Techniques for authenticating devices using a trusted platform module device
Described are examples for authenticating a device including detecting an event related to communications with a trusted platform module (TPM) device, performing, in response to detecting the event, one or more security-related functions with the TPM device, such as generating and/or signing one or...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
11.06.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Described are examples for authenticating a device including detecting an event related to communications with a trusted platform module (TPM) device, performing, in response to detecting the event, one or more security-related functions with the TPM device, such as generating and/or signing one or more digital certificates, which may be based on one or more keys on the TPM device. |
---|---|
Bibliography: | Application Number: US201615274879 |