A simplistic description of what TPM does from the Trusted Computing Group.