O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Migration

This section provides a step-by-step description of the two migration processes, TCPA_MS_REWRAP and TCPA_MS_MIGRATE.

Starting Migration

Both migration methods have the same starting point, which is generating a data structure to prove that the TPM owner has authorized use of a particular destination or intermediary public key for a particular migration method (TCPA_MS_MIGRATE or TCPA_MS_REWRAP).

This first step enforces the privilege of the TPM owner to permit migration and minimizes the cost of a TPM. Most TPM capabilities need a maximum of two authorization sessions (see Chapter 4): TPM owner authorization and authorization to use a key, for example. In the case of migration, however, a total of three authorization sessions are required: ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required