O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protected Storage

This section briefly describes the TCPA Protected Storage mechanism. An overview is given in Chapter 1, and a more detailed explanation is in Chapter 7.

Protection of Secrets

The TPM is designed to protect unlimited numbers of secrets (keys and other data, such as authorization for network protocols) on behalf of the platform, but it provides only functions to access secrets, not functions to use those secrets or protect them from deletion. The only exception is the signing of data by the TPM using a key inside the TPM. All other secrets must be exported from the TPM and used by the platform itself, probably as proof of authorization or as symmetric keys for bulk encryption of files and messages. Three reasons figure in the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required