Chapter 3
An Overview of the Trusted Platform Module Capabilities
Now that we have had a chance to look at the design goals of the TPM, we next turn to discussing how they were implemented in the design. There were several key issues that needed to be decided. These included the following:
- Secure storage: How the TPM can use an unlimited number of keys with a small chip using a daisy chain design. This design shows the environment in which the TPM was assumed to be running, so it is important to understand.
- Migratable and non-migratable keys: How keys can move from PC to PC—or not.
- Key types: The types of keys the TPM can use and create.
- Platform status: How a Trusted PC utilizes the TPM to securely record and report the platform status using ...
Get A Practical Guide to Trusted Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.