Trusted Execution Environment, TPM Provide Strong Mobile Security Foundation, Say Experts

Date Published: January, 22, 2015

For some years, Trusted Computing Group (TCG) has been working with GlobalPlatform to help develop mobile security standards and solutions. Recently, Trustonic’s Jon Geater, who works with both organizations, spoke on the relationship between TPM and Trusted Execution Environment, or TEE. A new video has been posted of that talk, which was held at the GlobalPlatform TEE conference. The video is available at

Greater addresses in this talk the complementary nature of the TPM and TEE standards, despite some confusion that they are competitive.

TEE “…is a separate execution environment…that provides security services…and isolates access to hardware and software security resources from the rich OS and applications.”  The TPM, in fact, “…is a secure crypto process…designed to secure hardware by integrating cryptographic keys into devices…”. So, TEE and TPM do different things BUT they work together.

In current, updated specifications for the TPM Mobile, the root of trust is supported by the TEE, which provides platform integrity, isolated execution and access to hardware-based root of trust.

There are demonstrations and supporting materials available, including this white paper.



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More