Chapter 8. Migration and Maintenance Mechanisms

Replacement or cloning of an original platform requires access to the contents of a Protected Storage hierarchy in a platform other than the original platform. This chapter introduces two independent but related TPM security features that permit migratable TPM key objects to be duplicated and that permit non-migratable TPM key objects to be moved to another TPM, all without compromising the plain-text contents of the objects. The migration objective is to produce a TPM protected key object attached to the Protected Storage tree in a destination platform, but one that contains a copy of a migratable TPM key object held in the Protected Storage tree of a source platform. The maintenance objective ...

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.