Techniques for authenticating devices using a trusted platform module device

Described are examples for authenticating a device including detecting an event related to communications with a trusted platform module (TPM) device, performing, in response to detecting the event, one or more security-related functions with the TPM device, such as generating and/or signing one or...

Full description

Saved in:
Bibliographic Details
Main Authors Thom, Stefan, Zhurid, Artem Alekseyevich, Kapadia, Merzin
Format Patent
LanguageEnglish
Published 11.06.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Described are examples for authenticating a device including detecting an event related to communications with a trusted platform module (TPM) device, performing, in response to detecting the event, one or more security-related functions with the TPM device, such as generating and/or signing one or more digital certificates, which may be based on one or more keys on the TPM device.
Bibliography:Application Number: US201615274879