Approaching its teen years, the Trusted Platform Module, or TPM, has experience inevitable growing pains. In the last few years, TCG members have collectively provided extensive input and expertise around security, system design and development, networking, encryption and more to evolve the original specification to a new library approach (see https://trustedcomputinggroup.org/trusted-platform-module-2-0-brief-introduction/).
The TPM 2.0 allows key attributes of the TPM to be integrated different ways into a variety of devices and systems, recognizing the growing need for security beyond the traditional PC or server and including the multitude of new connected devices.
With billions of TPMs now included in systems and devices, we continue to see the evolution of how the TPM can be used to enable better security. Some recent examples can be found:
TCG Member Mocana Supports Infineon TPM for IoT
TPM Key to OpenFog Consortium IoT Efforts for IoT Security
http://www.eetasia.com/news/article/consortium-sets-paradigms-for-iot-security
STMicro Announces New TPMs for IoT and Other Devices
New ClearCube Blade PC Includes TPM for Security
Torvald Support for TPM
Watch for updates as new applications emerge for the TPM and additional vendors work to support the TPM with tools, software and hardware and integration of the TPM into new systems and devices.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.