O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Concept of Protected Storage

The Protected Storage mechanism can protect both arbitrary data and keys. Arbitrary data is revealed by the TPM to a caller, whereas a TPM uses keys internally and never exports them. These are the main points of interest for users:

  • Protected Storage allows private signature keys to be stored in a way that the TPM can use them without exposing them to the host platform. An appropriately designed TPM should be able to meet the European directive on digital signing.

  • Bulk encryption keys or arbitrary authorization data can be stored in a way that requires cooperation of the TPM to reveal them to the host platform.

  • Protected data can be stored in a way that either permits duplication of the data by TCPA features (under ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required