Summary

This chapter described how trust is created from the security features of the TPM and the overall design of a TP. These security features are converted into trustworthy information, allowing entities to build trust relationships with components of the platform. This creates transitive trust from Trusted Third Parties to such components of the platform. Using TCPA features, trust can be transferred through to other components of the platform, eventually encompassing the whole platform. Because of the way TCPA is designed, this trust can be exploited by the platform itself, both to prove its trustworthiness to other entities, and to increase the trustworthiness of its own software components.

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.