PC Client

PC Client Work group produces specifications and whitepapers to provide common functionality, interfaces, and a set of security and privacy requirements for PC Client platforms that use TCG components to establish their root of trust. This includes specifications addressing the requirements for PC Client specific TPM’s, PC Client specific platforms, the PC Client TPM interfaces and the interfaces between the different elements of the PC Client platform.

This Work group serves an advisory role by providing information to the TPM Work group and other TCG Work groups on possible architectural and design issues that may impact their work. This Work group also supports other platform Work groups at their request to specify additional TPM interfaces.

PC Client standards refine the definition of a TPM from the TPM Library specification based on the needs and common usage of PC Client platforms. These standards include the PC Client Specific Platform TPM Profile which defines the requirements for the TPM, the PC Client Specific Platform Firmware Profile which defines the platform firmware behavior in the context of a TPM enabled system, and several other specifications which provide interfaces and communication standards between OS present components and the platform firmware for the purpose of using and managing the TPM.

Amy Nelson

Principal Engineer, Dell, Inc.; Work Group Chair

Amy Nelson is an Engineering Technologist and Security Software Technical Planner responsible for Dell Data Protection | Encryption. Amy represents Dell within the Trusted Computing Group, chairing the PC Client Work Group and the Security Evaluation Work Group. Amy has previously been a Security Architect for Dell, with responsibility for Trusted Platform Module (TPM), encryption hardware, including Dell Data Protection | Hardware Crypto Accelerator, and authentication hardware and software. Amy has participated in assurance activities within FIPS 140-2 and FIPS 201 and Common Criteria for the last five years, serving as an editor for the TCG PC Client Specific Protection Profile for TPM 2.0, chairing working groups performing reviews of TCG specifications for FIPS and CC compliance issues, and presently serving as a Subject Matter Expert in the International Technical Community for the Collaborative Protection Profile for Full Disk Encryption. Amy has 20 years of experience in the PC industry and a B.S. in Electrical Engineering from Texas Tech University.


Resource NameResource TypeResource Tag
TCG PC Client Platform Firmware Profile SpecificationSpecificationFirmware, Developer, Engineers, PC, Laptop, Desktop, Trusted Platform Module, Manufacturers, Implementer
PC Client Platform TPM Profile (PTP) SpecificationSpecificationTrusted Platform Module, Developer, Engineers, Manufacturers
TCG EFI Protocol SpecificationSpecificationFirmware, Developer, Engineers, PC, Laptop, Desktop, Trusted Platform Module, Manufacturers, Implementer
TCG ACPI SpecificationSpecificationFirmware, Developer, Engineers, PC, Laptop, DesktopTablet
TPM 2.0 Protection ProfileSpecificationTrusted Platform Module, Manufacturers
PC Client Work Group PC Client Specific TPM Interface Specification (TIS)Specification
D-RTM Architecture SpecificationSpecification
TCG TPM I2C Interface SpecificationSpecification


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.