| http://www.w3.org/ns/prov#value | - The TPM that sets the lock bit may be the first TPM to access the lock bit, the TPM associated with the processor, or other factors may be used to determine the controlling TPM. Beneficially, by utilizing the lock bit, each TPM may determine if it is the controlling TPM or a subordinate TPM. After a controlling TPM is established, the keys from the controlling TPM may be copied into the other TPMs
|