AutoVerify Tool can be downloaded from the Web Portal.

    The Transparent Supply Chain Web Portal is located on the Intel® Transparent Supply Chain domain URL: https://portal.trustauthority.intel.com/

    Auto Verify Tool overview

    The Intel® Transparent Supply Chain (Intel TSC) Auto Verify Tool is a standalone application that runs under Windows® 10 or later operating systems. It performs two essential functions: validating the platform certificate issued to the platform and validating the platform component data generated at the factory during manufacturing. The validation results are displayed graphically on the Auto Verify Tool GUI.

    X.509 Platform Certificates

    Every platform has a unique X.509 Platform Certificate signed by the Intel Signing Authority. This unique Platform Certificate is cryptographically bound to the System through the Trusted Platform Module (TPM) installed in the system at the time of manufacturing. For more information, see the Platform certificate file section of the Transparent Supply Chain data files article.

    X.509 Platform Certificates graphic

    Platform certificate validation

    Every platform has a unique X.509 platform certificate signed by the Intel signing authority. This unique platform certificate is cryptographically bound to the system through the TPM module installed during manufacturing. The Auto Verify Tool does the following:

    • Verifies that the platform TPM module matches the signed platform certificates from the Customer Web Portal.
    • Platform Attestation is confirmed by comparing the TPM module's Endorsement Key Serial Number against the System Serial Number and Motherboard Serial numbers.

    Direct platform data snapshots

    The Intel TSC Auto Verify Tool generates direct platform data snapshots. These snapshots scan the platform and generate direct platform data. See the Direct platform data file section of the Transparent Supply Chain data files article for more information.

    Direct platform components validation

    The direct platform components validation compares the snapshot of the platform component data taken during manufacturing with a snapshot of the platform components taken at the first boot. It answers the question, "Is the platform that arrived at the customer the same platform that shipped out of the ODM's factory?"

    The Auto Verify tool plays a crucial role in ensuring the integrity of the platform components. It uses snapshots to compare the contents of the direct platform data, flagging any changes from the ODM to the customer.

    Component validation process

    Auto Verify Tool download and installation

    The Auto Verify Tool zip file is downloaded from the Intel® Transparent Supply Chain Web Portal.

    Auto Verify Tool download

    1. Log in to the Intel TSC Web Portal.

    2. Select the Transparent Supply Chain MANAGE SERVICES button.

    3. Select Download center.

    4. Select Download.

    5. Navigate to the folder where the TSC_AutoVerifyTool_Windows_Client.zip was downloaded and extract the zip file. The AutoVerifyTool.exe.

    6. To execute the Auto Verify Tool, select the AutoVerifyTool.exe file.

      The Auto Verify Tool application is executed, and the AutoVerifyTool graphical user interface is displayed.

      Auto Verify Tool User Interface

    Auto Verify Tool user interface

    User interface

    The Intel TSC Auto Verify Tool user interface is divided into the following sections:

    • Platform Information on the left-hand section
    • Component Information in the middle section
    • Function Status located on top middle section on the upper right -hand section
    • File Info and Status Section
    • File Info and Status Section
    • TPM/PCR Information on the right-hand section
    • Snap Shot Comparison located at the bottom center
    • Direct Platform Data located at the bottom center
    • Drive Information located on the middle right-hand side
    • Function Buttons located along the bottom right-hand of the UI

    Function status information

    Function status information provides operational information from the Auto Verify Tool. It displays the state of the scan when one of the Function buttons is selected. The status also displays the function's status result. Function status information provides operational information from the Auto Verify Tool. It displays the state of the scan when one of the Function buttons is selected. The status also displays the function's status result.

    Snapshot Date displays the date and time of the current scan when the Scan System button is selected or the date and time of the snapshot file read by the Read File function.

    File Information/Status

    This section displays the status of the file functions.

    File Information/Status

    This section displays the status of the file functions. - The Read File function displays the status of the Direct Platform Data file read function. - The Platform Cert function displays the status of the Platform Certificate file read function.

    Platform information section

    The Platform Information section provides fundamental system values, such as the system serial number, SKU number, processor type, and system speed.

    A picture of the platform information section

    Component information section

    The Component Information section displays a subset of the system component values: the system BIOS, motherboard, system, chassis, processor, memory, batteries, power supplies, and password status.

    The component information values displayed are sourced from two different channels: the current, up-to-the-minute snapshot of the system component values, captured when the Scan System button is selected, and the component values from the Direct Platform Data file, read by the Read File function.

    Component information screen

    TPM & PCR information section

    The TPM and PCR Information section contains information about the TPM mounted on the motherboard. The top line of the TPM section includes:

    • TPM Version: Displayed at the top of the TPM section.
    • PCR Registers: Located below the TPM Information section.
    • TPM Endorsement Key Serial Number (EKSN): Displayed at the bottom.

    TPM and PCR information

    The Auto Verify tool only supports systems with TPM 2.0 enabled. It displays the following error message when TPM 1.2 is enabled:
    TPM Information -- TdPM 1.2 Not Supported

    Systems with no TPM modules enabled display the following error message:
    TPM Information -- No TPM Module Detected

    The PCR Registers are below the TPM Registers Match section. The Auto Verify tool reads all 24 PCR registers but only displays PCR registers PCR0 - PCR7. These are the predefined PCR registers in the TCG specification. The following are the PCR0 - PCR7 registers definitions:

    PCR # Description
    0 BIOS, CRTM, and Host Platform Extensions
    1 Host Platform Configuration
    2 Option ROM Code
    3 Option ROM Configuration and Data
    4 IPL Code (usually the MBR)
    5 IPL Code Configuration and Data
    6 State Transition and Wake Events
    7 Host Platform Manufacturer Control

    The Endorsement Key Serial Number (EKSN) is below the PCR Registers. It is a unique serial number that cryptographically binds the system to the TPM. During manufacturing, the system and motherboard serial numbers are cryptographically bound to the TPM on the motherboard. Any changes to the system or motherboard are flagged during the Platform Cert function.

    Function buttons section

    The Auto Verify tool has seven function buttons:

    The Function buttons section contains all the functions you can perform using the Auto Verify Tool. It includes the following buttons:

    • Scan System - Scans the platform components and the TPM information
    • Read DPD File - Reads the Direct Platform Data file
    • Compare - Compares the current system component value information to the component value information read from the Direct Platform Data file
    • Next Diff - Scrolls through each component change identified in the Compare function
    • Write Delta File - Creates a Delta XML file if there are any additions, removals, or modifications to the platform's components
    • Read Perform Cert - Checks the Platform Certificate using the TPM as the hardware root of trust
    • Read CA Cert -

    Operation buttons Issuing certificate authority read file function The Function buttons are described in the Auto Verify Tool Operation section.

    Only the Scan System button is active when the Auto Verify Tool is first executed. The Auto Verify Tool does not automatically scan the system without the user initiating the scan.

    Scan System button

    See the Scan System function section.

    Snapshot comparison section

    This section displays the differences between the component information from the current system scan and the component information in the As-Built Direct Platform Data file, which was loaded using the Read File function. Any changes in component information are highlighted in red.

    Comparisons of current platform and direct platform vales.

    Drive information section

    The Drive Information section displays the internal drive information. The drive information is sourced from the current system scan when the Scan System button is selected.

    Drive information.

    Auto Verify Tool operation

    Scan System function

    The Scan System function scans the system components and the TPM information. The scanning operation performs the following operations:

    • Reads the following platform components: (BIOS, System, Motherboard, Chassis, Processor, Memory DIMMs, Batteries, AMT FW Version, Power Supplies)
    • Reads the Trusted Platform Module PCR Registers, Public Endorsement Key, and the Endorsement Key Serial Number.
    • Reads the Internal Drive Information. Note: External drives are not included.
    • Reads the Window Management Instrument (WMI) information for the internal Keyboard, internal Pointer, and internal network devices. Note that external devices are not included.
    1. Select Scan System located in the lower right-hand section of the Auto Verify Tool UI.

      Scan System button

      Once the ScanSystem has been completed the Read CA Cert button is enabled.

      Read Certification button.

      After scanning is completed, the following message displays.

      Scanning Complete message

      Function buttonss.

    Issuing certificate authority read file function

    The Platform Certificate, Direct Platform Data, and Statement of Conformance files downloaded from the Intel TSC Web Portal are signed using a PKI signing process. To validate the signature of the files, download Intermediate Certificate Authority file.

    The Intermediate Certificate Authority file contains a public key used to verify the signature of the platform certificate and the direct platform data files. The Intermediate Certificate Authority file is downloaded from the Intel TSC Web Portal and saved on the system where the Auto Verify Tool is located. See the Transparent Supply Chain data files article for more information.

    The Certificate Authority Signature Read file function will read in the intermediate Issuing Certificate Authority certificate file and extract the intermediate Public Key. The Platform Certificate file, the Direct Platform Data file, and the Statement of Conformance file are signed using a PKI signing process.

    1. To read in the Issuing CA Certificate file, select the Read CA Cert button.

      Read CA Cert button.

      The Issuing CA Read file function prompts users to open the IssuingCA.cer file downloaded from the OEM URL.

    2. Select the Certificate File and click the Open.

      Select the Certificate file.

      The tool validates the loaded issuing CA certificate against the Root CA. The Read Platform Cert and Read DPD File buttons are enabled if validation passes.

      Activated buttons

      After the Issuing Certificate is read, the Issuing CA Information is displayed in the TPM Information section.

      The Public Key Read Successfully message will be displayed at the top of the CA information section.

      Public key successfully read.

      The Signature of the Platform Certificate file and the Direct Platform Data file are verified after the Public Key is read, using the Read Platform Cert and Read DPD File buttons.

    Read direct platform data file function

    The Read Direct Platform Data File function opens the Direct Platform Data file associated with the platform. Once the file has been read, the Direct Platform Data component values are loaded into the Auto Verify Tool and displayed on the UI.

    The default directory is the directory in which the Auto Verify Tool was run.

    1. To read the Direct Platform Data file, select Read DPD File.

      Read file button

      The Read File function prompts the user to open the Direct Platform Data file (.xml) associated with the system serial number. Opening the file displays only files with the system serial number in their filename with the .xml extension.

      Direct Platform Data file

    2. Select the Direct Platform Data file and then select Open.

      After the Direct Platform Data file is read, the message Direct Platform Data file read completed displays in the Function Status section.

      Data file read complete message.

      The Auto Verify Tool is now ready to perform the Compare operation.

    Compare platform components function

    The Compare Platform Components function compares the current system component values captured by the Scan System operation to the component values read from the Direct Platform Data file.

    1. To execute the compare operation, select Compare.

      Compare button

      After completing the Compare operation, the scan results are displayed in the Scan Status information section.

      • If the results of the Compare operation match, the No component changes have been detected message is displayed.

      No component changes message.

      • If the results of the Compare operation do not match, the component change has been detected message is displayed.

      Component change detected message

      The Snapshot Comparison section displays the changes in the component value. The total number of component changes is displayed in the component change has been detected section..

      Component change detected message

      Component change details

    Compare Next component function

    If more than one component change occurs, the Next Diff button is enabled after the Compare function is completed.

    1. Select Next Diff to scroll through each component change identified in the Compare function.

      Compare Next button.

      After completing the compare operation, the scan results are displayed in the Scan Status information section.

      The quantity of component changes is displayed at the beginning of the "component changes have been detected" message, as shown below.

      Component change detected message.

      Component change details.

    Platform certificate verify function

    The Platform Certificate Verify function checks the platform certificate issued for the platform using the TPM as the hardware root of trust. It checks that the TPM Endorsement Key serial number matches the Endorsement Key serial number in the platform certificate. The function also checks that the manufacturer, version, and serial number match the values in the platform certificate.

    1. To initiate the Platform Certificate Verify function, select Read Platform Cert.

      PerformCert button used to perform certification on the platform.

      The Platform Certificate Verify function prompts users to open the Platform Certificate file (.cer) associated with the platform serial number.

    2. Select the certificate file and then select Open.

    Platform Certificate file.

    1. Select the Platform Certificate file and then select Open.

      The Platform Certificate Verify function automatically runs when selecting the Open button. The results are displayed in the UI's TPM PCR Register section.

      • If the platform certificate matches the system values, then the Platform Certificate Matches message is displayed along with the certificate values.

      Platform Certification Matches

      • If the Platform Certificate does not match the system values, then the Platform Certificate Does Not Match message displays along with the certificate values that do not match highlighted in red.

      Platform certification does not match message.

      Platform certificate value changes are highlighted in red.

    Delta file generation

    The Delta file generation function is enabled after the Platform Certificate is loaded. The tool creates a Delta XML file if there are any additions, removals, or modifications to the platform's components. The tool will not generate a Delta XML file if no changes have occurred since the Platform Certificate was created.

    1. To generate the Delta XML file, select Write Delta File.

      Write delta file button

      File explorer opens. Choose from the following:

      • If no previous Delta Certificates were created, select Cancel. Since this is the first time Delta Certificates were created, there is nothing to measure against.

      List of delta certificates

      The File Information pop-up is displayed, showing where the Delta XML file was generated.

      File generated Pop-up

      • If Delta Certificates were generated and you want to create a Delta XML file, select the delta certificate(s) and then select Open.

      List of delta certificates

      The File Information pop-up shows where the Delta XML file was generated.

      File generated Pop-up

      Select OK to clear the pop-up.

      • If no previous Delta XML was generated, select Cancel.

      List of delta certificates

      The File Information pop-up is displayed.

      No File generated pop-up

      Select OK to clear the pop-up.

    Open-Source Acknowledgements

    This product includes software developed by the open-source community.

    Bouncy Castle (Version 1.9) Bouncy Castle is a collection of APIs used in cryptography. It is licensed under the MIT License. Copyright (c) 2021 The Legion of the Bouncy Castle Inc. (https://www.bouncycastle.org). For more details, see the Bouncy Castle License: https://www.bouncycastle.org/licence.html.

    Microsoft TSS (Version 2.1.1) Microsoft TSS is a library for TPM 2.0. It is licensed under the MIT License. Copyright (c) 2019 Microsoft Corporation For more details, see the Microsoft TSS License: https://github.com/Microsoft/TSS.MSR/blob/main/LICENSE.

    In this article
    Back to top Notice & Disclaimer