TPM Main Specification

Date Published: March, 01, 2011

The TPM main specification is an industry specification that enables trust in computing platforms in general. The main specification is broken into parts to make the role of each document clear. A version of the specification (like 1.2) requires all parts to be a complete specification. A TPM designer MUST be aware that for a complete definition of all requirements necessary to build a TPM, the designer MUST use the appropriate platform specific specification for all TPM requirements.

Specification Versions Available for Download:

Latest Version:

TPM Main Specification Level 2 Version 1.2, Revision 116

Previous Versions:

TPM Main Specification Level 2 Version 1.2, Revision 103

JTC1, a joint committee of the International Organization for Standardization, or ISO, and IEC, the International Electrotechnical Commission, has accepted and published the Trusted Computing Group Trusted Platform Module specification Version 1.2 as ISO/IEC standard 11889:2009.

The ISO/IEC 11889:2009 standard publication is currently available at:

TPM Main Specification Version 1.2, Revision 94

TPM Main Specification Version 1.2, Revision 85

TPM Main Specification Version 1.2, Revision 62

TCPA Main Specification Version 1.1b


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.