O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Straightforward Application of TCPA Trusted Platforms

A TP provides the basic security features that are required by current applications and services. Those features are the protection of data (bulk encryption on the main platform processor using secrets protected by the TPM) and digital signing (by the TPM, using secrets protected by the TPM). As a result the following standard applications can be supported: confidentiality of data, web browsing using SSL/TSL and IPSec, email using S-MIME, and public key infrastructure (PKI) deployments and interactions. These services use the TP property of Protected Storage, the ability to sign using a key inside the TPM, and the ability to do bulk encryption on the main platform processor. The secrets can ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required