How does a TPM verify the identity of the calling process/service?
Any application can use a TPM chip to securely create and store cryptographic keys.
For example for Digital Rights Management (DRM) or for prevention of cheating in online games.
However, how can a TPM be sure of the identity of the proces…