Example

One of the benefits of integrating a challenge into an existing protocol is that it automatically adds value to that protocol by enabling software authentication and identification of the other party's platform (though unique platform identification is optional).

One possible application is to enhance Virtual Private Network (VPN) establishment over the Internet using such a TP challenge mechanism. This scenario could be applied to an employee trying to access his company network using a secured VPN connection. In this case, the TP is the employee's PC, the challenger is the VPN gateway of the company, and the validation entity (which in this example, directly certifies all TPM PCR values for a given software state) is the corporate

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.