Functions of Protected Storage

This section briefly describes the main Protected Storage data structures and TPM capabilities. They are, of course, described in full detail in the main TCPA specification. The capabilities are designed to enable the TPM to operate as a slave device so as to avoid the cost and complexity associated with a master device in a computing platform. The capabilities are also designed on the assumption that TPM protected objects outside the TPM are managed by non-TPM functions. These design goals constrain the nature of the capabilities.

The formal definitions of these data structures and TPM capabilities can be found in the latest TCPA specification. The data structures and capability names used in this section are exactly ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.