A first processing system determines whether a second processing system
provides a trustworthy state for supporting a virtual security
coprocessor. In response to determining that the second processing system
provides a trustworthy state for supporting the virtual security
coprocessor, the first processing system transfers the virtual security
coprocessor to the second processing system. In one embodiment, the first
processing system receives a key and proof of bindings of the key from
the second processing system. The first processing system may determine
whether the second processing system provides a trustworthy state for
migration of the virtual security coprocessor, based at least in part on
the proof of bindings received from the second processing system. After
the second processing system receives the virtual security coprocessor,
the virtual security coprocessor may be removed from the first processing
system. Other embodiments are described and claimed.