Summary

This chapter has described the specific needs and options that a remote entity (a challenger) is faced with when interacting with a TP. The benefits of such a challenge have been highlighted, in addition to consideration of each critical, necessary, and optional step involved in the challenge. Finally, a possible and practical scenario has been discussed that illustrates the requirements for integrating the challenge mechanism into existing protocols at a limited cost.

Get Trusted Computing Platforms: TCPA Technology in Context now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.