As of 2016, more than half of Internet users access the web on mobile devices. The BYOD, Choose Your Own Device, and enterprise-owned device models mean that business and personal data now coexist on the same device. All of these devices mean even more attack surfaces, as well.
The increase in mobile device usage also means that mobile platforms must securely underpin and support many types of applications. While there are a growing number of software-based security approaches and vendor solutions for the many bits and pieces of the mobile ecosystem, mobile device hardware itself has remained vulnerable to a variety of attacks.
For designers, manufacturers, system integrators, application developers, mobile network operators, and mobile service providers who require enhanced mobile device integrity, trustworthy acquisition and use of mobile applications and mobile services, including enterprise services, and protection of private data assets, the Trusted Computing Group (TCG) has published a collection of specifications that define trusted computing technologies for mobile platforms. These specifications are applicable to all mobile devices (smartphones, feature phones, basic phones, etc.).
In collaboration with GlobalPlatform on alignment and compatibility of TPM 2.0 Mobile and GlobalPlatform Trusted Execution Environment (TEE), TCG has ensured TPM 2.0 Mobile could be implemented as a Trusted Application in a TEE in a standard manner.
As part of its work with GlobalPlatform, TCG is an association partner for the Trusted Execution Environment (TEE) Seminar, a forum for the industry’s foremost TEE subject matter experts to discuss the key trends impacting the device security market. More info at http://www.teeseminar.org/.
Learn more about the approach and collaboration between TCG and GlobalPlatform and how it can be implemented here: https://trustedcomputinggroup.org/work-groups/mobile/
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.