Transferring application secrets in a trusted operating system environment
involves receiving a request to transfer application data from a source
computing device to a destination computing device. A check is made as to
whether the application data can be transferred to the destination
computing device, and if so, whether the application data can be
transferred under control of the user or a third party. If these checks
succeed, a check is also made as to whether the destination computing
device is a trustworthy device running known trustworthy software. Input
is also received from the appropriate one of the user or third party to
control transferring of the application data to the destination computing
device. Furthermore, application data is stored on the source computing
device in a manner that facilitates determining whether the application
data can be transferred, and that facilitates transferring the
application data if it can be transferred.