TPM from PCs to the IoT

Date Published: March, 13, 2017

Approaching its teen years, the Trusted Platform Module, or TPM, has experience inevitable growing pains. In the last few years, TCG members have collectively provided extensive input and expertise around security, system design and development, networking, encryption and more to evolve the original specification to a new library approach (see

The TPM 2.0 allows key attributes of the TPM to be integrated different ways into a variety of devices and systems, recognizing the growing need for security beyond the traditional PC or server and including the multitude of new connected devices.

With billions of TPMs now included in systems and devices, we continue to see the evolution of how the TPM can be used to enable better security. Some recent examples can be found:

TCG Member Mocana Supports Infineon TPM for IoT

TPM Key to OpenFog Consortium IoT Efforts for IoT Security

STMicro Announces New TPMs for IoT and Other Devices

New ClearCube Blade PC Includes TPM for Security

Torvald Support for TPM

Watch for updates as new applications emerge for the TPM and additional vendors work to support the TPM with tools, software and hardware and integration of the TPM into new systems and devices.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More