Summary

The owner of a TP has a special status for privacy reasons, and nothing can be done on the platform without his or her permission. The owner has the exclusive right to activate the TPM and to perform other special operations. Authorization to use the TPM is demonstrated by either physical presence at the platform or by use of shared secrets and cryptographic techniques. A TP can use a primary shared secret from any type of user authentication process. TCPA specifies a number of protocols to set up, maintain, and use shared secrets.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.220.140.5