The Trusted Computing group (TCG) released its TPM 2.0 Library specification Revision 1.59. This provides updates to the previous TPM specification to help offset the the growing sophistication of cybersecurity threats.
According to the company, the new specifications provide enhancements for authorization mechanisms; extends the availability of the Trusted Platform Module (TPM) to new applications allowing for more platform specifications to be built; simplifies management; supports additional cryptographic algorithm; and provides additional capabilities to improve the security of TPM services.
“With attacks becoming increasingly more complex in their nature and more devices getting connected, creating new vulnerabilities such as the possibility of everyday items like smart fridges becoming hacked, it is critical that the industry has an effective way of tackling them now and into the future,” said vice president of Trusted Computing Group Rob Spiger, in a press release. “As technology advances, more personal data is being used and can be intercepted or accessed easily if devices are not suitably safeguarded.
“Our latest revision of the TPM 2.0 Library Specification, gives system engineers and software developers a brand-new way to ensure the longevity of a device by utilizing technologies of the TPM in the best way possible.”
The newest feature that was added to said specifications is the Authentication Countdown Time (ACT), which allows engineers to regain control of compromised machines by configuring TPM ACT, restarting the platform.
Further, it also includes a x509Certify command which simplifies access to TPM functions in cryptography.
The group also noted an Attached Component API command facilitates the secure transfer of a TPM object to an externally attached device.
For more information, visit www.trustedcomputinggroup.org.
About the AuthorFollow on Twitter Follow on Linkedin More Content by Perry Cohen