Chapter 15

Ancillary Hardware

One of the key requirements of a TPM specification is that it be possible to make an inexpensive TPM. As a result, there are security problems that the TPM cannot address by itself. This chapter describes how you can add other hardware devices to a TPM in order to create solutions for problems not addressed by the TPM alone. In particular, this chapter looks at the following security problems:

  • How to authenticate to a TPM in a secure way
  • How to hook biometric readers to a TPM securely
  • How to create a linkage between a TPM and a display

Trusted Path

Problems have been pointed out by the Eurocard, Mastercard, and VISA specification for secure terminal usage of credit cards and smart cards, which will apply equally ...

Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.