Mobile Trusted Module 2.0 Use Cases
The Trusted Computing Group’s Mobile Phone Use Cases consider a broad range of usage scenarios where TCG technology, specifically the Mobile Trusted Module (MTM) security technology deemed most appropriate for mobile devices and similar wireless handheld systems with small footprints which require an optimized trusted module, can be applied in the mobile embedded devices context and ecosystem.
This document has been written to guide subsequent technical requirements and specification work within the TCG Mobile Phone Working Group (MPWG). It has been written to provide parties within and outside of TCG with a description of the work being carried out by the MPWG. The usage scenarios outlined herein should illustrate also to Operating System developers what kind of functionalities might be needed to support certain applications that rely on MTM security technology.