This chain of events sounds like something else I heard about trying to prove new laptop hardware. Apparently there is a TPM chip and then they build chains of private/public keys of the different hardware components. software measurements on boot up match the private key. It still needs like a manager private key to be provided by manufacturer or something.
Discussion
yeah, TPM works like that. it also has little enclaves for storing secrets and such as well to prevent malicious programs being able to access the memory where the keys are stored, usually they also have some signature capabilities as well, but probably not gonna support BIP-340 schnorr signatures