Mobile Trusted Module 2.0 Use Cases

Date Published: May, 01, 2011

The Trusted Computing Group’s Mobile Phone Use Cases consider a broad range of usage scenarios where TCG technology, specifically the Mobile Trusted Module (MTM) security technology deemed most appropriate for mobile devices and similar wireless handheld systems with small footprints which require an optimized trusted module, can be applied in the mobile embedded devices context and ecosystem.

This document has been written to guide subsequent technical requirements and specification work within the TCG Mobile Phone Working Group (MPWG). It has been written to provide parties within and outside of TCG with a description of the work being carried out by the MPWG. The usage scenarios outlined herein should illustrate also to Operating System developers what kind of functionalities might be needed to support certain applications that rely on MTM security technology.

Current Version:

Supporting Document:



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.