O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Trusting the Platform

The trust in a TP starts with the TPM, and is extended during the platform's boot process. This section further describes how this is achieved, and how it relies on the platform's firmware and OS software co-operation. Whether or not these software components co-operate successfully will in no way influence the trustworthiness of the roots of trust established through certification in the previous section.

Extending Trust

This is where the integration of the TPM with the RTM is fundamental. Once one entity is confident enough in this link, it can propagate the trust to other components. The details of the technical process for TCPA authenticated boot are described in Chapter 6.

Once the TPM, the RTM, and the way they are ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required