TPM concepts and functionality
This chapter discussed the concepts and functionality of trusted platform modules. TPMs are designed to have an owner: a single party, which could be a person for a consumer TPM or an entire IT department for an enterprise machine, who is responsible for configuring the TPM appropriately. The TPM owner is not equivalent to a root or administrator account in an OS; the owner cannot read secrets belonging to other TPM users, or use the owner password to bypass other access controls. The owner does, however, have a few useful unique powers compared to other users.
Preview this chapter:
TPM concepts and functionality, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch3-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch3-2.gif