Trusted Platform Module (TPM)

The Trusted Platform Module (TPM) Work Group has been chartered to create the TPM specification. The definition of the TPM architecture comes from the Technical Committee and the TPM Work Group defines the implementation of that architecture. A working knowledge of security in relation to the design and usage of cryptographic modules as well as cryptographic techniques including public-key cryptography, cryptographic algorithms and protocols is recommended.

A new research report on “Trusted Computing” published by Aberdeen Group, a Harte-Hanks Company (NYSE:HHS), reveals that organizations that have deployed applications based on trusted computing infrastructure exhibit superior capabilities in security governance, risk management and compliance compared to other respondents. The term “trusted computing” refers to applications that leverage hardware-based “roots of trust” at the edge of the network and at the endpoints – sometimes referred to as “hardware anchors in a sea of untrusted software” – for higher assurance.

TPMs are a basic building block used in most other specifications, for providing an anchor of trust. They can be used for validating basic boot properties before allowing network access (TNC), or for storing platform measurements (PC Client), or for providing self-measurement to provide anchors of trust to hypervisors (Virtualization).

David Challener

Johns Hopkins University Applied Physics Laboratory; Work Group Co-Chair

Kenneth Goldman

Senior Engineer, IBM; Work Group Co-Chair


Resource NameResource Type
TPM Library Specification 2.0Specification
Errata for TPM Library Specification 2.0Specification
PC Client Protection Profile for TPM 2.0Specification
TCG PC Client Platform Physical Presence Interface Specification 1.2 and 2.0Specification
TPM Main SpecificationSpecification
PC Client Protection Profile for TPM 1.2Specification
TCG Algorithm RegistryRegistry
Vendor ID RegistryRegistry
Registry of Reserved TPM 2.0 Handles and LocalitiesRegistry
TCG Specification Architecture OverviewPublic Review
A Practical Guide to TPM 2.0Book
Protect Your Data and Enhance SecurityInfographic
BSSSD: Trusted Computing Now Available for FreeBSD and OpenBSDOpen Source
Trusted Platform Module (TPM) SummaryWhite Paper
Replacing Vulnerable Software with Secure HardwareWhite Paper
Implementing Hardware Roots of TrustWhite Paper
How to Use the TPM: A Guide to Hardware-Based Endpoint SecurityWhite Paper
CESG IA Top Tips - Trusted Platform ModulesOther
Trusted Platform Module (TPM) 2.0: A Brief OverviewOther


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.