Chapter 2. Usage Scenarios

In this chapter, we bring together a variety of applications of Trusted Platforms (TPs). We start with using TPs for conventional security applications, and then describe adaptations that use special TP properties. We also give a flavor of more forward-looking applications, such as those considered further in Part 4.

First, however, it must be acknowledged that today's typical platform makes little use of security (other than for Internet communications). The features that sell platforms are the applications that provide tangible benefits to customers. Security features, when provided, are often considered obstacles to convenience and are disabled or circumvented. So why would anyone want a TP?

People agree that applications ...

Get Trusted Computing Platforms: TCPA Technology in Context now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.