O'Reilly logo

Trusted Computing Platforms: TCPA Technology in Context by Graeme Proudler, David Plaquin, Liqun Chen, Boris Balacheff, Siani Pearson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Functions of Protected Storage

This section briefly describes the main Protected Storage data structures and TPM capabilities. They are, of course, described in full detail in the main TCPA specification. The capabilities are designed to enable the TPM to operate as a slave device so as to avoid the cost and complexity associated with a master device in a computing platform. The capabilities are also designed on the assumption that TPM protected objects outside the TPM are managed by non-TPM functions. These design goals constrain the nature of the capabilities.

The formal definitions of these data structures and TPM capabilities can be found in the latest TCPA specification. The data structures and capability names used in this section are exactly ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required