Machine authentication
Authentication, in this context, refers to the verification of identity data in the form of a cryptographic key. Machine authentication is thus all about identifying a machine via its keys. This is particularly effective in a TPM context because the cryptographic keys are usable inside the TPM itself, and the TPM is attached to the motherboard; in some cases, the TPM is even a subset of the CPU. This means that if you can prove that a set of keys belonging to a given TPM was used, the machine that TPM is attached to must have been involved.1 Machine authentication is therefore a property we effectively get for free with many TPM applications. Any use case where a remote party is verifying a TPM key can be used for machine authentication.
Machine authentication, Page 1 of 2
< Previous page Next page > /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch7-1.gif /docserver/preview/fulltext/books/pc/pbpc013e/PBPC013E_ch7-2.gif