...
The proposals in this section provide potential options for sensitive material protection on devices that do not have a hardware tpm. These include:
Problem Statement
Devices that are concerned with illegitimate access or changes can protect secret material using the tpm. We consider two use cases.
...