O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Trusted Computing and Secure Identification

One of the main purposes envisioned for the TPM was identification. Passwords have multiplied at an alarming rate, including phone voicemail passwords, Windows logon, hard disk passwords, power-on passwords, email passwords, intranet passwords, bank pins, Amazon passwords, Pay-pal passwords, eBay passwords...the list seems endless. They cost enterprises on average $50 for each call used to reset a forgotten password, and have become notorious for being insecure. A public private key is secure—as long as the private key is secure—and tokens such as smart cards or USB keys are harder to manage than passwords. The TPM provides a basic capability to help alleviate all of these problems.

First, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required