Further, since software TPM implementations do not usually offer the same security properties as hardware TPM implementations, the different types of TPMs should be distinguishable for remote parties relying on a TPM’s correct functioning. A virtualized TPM’s certificates can be used to give an interested party enough information to conclude relevant properties of the completesoftware, firmware, and hardware environment on which this TPM’s correct operation depends. In practice, this can be realized by the certificate issuer embedding special attributes into the certificate, and the interested party validating the certificate and translating these attributesduring remote attestation of security properties.