Folks
 
I can see how this helps US PIV/PIV-I and connecting up physical and logical access.
 
But is there another use it could be put to - in the devices we might be concerned with??
 
Cheers
Colin 
 
 
http://gcn.com/Articles/2013/08/29/Trusted-Computing-Group-endpoint-compliance.aspx?goback=.gde_3747110_member_271044961&Page=1