Straightforward Application of TCPA Trusted Platforms
A TP provides the basic security features that are required by current applications and services. Those features are the protection of data (bulk encryption on the main platform processor using secrets protected by the TPM) and digital signing (by the TPM, using secrets protected by the TPM). As a result the following standard applications can be supported: confidentiality of data, web browsing using SSL/TSL and IPSec, email using S-MIME, and public key infrastructure (PKI) deployments and interactions. These services use the TP property of Protected Storage, the ability to sign using a key inside the TPM, and the ability to do bulk encryption on the main platform processor. The secrets can ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.