O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

TPM Capabilities

This section briefly describes the individual TPM capabilities that enable migration and maintenance. The formal definition of these capabilities can be found in the latest TCPA specification. The capability names used in this section are exactly those used in the TCPA specification.

Migration Functions

The commands executed by the TPM to implement the migration process are as follows:

  • TPM_AuthorizeMigrationKey

  • TPM_CreateMigrationBlob

  • TPM_ConvertMigrationBlob

These will be considered in the following sections.

TPM_AuthorizeMigrationKey

This capability is used to authorize a public key to be used as a “migration wrap” key to transfer a migratory key from one Protected Storage tree to another.

The capability is TPM owner authorized. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required