If end users lock the TPM, they must wait around ten minutes or use other credentials to register, such as a consumer name and password. Whenever a TPM procedures a command, it does so in a very safeguarded environment. As an example a dedicated micro controller over a discrete chip, https://actone959shu7.izrablog.com/profile