O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Design Goals of the Trusted Platform Module

In addition to privacy support, the Trusted Computing Group (TCG) technical committee had a number of design goals for the Trusted Platform Module (TPM). It was important that the design have the capability to do the following:

  • Securely report the environment that booted
  • Securely store data
  • Securely identify the user and system (without encountering privacy concerns)
  • Support standard security systems and protocols
  • Support multiple users on the same system while preserving security among them
  • Be produced inexpensively

Of course, “secure” is a relative term. Given enough resources, anything can be hacked. The relative security of personal computers (PCs) prior to TCG was fairly low, so any ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required