Search Resources

Clear Search


   

TMS Use Cases - Bring Your Own Device (BYOD)

The TCG Trusted Mobility Solutions (TMS) use cases consider a broad range of scenarios where TCG technology can be applied in the mobile embedded devices’ context and ecosystem. TMS Use Cases - Bring Your Own Device (BYOD) Reference Document Version 1.0 ... READ MORE

Trusted Multi-Tenant Infrastructure Reference Framework

The TCG Trusted Multi-Tenant Infrastructure Reference Framework describes a broad set of foundational principles and requirements as well as a library of re-usable patterns where TCG technology may be applied between components in an enterprise context. They may likewise influence facets of other TCG committees and external standards bodies. These requirements and patterns serve as the “building... READ MORE

TCG Trusted Multi-Tenant Infrastructure Use Cases

The Trusted Multi-tenant Infrastructure (TMI) use case document describes the foundational relationships between various components within a shared infrastructure environment and how they interact based on three core functions: establishment of trusted context between parties, exchange of information between parties in a trusted context, and enforcement of policy. Use cases are divided into three ... READ MORE

TPM 2.0 Mobile Reference Architecture Specification

The Trusted Computing Group has published three Trusted Platform Module (TPM) 2.0 Mobile Specifications: TPM 2.0 Mobile Reference Architecture TPM 2.0 Mobile Common Profile TPM 2.0 Mobile Command Response Buffer Interface The TPM 2.0 Mobile Reference Architecture Specification defines architecture for the implementation of a TPM 2.0 Library Specification-compliant TPM executing within a Prot... READ MORE

TCG Guidance for Securing IoT

This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases. Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu fro... READ MORE

Guidance for Securing IoT Using TCG Technology Reference Document

This document describes typical IoT security use cases and provides guidance for applying TCG technology to those use cases. Because IoT devices vary widely in their cost, usage, and capabilities, there is no one-size-fits-all solution to IoT security. The practical security requirements for different devices and systems will vary. Therefore, this list of solutions should be regarded as a menu ... READ MORE

TCG TPM 2.0 Mobile Common Profile

The Trusted Computing Group has published three Trusted Platform Module (TPM) 2.0 Mobile Specifications: TPM 2.0 Mobile Reference Architecture TPM 2.0 Mobile Common Profile TPM 2.0 Mobile Command Response Buffer Interface The TPM 2.0 Mobile Reference Architecture Specification defines architecture for the implementation of a TPM 2.0 Library Specification-compliant TPM executing within a Prote... READ MORE

TCG Storage Opal Integration Guidelines

This document provides guidelines on integrating SDs implemented according to the Opal Family of specifications. This includes a description of the ownership model utilized in the TCG Storage specifications; the SID authority and its role in managing the storage device; and the processes and guidelines for taking ownership of the TPer. This document also provides insight on integration of other Op... READ MORE

Multiple Stakeholder Model

The Multiple Stakeholder Model (MSM) is an informative reference document that describes use cases, recommended capabilities, and various implementation alternatives to allow multiple stakeholders to coexist safely on a mobile platform.  This document includes guidance on how to leverage TCG specifications to realize each alternative.  In particular, this document emphasizes the role of the Trus... READ MORE

TCG Guidance for Securing Resource-Constrained Devices

This reference document provides implementation guidance for trusted platforms built with resource-constrained devices. This reference document is not a TCG Specification and therefore is not normative. Latest Version: TCG Guidance for Securing Resource- Constrained Devices Version 1.0, Revision 22 Previous Version: TCG Guidance for Securing Resource-Constrained Devices Version 1 Re... READ MORE

Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.