What is a typical use case for using TCG infrastructure specifications?
One of the core value propositions of trusted computing is that of providing attestation to the integrity of a given system. Thus, in addition to user authentication, a broad use case would be that of reporting the integrity status of the system (as measured and reported by the PTS) as part of access control to resources. There are numerous specific use cases for platform attestation. These include network access control (as exemplified by TNC), remote management and control of systems, security and integrity of financial transactions, verified boot of platforms, and others.