Example

One of the benefits of integrating a challenge into an existing protocol is that it automatically adds value to that protocol by enabling software authentication and identification of the other party's platform (though unique platform identification is optional).

One possible application is to enhance Virtual Private Network (VPN) establishment over the Internet using such a TP challenge mechanism. This scenario could be applied to an employee trying to access his company network using a secured VPN connection. In this case, the TP is the employee's PC, the challenger is the VPN gateway of the company, and the validation entity (which in this example, directly certifies all TPM PCR values for a given software state) is the corporate

Get Trusted Computing Platforms: TCPA Technology in Context now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.