Date Published: September, 18, 2017

Members to Discuss Foundational Trust and Security for the Industrial IoT at

Oct. 3 Session, IoT Solutions World Conference

PORTLAND, Ore., Sept. 18, 2017Trusted Computing Group (@TrustedComputin) has released the Device Identifier Composition Engine (DICE) Architecture for securing resource-constrained devices that make up the Internet of Things.

The DICE Architecture provides critical security and privacy benefits to IoT and embedded systems where traditional Trusted Platform Modules (TPM) may be impractical, while also enabling support for those devices with a TPM for additional security benefits.

Security capabilities this new approach enables include strong device identity, attestation of device firmware and security policy, and safe deployment and verification of software updates, which often are a source of malware and other attacks. The DICE Architecture, with its hardware root of trust for measurement, breaks up the boot process into layers and creates unique secrets and a measure of integrity for each layer.   This means if malware is present, the device is automatically re-keyed and secrets are protected.

To make it simpler for device makers and vendors, there is no requirement to retain or store databases of unique secrets.  The DICE Architecture integrates easily into existing infrastructure and the architecture is flexible and compatible with existing security standards.

TCG members Microsoft, Micron and STMicroelectronics are providing info and resources on using DICE and other member announcements will follow.

At the IoT Solutions World Congress, Tuesday, Oct. 3, 09:30-13:00 p.m. in Fira Barcelona, hall CC5, room 5.1, TCG members GE, Infineon, Microsoft, OnBoard Security and Wibu-Systems will host a session about how to implement DICE and the group’s efforts to secure the industrial IoT.

Speakers from the companies will talk to attendees about deploying techniques to better secure the industrial Internet of Things, how to ensure identity and security of very constrained “things”, and using available APIs for encryption, authentication, device identity and integrity.

TCG session attendees must have a conference or expo pass to the congress event and can save 500€ on a Full Conference Pass with code 526E24AF or get a free Expo Pass with code 111B9B47.

About TCG

TCG (@TrustedComputin) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. More information about TCG is available at Follow TCG on Twitter and on LinkedIn


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More