Trusted Computing Group Announces PC Client TPM 2.0 Certification

Date Published: October, 01, 2015

Certification Based on Common Criteria Ensures Security and Consistency of TPM Implementations

PORTLAND, Ore., Oct. 22, 2015 Trusted Computing Group today announced the launch of the PC Client TPM (Trusted Platform Module) 2.0 Certification program for implementations of the PC Client Platform TPM Profile (PTP) Specification.

The PC Client TPM Certification program will allow manufacturers and developers of products based on the TCG TPM 2.0 specifications for PC Client to demonstrate security and correctness of implementation for TCG specifications.

This certification program extends the existing TPM Certification program created for the previous generation PC Client TPM 1.2 specifications. Certification is open to all TCG members developing or manufacturing TPM products, and the products that successfully meet TCG certification criteria will be listed on the TCG’s PC Client TPM Certified Products List.

“Infineon has been an early adopter and strong supporter of the TPM certification program, which offers assurance to those specifying and using TPMs of their consistency and security,” said Dr. Joerg Borchert, Vice President of Chip Card and Security, Infineon Technologies AG.

Noted Erez Naory, VP Marketing of Security Products, Nuvoton, “Nuvoton is very excited to be one of the leaders in developing the latest TPM certification program. This program helps Nuvoton to provide its customers with the confidence to apply and rely on TPM-based security, thus increasing overall deployment of TPM and more widespread use of TPM-based security in the computing arena.”

“ST’s strong background in secure TPM development allowed us to contribute to the definition of this new TCG certification program. We believe this program will continue to facilitate the adoption and deployment of TPM technology over various platforms and we are eager to continue to support this trend with innovative, TCG-compliant solutions,” said Marie-France Florentin, Group Vice President and General Manager of the Secure Microcontroller Division, STMicroelectronics.

The PC Client Platform TPM Profile Specification enables modern security and privacy protection, which combines the strengths of hardware and software-based security technologies:

  • Safeguards cryptographic keys
  • Prevents private keys from being exported
  • Shields PIN values used for authentication
  • Records and anonymously reports on software loaded during the boot process to protect against malware and attacks

TPM 2.0 Library Specifications were recently approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission) and published as ISO/IEC 11889:2015.

Many applications and benefits of the TPM will be demonstrated and discussed at TCG’s RSA Conference 2016 session on February 29, Moscone Center, San Francisco.

 

About TCG

TCG is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available at trustedcomputinggroup.org. Follow TCG on Twitter and on LinkedIn.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more