Summary

The owner of a TP has a special status for privacy reasons, and nothing can be done on the platform without his or her permission. The owner has the exclusive right to activate the TPM and to perform other special operations. Authorization to use the TPM is demonstrated by either physical presence at the platform or by use of shared secrets and cryptographic techniques. A TP can use a primary shared secret from any type of user authentication process. TCPA specifies a number of protocols to set up, maintain, and use shared secrets.

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.