TMCnet News

Trusted Computing Group Brings Out TPM 2.0 Specification [Professional Services Close - Up]
[April 23, 2014]

Trusted Computing Group Brings Out TPM 2.0 Specification [Professional Services Close - Up]


(Professional Services Close - Up Via Acquire Media NewsEdge) The Trusted Computing Group (TCG) has announced the availability of the TPM (Trusted Platform Module) 2.0 library specification.

According to a release, TPM 2.0 provides a critical technology response to the global need for a more secure computing environment.

Based on contributions and feedback from TCG member companies and security technology experts representing silicon makers, device makers, software and solution providers, as well as researchers, governments and academic institutions, TPMs provide a secure root of trust to protect data in computers and mobile devices from digital and physical attacks, theft or loss.



The TCG noted that it also is making available the PC Client Platform TPM Profile (PTP) specification, the first in a series of specifications to enable developers and manufacturers to design TPMs into their products. Specifications for additional platforms, including mobile devices and embedded systems, will follow.

Hundreds of millions of TPMs are embedded into PCs, servers, networking gear, embedded systems and other computing devices, where they help protect computers against unauthorized changes from malware, rootkit attacks and similar malicious activities. TPMs enable more secure processes within the system, such as digital signatures and key exchanges. The TPM can help ensure that unsafe, unverified or out-of-date systems don't connect to a corporate network and provides a built in hardware root of trust that can be used to authenticate devices and users.


Addressing Global Demand for Data Security Best Practices The company reported that the TPM 2.0 specification responds to the exponential explosion of devices that require protection from cyber threats both inside and outside the traditional enterprise system firewalls. With market demand for enhanced security and privacy, TPM 2.0 offers protections based on hardware roots of trust. Together with support for upgraded cryptographic algorithms, the TPM 2.0 specification is designed with cryptographic agility to allow support for more algorithms in the future.

Lastly, TPM 2.0 offers the flexibility for industry implementations across a broad range of platforms including servers, desktops, embedded systems, mobile devices and network equipment. In order to accommodate all of these different platforms, the new specification is written in a way that enables TCG to develop platform specific specifications utilizing TPM 2.0 to meet the requirements of their platform.

The Trusted Computing Group (TCG) provides open standards that protect business-critical data and systems, support secure authentication and protect user identities and networks.

More Information: trustedcomputinggroup.org ((Comments on this story may be sent to [email protected])) (c) 2014 ProQuest Information and Learning Company; All Rights Reserved.

[ Back To TMCnet.com's Homepage ]