Conclusion and review
Over the course of this book, I've provided a basic introduction to TPMs, and how they can be used both directly and in a range of personal and enterprise contexts. I've discussed the TPM's primary functions at length: secure key storage, trusted cryptographic functionality, and reliable reporting of stored data. I've covered how TPMs need to be provisioned before use, and how establishing trust in a TPM can in some cases be a highly sensitive operation. I've discussed the different capabilities of different types of TPM keys, how to choose the correct key for an application, and how to set up appropriate access constraints. I've introduced many useful functions of the TPM, both well known and obscure, and provided guidance on how and when to use them. I've also shown how the TPM relates to the Roots of Trust for Measurement, the pros and cons of various measurement options, and how measurements can be used in the TPM.
Conclusion and review, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch13-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch13-2.gif