Tuesday, August 20 • 11:35am - 12:15pm
Rich Authorization in a Resource Constrained Device - Kenneth Goldman, IBM*

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

TPM 2.0 is an example of a low cost, resource-constrained device that provides a rich set of authorizations. The design targeted a device with very little RAM. This talk starts with the overall design of TPM
authorization policies, how they are calculated and how they are satisfied.

Next, many of the policy statements are presented, with examples of use cases that they enable. Finally, a more complicated use case is presented, one that was never envisioned when the TPM was first designed.


Kenneth Goldman

Senior Engineer, IBM
I am a member of the Security Department at the IBM TJ Watson Research Center. I am the IBM representative several Trusted Computing Group (TCG) working groups and the editor of the TPM 1.2 and TPM 2.0 specifications. I have a complete Unix and Windows TPM 1.2 and 2.0 implementations... Read More →

Tuesday August 20, 2019 11:35am - 12:15pm PDT
Sapphire D
  Refereed Presentation
  • Session Slides Included Yes