O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3

An Overview of the Trusted Platform Module Capabilities

Now that we have had a chance to look at the design goals of the TPM, we next turn to discussing how they were implemented in the design. There were several key issues that needed to be decided. These included the following:

  • Secure storage: How the TPM can use an unlimited number of keys with a small chip using a daisy chain design. This design shows the environment in which the TPM was assumed to be running, so it is important to understand.
  • Migratable and non-migratable keys: How keys can move from PC to PC—or not.
  • Key types: The types of keys the TPM can use and create.
  • Platform status: How a Trusted PC utilizes the TPM to securely record and report the platform status using ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required