O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Setting Up the Platform

After the platform is created and the TPM is correctly incorporated, the platform becomes a TP. From this point, entities can start to use the platform's trusted mechanisms in order to benefit from the added security. The first entity that has to interact with a TP is its owner, in order to initialize a set of parameters and thereby enable the trusted mechanisms.

Owner and Administrator Tasks

Whereas the previous steps in the life of a TP mainly implied a direct physical communication with the TPM, this is the point where the communication starts to become more “abstract.” In other words, software layers are involved between the communicating entity (TPM owner, user, or third party) and the TPM. This implies that commands ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required