Isn't this basically what is achieved through the use of the TPM by storing credentials and only verifying limited info? <a href="http://www.wired.com/politics/security/news/2008/02/credentica" target="_blank">http://www.wired.com/politics/security/news/2008/02/credentica</a>