Summary
A Trusted Computing Platform contains unconditionally trustworthy functions, providing safe digital signing and cryptographic protection of data, plus an arbitrary number of uncorrelated cryptographic platform identities. A Trusted Platform can emulate a protected processing environment to maintain the privacy of sensitive, private, or secret information. A protected environment is specified by the owner of data in terms of measurements of that environment. The presence of such an environment is verified by comparison of actual measurements with expected measurements, and verification that the actual measurements were provided by a genuine root-of-trust.