O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Example

One of the benefits of integrating a challenge into an existing protocol is that it automatically adds value to that protocol by enabling software authentication and identification of the other party's platform (though unique platform identification is optional).

One possible application is to enhance Virtual Private Network (VPN) establishment over the Internet using such a TP challenge mechanism. This scenario could be applied to an employee trying to access his company network using a secured VPN connection. In this case, the TP is the employee's PC, the challenger is the VPN gateway of the company, and the validation entity (which in this example, directly certifies all TPM PCR values for a given software state) is the corporate

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required