PP for a PC Client Specific Trusted Platform Module Family 2.0 Level 0 Revision 1.16

Others / Smart Card

Certification Body

Agence Nationale de la Sécurité des Systčmes d’Information (ANSSI)


Trusted Computing Group (TCG)

Point of Contact

Trusted Computing Group (TCG), 3855 SW 153rd Drive, Beaverton, OR 97006, USA

Certification ID


PP Version

version 1.0

CC Version

3.1 Revision 4

CC Conformance Claim

CC part 2 extended
CC part 3 conformant
EAL 4 augmented by ALC_FLR.1 and AVA_VAN.4

Certification status

Certified 6 May 2015




This Protection Profile is established by Trusted Computing Group Administration. It describes the security requirements for the development of a TCG PC Client Specific Trusted Platform Module (PCCS TPM).

This TPM is hardware, firmware and software that implements the functions defined in the TCG Trusted Platform Module Main Specification, Family 2.0, Level 0, Revision 1.16, and the PC client specific interface specification.

The TCG Trusted Platform Module Specification describes the design principles, the TPM structures and the TPM commands.

The PC Client Interface Specification describes the platform-specific set of requirements of the TPM for the PC Client and the details of what interfaces and protocols are used to communicate with the TPM. The primitives provided by the TPM include cryptographic algorithms for key generation, digital signatures, random number generation, sealing data to system state, protected storage, binding information to the TPM and support of direct anonymous attestation.

Relation to other PPs

The Protection Profile is an update of the PP for a PC Client Specific Trusted Platform Module Family 1.2 Level2 :

  • v1.1 (BSI-CC-PP-0030-2008)
  • v1.2 (BSI-CC-PP-0030-2008-MA-01)

The key changes to that Protection Profile as compared to those previous Protection Profiles include:

  • Support for additional algorithms
  • Agility of algorithms for use by geographies or markets that require specific-use algorithms
  • Enhancements to the availability of the TPM to applications
  • Enhanced authorization for improved TPM management
  • Additional cryptographic services to enhance the security of platform services