Chapter 9. Conventional Security Functions and Assorted Host Functions

This chapter describes some conventional security services and the Trusted Platform Module (TPM) capabilities that relate to the hosting of the TPM in a TP. This chapter does not describe a general-purpose bulk encryption service, because a TP uses completely standard symmetric encryption. In any case, a TPM is not required to support symmetric encryption. This chapter also does not describe basic security principles. Such concepts are explained in Appendix C.

The following conventional security services are described in this chapter:

  • Signing

  • Generating random data

  • Discovering the properties of the TPM

  • Auditing the TPM

The following host functions are described in this chapter: ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.