Cryptographic Authorization

In this section, we describe the cryptographic authorization mechanisms in the TCPA specification and their usage. We also introduce the optional commands for caching a session.

Authorization Data

The purpose of the authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The basic premise is to prove knowledge of a secret that is shared between the TPM and an authorized user. This shared secret is called the authorization data.

Choosing Authorization Values

Capabilities that manipulate user data associate a separate authorization value with each separate instance of user data. Other types of capability have just one authorization value. The only restriction ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.