December 2007
Intermediate to advanced
384 pages
9h 30m
English
One of the main purposes envisioned for the TPM was identification. Passwords have multiplied at an alarming rate, including phone voicemail passwords, Windows logon, hard disk passwords, power-on passwords, email passwords, intranet passwords, bank pins, Amazon passwords, Pay-pal passwords, eBay passwords...the list seems endless. They cost enterprises on average $50 for each call used to reset a forgotten password, and have become notorious for being insecure. A public private key is secure—as long as the private key is secure—and tokens such as smart cards or USB keys are harder to manage than passwords. The TPM provides a basic capability to help alleviate all of these problems.
First, ...
Read now
Unlock full access