Resources for Using the Trusted Platform Module 2.0 Library Specification

Date Published: October, 13, 2016

Trusted Computing Group’s TPM 2.0 Library Specification, recently adopted as an ISO/IEC 11889:2015 standard (http://www.trustedcomputinggroup.org/tpm-2-0-library-specification-approved-isoiec-international-standard/), is a new way to implement TPM and the root of trust.

The TPM typically provides provides integrity measurements, health checks and authentication services. Many other features and attributes are enabled; a complete list is available here .

TCG members are often asked about how to use the TPM and available support and software resources.

“A Practical Guide to TPM 2.0 – Using the Trusted Platform Module in the New Age of Security” was authored by TCG members and is available free online or at modest cost in print at http://www.springer.com/us/book/9781430265832.

A reference book intended to help explain TPMs: “Trusted Computing Platforms – TPM2.0 in Context” by TPM experts is also available at http://www.springer.com/us/book/9783319087436.

A number of software resources, many open source and free, exist to support the TPM. These include:

https://sourceforge.net/projects/ibmswtpm2/

https://chromium.googlesource.com/chromiumos/third_party/tpm2/

https://github.com/vbendeb/tpm2_server

http://research.microsoft.com/en-US/downloads/35116857-e544-4003-8e7b-584182dc6833/default.aspx

https://github.com/PeterHuewe/linux-tpmdd/tree/tpm-emulator

https://github.com/PeterHuewe/linux-tpmdd/commit/9329f13c403daf1f4bd1e715d2ba0866e089fb1d

https://github.com/PeterHuewe/linux-tpmdd/commit/bbf2f7064c1452b47f11dfad340326b1205d863a

TCG members have published a number of technical recommendations and information, including an overview here with links to others:

https://technet.microsoft.com/en-us/itpro/windows/keep-secure/trusted-platform-module-overview

https://technet.microsoft.com/en-us/itpro/windows/keep-secure/tpm-recommendations

Watch this blog for more info and resources to using the TPM across a variety of applications.

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more