Security is becoming an essential requirement for all computing devices as we begin to trust and rely upon them to control our environments and protect our information, identity and ultimately our lives. In fact, the Trusted Computing Group (TCG) has developed a comprehensive model of how trusted devices should function. It has produced specifications for an architecture, a set of functions and interfaces that provide a baseline trust model for a wide range of computing platforms.