Trusted Computing Group Releases TPM 2.0 Specification for Improved Platform and Device Security

Trusted Platform Module 2.0 Specification Provides Critical, Vendor Neutral Technology to Respond to Security Demands in Today’s Volatile Threat Landscape

TCG TPM 2.0 secures systems and data. (Graphic: Business Wire)

PORTLAND, Ore.--()--The Trusted Computing Group (TCG) has announced the availability of the TPM (Trusted Platform Module) 2.0 library specification. TPM 2.0 provides a critical technology response to the global need for a more secure computing environment.

Based on contributions and feedback from TCG member companies and security technology experts representing the world’s leading silicon makers, device makers, software and solution providers, as well as researchers, governments and academic institutions, TPMs provide a secure root of trust to protect data in computers and mobile devices from digital and physical attacks, theft or loss.

The TCG also is making available the PC Client Platform TPM Profile (PTP) specification, the first in a series of specifications to enable developers and manufacturers to design TPMs into their products. Specifications for additional platforms, including mobile devices and embedded systems, will follow.

Hundreds of millions of TPMs are embedded into PCs, servers, networking gear, embedded systems and other computing devices, where they help protect computers against unauthorized changes from malware, rootkit attacks and similar malicious activities. TPMs enable more secure processes within the system, such as digital signatures and key exchanges. The TPM can help ensure that unsafe, unverified or out-of-date systems don’t connect to a corporate network and provides a cost-effective, built in hardware root of trust that can be used to authenticate devices and users.

Addressing Global Demand for Data Security Best Practices

The TPM 2.0 specification responds to the exponential explosion of devices that require protection from cyber threats both inside and outside the traditional enterprise system firewalls. With growing market demand for enhanced security and privacy, TPM 2.0 offers comprehensive protections based on hardware roots of trust. Together with support for upgraded cryptographic algorithms, the TPM 2.0 specification is designed with cryptographic agility to allow support for more algorithms in the future.

Lastly, TPM 2.0 offers the flexibility for industry implementations across a broad range of platforms including servers, desktops, embedded systems, mobile devices and network equipment. In order to accommodate all of these different platforms, the new specification is written in a way that enables TCG to develop platform specific specifications utilizing TPM 2.0 to meet the requirements of their platform.

About the Trusted Computing Group

The Trusted Computing Group (TCG) provides open standards that protect business-critical data and systems, support secure authentication and protect user identities and networks. TCG maintains a well-defined standards development and review process to ensure best-of-class design considerations and transparency with strong protection of intellectual property rights in alignment with the international norms. More information about the TCG can be found at www.trustedcomputinggroup.org, on Twitter at @trustedcomputin and on LinkedIn.

Names and brands are the property of their respective owners.

Contacts

PR Works, Inc.
Anne Price, +1-602-840-6495 or +1-602-330-6495
anne@prworksonline.com

Contacts

PR Works, Inc.
Anne Price, +1-602-840-6495 or +1-602-330-6495
anne@prworksonline.com