O'Reilly logo

A Practical Guide to Trusted Computing by Leendert Van Doorn, David Safford, Ryan Catherman, Kent Yoder, David Challener

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15

Ancillary Hardware

One of the key requirements of a TPM specification is that it be possible to make an inexpensive TPM. As a result, there are security problems that the TPM cannot address by itself. This chapter describes how you can add other hardware devices to a TPM in order to create solutions for problems not addressed by the TPM alone. In particular, this chapter looks at the following security problems:

  • How to authenticate to a TPM in a secure way
  • How to hook biometric readers to a TPM securely
  • How to create a linkage between a TPM and a display

Trusted Path

Problems have been pointed out by the Eurocard, Mastercard, and VISA specification for secure terminal usage of credit cards and smart cards, which will apply equally ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required