Protected Storage
This section briefly describes the TCPA Protected Storage mechanism. An overview is given in Chapter 1, and a more detailed explanation is in Chapter 7.
Protection of Secrets
The TPM is designed to protect unlimited numbers of secrets (keys and other data, such as authorization for network protocols) on behalf of the platform, but it provides only functions to access secrets, not functions to use those secrets or protect them from deletion. The only exception is the signing of data by the TPM using a key inside the TPM. All other secrets must be exported from the TPM and used by the platform itself, probably as proof of authorization or as symmetric keys for bulk encryption of files and messages. Three reasons figure in the ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.