The Wayback Machine - https://web.archive.org/web/20161101103322/https://www.trustedcomputinggroup.org/tpm-2-0-mobile-reference-architecture-specification/

TPM 2.0 Mobile Reference Architecture Specification

Date Published: December, 01, 2014

The Trusted Computing Group has published three Trusted Platform Module (TPM) 2.0 Mobile Specifications:

The TPM 2.0 Mobile Reference Architecture Specification defines architecture for the implementation of a TPM 2.0 Library Specification-compliant TPM executing within a Protected Environment in mobile platforms. It includes examples of several implementation approaches.

The TPM 2.0 Mobile Common Profile Specification defines a profile of the TPM 2.0 Library Specification that is applicable to all mobile devices that claim conformance to the TPM 2.0 Mobile Reference Architecture and is optimized for ease-of-implementation in feature phones, basic phones, eBook readers, and other similar constrained mobile devices.

The Command Buffer Response (CRB) Interface is an interface between a TPM and software and is intended to work with a large number of implementation options. With the CRB Interface it is possible to write a driver that can interact with a TPM, whether implemented as a discrete component on a peripheral bus, or in an execution mode in a Protected Environment. The CRB Interface can be implemented on any TPM architecture, including PC client.

Further to the precursor Mobile Trusted Module (MTM) v1.0 Specification, enhancements defined in the TPM 2.0 Mobile Specifications include:

  • A firmware TPM 2.0 Mobile architecture implementable in a system-on-a-chip isolated Protected Environment
  • Revised definitions of the inherently trusted Roots of Trust
  • Enhancements to the availability of TPM 2.0 Mobile to trusted applications
  • Enhanced authorization for improved TPM 2.0 Mobile management
  • Support for algorithm agility
  • Secure Boot and Measured Boot

The intended mobile platforms for these specifications range from the most basic ebook readers, to basic phones and feature phones, up to smartphones and could also be supported on tablets and laptops.

The security services that the TPM 2.0 Mobile Specifications facilitate are aimed at consumers (end users), enterprises, mobile device manufacturers, mobile network operators, mobile service providers, the public sector, and others.

Standardized mobile endpoint security provides essential TPM security services for a wide range of mobile use cases and applications. It enables protection of private and sensitive assets, cross-platform security compatibility, and interoperability across mobile device types.

Latest Revision:

TCG TPM 2.0 Mobile Reference Architecture, Revision 142

Related Resource:

TPM 2.0 Mobile Architecture FAQ

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more