O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Access Control—Ownership, Enabling, and Authorization

In this chapter, we introduce the mechanisms enabling control of a Trusted Platform Module (TPM). TCPA technology is designed for a world in which all platforms are Trusted Platforms (TPs), where some owners of a TP want to immediately and remotely take ownership of their platform (in the TCPA sense, as introduced in this chapter). Some want to immediately take ownership but want to prevent it being done remotely; others want the TPM turned off for now but want to take ownership later; and the rest want the TPM turned off as long as they own the machine. Even those who normally use TPM capabilities want to turn them off on occasion, and then turn them back on again. Any user of ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required