O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Deployment

The IT department faces the tasks of setting up all client TPs and of ensuring effective deployment of the overall solution. This section looks at the problem of setting up and managing appropriate sets of TPM keys across client platforms.

As seen in various chapters of this book, TCPA technology requires management of an important set of keys and certificates. Therefore, the distribution of keys and their authorization is critical for an efficient and effective implementation of a TCPA-based corporate solution. It has already been assumed within this chapter that the owner of the platforms will be the IT department of the corporation. The following section will discuss what this implies for TPM keys in terms of managing their authorization ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required