Trusted Computing Framework
Secure boot establishes a hardware RoT (which is tamperproofing) to authenticate each layer from this root. This builds a trust chain across the entire system to achieve predictable system behavior.
Trusted boot establishes a hardware RoT (which is tamperproofing) to measure each layer from this root. This builds a trust chain across the entire system to achieve predictable system behavior through remote attestation.
Trusted computing 3.0 is built on the Trusted Cryptography Module (TCM) and establishes an RoT through the Trusted Platform Control Module (TPCM) within the security component. From this root, the computing component is measured and attested layer by layer. This builds a trust chain across the entire system to ensure predictable system behavior and provide capabilities such as proactive control and software trustlist control.