Summary

This chapter has described some simple usage scenarios at a high level to illustrate how TCPA technology might be used. We have described the use of TPs for normal security purposes and the enhancement of legacy applications, and we have speculated about new applications. More detailed discussion of some of these examples is given in Part 4.

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.