Join Now

Interested companies are encouraged to review the Benefits of Membership and apply today!

Join Now

Glossary

Unfamiliar with a term used in this section? Check the TCG Glossary of TechnicalTerms for the definition.  


View Glossary
Trusted Platform Module

Trusted Platform Module

The Trusted Platform Module (TPM) Work Group has been chartered to create the TPM specification.The definition of the TPM architecture comes from the Technical Committee and the TPM Work Group defines the implementation of that architecture. A working knowledge of security in relation to the design and usage of cryptographic modules as well as cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols is recommended.

A new research report on "Trusted Computing" published by Aberdeen Group, a Harte-Hanks Company (NYSE:HHS), reveals that organizations that have deployed applications based on trusted computing infrastructure exhibit superior capabilities in security governance, risk management and compliance compared to other respondents. The term "trusted computing" refers to applications that leverage hardware-based "roots of trust" at the edge of the network and at the endpoints - sometimes referred to as "hardware anchors in a sea of untrusted software" - for higher assurance.

icon

Specifications in Public Review

This page contains all specifications that are currently in public review.

August 2015 | Specifications | Add to Briefcase

icon

TCG Physical Presence Interface Specification

The Physical Presence Interface utilizes the industry-standard Advanced Configuration and Power Interface (ACPI) to provide a communication mechanism between the OS and the BIOS, enabling the OS and the BIOS to cooperate to provide a simple and straightforward platform user experience for administering the TPM without sacrificing security.

July 2015 | Specifications | Add to Briefcase

icon

Errata for TPM Library Specification 2.0

This document describes errata and clarifications for the TCG Trusted Platform Module Library Version 2.0 Revision 1.16 as published. The information in this document is likely –but not certain– to be incorporated into a future version of the specification. Suggested fixes proposed in this document may be modified before being published in a later TCG Specification.

June 2015 | Specifications | Add to Briefcase

icon

TCG Algorithm Registry

This document contains the registry of TCG Algorithms.

February 2015 | Specifications | Add to Briefcase

icon

PC Client Protection Profile for TPM 2.0

This protection profile describes the security requirements for the Trusted Computing Group (TCG) PC Client Specific Trusted Platform Module (TPM) Family 2.0; Level 0 conforming to the Common Criteria version 3.1 revision 4.

December 2014 | Specifications | Add to Briefcase

icon

TPM Library Specification

TCG has released the TPM 2.0 library specification that provides updates to the previous published TPM main specifications.

October 2014 | Specifications | Add to Briefcase

icon

TPM 1.2 Protection Profile

The Protection Profile identified in this certificate has been evaluated at an accredited and licensed/ approved evaluation facility using the Common Methodology for IT Security Evaluation (CEM), Version 3.1 for conformance to the Common Criteria for IT Security Evaluation (CC), Version 3.1.

July 2014 | Specifications | Add to Briefcase

icon

Registry

This page includes all registries published by TCG.

April 2014 | Specifications | Add to Briefcase

icon

Vendor ID Registry

This document contains the registry of allocated vendor IDs.

June 2013 | Specifications | Add to Briefcase

icon

Registry of Reserved TPM 2.0 Handles and Localities

This registry is a companion to the TPM 2.0 library specification. This registry describes TCG's convention for allocating TPM 2.0 handles and localities.

June 2013 | Specifications | Add to Briefcase