TPM Capabilities
This section briefly describes the individual TPM capabilities that enable migration and maintenance. The formal definition of these capabilities can be found in the latest TCPA specification. The capability names used in this section are exactly those used in the TCPA specification.
Migration Functions
The commands executed by the TPM to implement the migration process are as follows:
TPM_AuthorizeMigrationKey
TPM_CreateMigrationBlob
TPM_ConvertMigrationBlob
These will be considered in the following sections.
TPM_AuthorizeMigrationKey
This capability is used to authorize a public key to be used as a “migration wrap” key to transfer a migratory key from one Protected Storage tree to another.
The capability is TPM owner authorized. ...
Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.