Chapter 4. Access Control—Ownership, Enabling, and Authorization

In this chapter, we introduce the mechanisms enabling control of a Trusted Platform Module (TPM). TCPA technology is designed for a world in which all platforms are Trusted Platforms (TPs), where some owners of a TP want to immediately and remotely take ownership of their platform (in the TCPA sense, as introduced in this chapter). Some want to immediately take ownership but want to prevent it being done remotely; others want the TPM turned off for now but want to take ownership later; and the rest want the TPM turned off as long as they own the machine. Even those who normally use TPM capabilities want to turn them off on occasion, and then turn them back on again. Any user of ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.