1. Trusted Computing Technology andClient-side Access Control Architecture Acknowledgement: Some slides and diagrams are adapted from TCG Architecture Overview, Intel IDF…