Cryptographic Authorization
In this section, we describe the cryptographic authorization mechanisms in the TCPA specification and their usage. We also introduce the optional commands for caching a session.
Authorization Data
The purpose of the authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The basic premise is to prove knowledge of a secret that is shared between the TPM and an authorized user. This shared secret is called the authorization data.
Choosing Authorization Values
Capabilities that manipulate user data associate a separate authorization value with each separate instance of user data. Other types of capability have just one authorization value. The only restriction ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.