O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

The Main Features of Trusted Platforms

This section summarizes the capabilities in a Trusted Platform that enhances end-users' confidence in Trusted Platforms.

Design Features of the TCPA Trusted Platform

Most cryptographic primitives: But not bulk encryption.

Privacy: Fully “opt-in,” with no identity correlation.

No global secrets: If a TPM is cracked, it reveals information relating to the associated platform and nothing further.

Low-cost protected environment outside a crypto co-processor: It is uneconomic to do bulk processing in a co-processor.

Ubiquitous security: Available at the lowest cost and without significant product export/import problems.

A Trusted Platform is a normal open computer platform that has been modified to maintain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required