O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Identity

This section describes the notion of multiple attestation platform identities, which provide privacy for users and owners.

The Concept of a Trusted Platform Identity

A Trusted Platform identity is (statistically) unique, difficult to forge or counterfeit, and verifiable to either a local or remote entity. The TP achieves this by using the TPM, which has a physical tamper-protected presence and protection from software interference and which uses cryptographic secrets and algorithms. A TP identity provides the following major advantages:

  • A TP identity guarantees that certain properties hold for the platform associated with it. This is useful information for entities communicating with that platform, even on a one-off basis. These properties ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required