Has been a while since I followed the steps you mentioned, and everything worked
Thanks for your hints.
There is just one point I'm still missing the comprehension.
How is the binding between AK and EK performed?
How can this attestation process avert an attacker with an authentic TPM from creating a
credential for an AK that is not TPM authentic?
It seems that the AK name has something to do with this, but I can't figure it out