TCG Releases iTPM 2.0 Library Specification Revision 1.59

June 23, 2020 Perry Cohen

The Trusted Computing group (TCG) released its TPM 2.0 Library specification Revision 1.59. This provides updates to the previous TPM specification to help offset the the growing sophistication of cybersecurity threats.

According to the company, the new specifications provide enhancements for authorization mechanisms; extends the availability of the Trusted Platform Module (TPM) to new applications allowing for more platform specifications to be built; simplifies management; supports additional cryptographic algorithm; and provides additional capabilities to improve the security of TPM services.

“With attacks becoming increasingly more complex in their nature and more devices getting connected, creating new vulnerabilities such as the possibility of everyday items like smart fridges becoming hacked, it is critical that the industry has an effective way of tackling them now and into the future,” said vice president of Trusted Computing Group Rob Spiger, in a press release. “As technology advances, more personal data is being used and can be intercepted or accessed easily if devices are not suitably safeguarded.

“Our latest revision of the TPM 2.0 Library Specification, gives system engineers and software developers a brand-new way to ensure the longevity of a device by utilizing technologies of the TPM in the best way possible.”

The newest feature that was added to said specifications is the Authentication Countdown Time (ACT), which allows engineers to regain control of compromised machines by configuring TPM ACT, restarting the platform.

Further, it also includes a x509Certify command which simplifies access to TPM functions in cryptography.

The group also noted an Attached Component API command facilitates the secure transfer of a TPM object to an externally attached device.

For more information, visit www.trustedcomputinggroup.org.

About the Author

Perry Cohen

Perry Cohen, associate editor for Embedded Computing Design, is responsible for web content editing and creation in addition to podcast production. He also assists with the publication’s social media efforts which include strategic posting, follower engagement, and social media analysis. Before joining the ECD editorial team, Perry has been published on both local and national news platforms including KTAR.com (Phoenix), ArizonaSports.com (Phoenix), AZFamily.com, Cronkite News, and MLB/MiLB among others. Perry received a BA in Journalism from the Walter Cronkite School of Journalism and Mass Communications at Arizona State university. He can be reached by email at <a href="mailto:perry.cohen@opensysmedia.com">perry.cohen@opensysmedia.com</a>. Follow Perry’s work and ECD content on his twitter account @pcohen21.

Follow on Twitter Follow on Linkedin More Content by Perry Cohen
Previous Article
Embedded Insiders Podcast: Let's Settle This. What's More Secure, Proprietary or Open Source?
Embedded Insiders Podcast: Let's Settle This. What's More Secure, Proprietary or Open Source?

This week on the Embedded Insiders, Brandon and Rich discuss an age-old controversy: What’s more secure? Pr...

Next Article
Embedded Toolbox: Use Ada and Let the Compiler Do the Static Analysis
Embedded Toolbox: Use Ada and Let the Compiler Do the Static Analysis

The Ada language abstracts most direct interaction with memory onto compilers, transitioning things like me...