Trusted Computing Group Releases TPM 2.0 Specification for Improved Platform and Device Security

Date Published: April, 01, 2014

Trusted Platform Module 2.0 Specification Provides Critical, Vendor Neutral Technology to Respond to Security Demands in Today’s Volatile Threat Landscape

Portland, Ore., April 9, 2014 –The Trusted Computing Group (TCG) has announced the availability of the TPM (Trusted Platform Module) 2.0 library specification. TPM 2.0 provides a critical technology response to the global need for a more secure computing environment.

Based on contributions and feedback from TCG member companies and security technology experts representing the world’s leading silicon makers, device makers, software and solution providers as well as researchers, governments and academic institutions, TPMs provide a secure root of trust to protect data in computers and mobile devices from digital and physical attacks, theft or loss.

The TCG also is making available the PC Client Platform TPM Profile (PTP) specification, the first in a series of specifications to enable developers and manufacturers to design TPMs into their products. Specifications for additional platforms, including mobile devices and embedded systems, will follow.

Hundreds of millions of TPMs are embedded into PCs, servers, networking gear, embedded systems and other computing devices, where they help protect computers against unauthorized changes from malware, rootkit attacks and similar malicious activities. TPMs enable more secure processes within the system, such as digital signatures and key exchanges. The TPM can help ensure that unsafe, unverified or out-of-date systems don’t connect to a corporate network and provides a cost effective, built in hardware root of trust that can be used to authenticate devices and users.

Addressing Global Demand for Data Security Best Practices

The TPM 2.0 specification responds to the exponential explosion of devices that require protection from cyber threats both inside and outside the traditional enterprise system firewalls. With growing market demand for enhanced security and privacy, TPM 2.0 offers comprehensive protections based on hardware roots of trust. Together with support for upgraded cryptographic algorithms, the TPM 2.0 specification is designed with cryptographic agility to allow support for more algorithms in the future.

Lastly, TPM 2.0 offers the flexibility for industry implementations across a broad range of platforms including servers, desktops, embedded systems, mobile devices and network equipment. In order to accommodate all of these different platforms, the new specification is written in a way that enables TCG to develop platform specific specifications utilizing TPM 2.0 to meet the requirements of their platform.

About the Trusted Computing Group

The Trusted Computing Group (TCG) provides open standards that protect business-critical data and systems, support secure authentication and protect user identities and networks. TCG maintains a well-defined standards development and review process to ensure best-of-class design considerations and transparency with strong protection of intellectual property rights in alignment with the international norms. More information about the TCG can be found at, on Twitter at @trustedcomputin and on LinkedIn.

Names and brands are the property of their respective owners.


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More