A trusted platform in a digital
processing system is maintained even when modules, or other processes or data, are loaded after a boot sequence. A configuration file is used to include measurements (e.g., hash values, signatures, etc.) of modules to be loaded. After secure boot-up the
operating system kernel uses the configuration file to check module integrity prior to loading and executing. If a module does not verify against the configuration file data then the
system can prevent further operation,
restrict certain operations, indicate the non-trusted nature of the
system or take other actions. In one embodiment, if a module does not pass the
integrity check then the failed measurement is extended into a specific Platform Configuration Register (PCR) within a Trusted Platform Manager (TPM) process. Subsequently,
client applications can determine if the platform is trustable based on the return of the PCR value. A local application (application running in the same platform) can “seal” secrets to a trusted platform. The operation of the application relies on the secrets, which can only be revealed in a trusted platform.