“In order to foster compliant and secure product implementations, the TCG recently launched its ‘TPM Certification Program’. The program demonstrates compliance and security evaluation of products and identifies those that have successfully passed all its requirements,” said Scott Rotondo, President and Chairman of the Trusted Computing Group. “That Infineon is the world’s first semiconductor provider that has successfully passed our TPM Certification Program underlines Infineon’s leading role in hardware-based security.”
Further to the Infineon TPM’s successful CC and TCG certification, the company has worked closely with CESG to ensure that the product meets strict UK Government requirements for protecting security critical data. CESG is the UK National Technical Authority for Information Assurance.
The close working relationship between CESG and Infineon has enabled the first in depth, fully impartial assessment of a TPM’s security from development through deployment. CESG has assessed that the Infineon TPM is suitable to protect security critical data at Business Impact Level 3 (e.g. RESTRICTED classified data). This makes Infineon the sole provider today of TPMs that are fully compliant with the strict UK-specific requirements.
”Partnering with industry is critical for CESG, which has a key role in aggregating the UK Government’s Information Assurance (IA) requirements, to gain assurance in commercial IA products and reduce reliance on expensive bespoke systems,” said Nick Hopkinson, CESG’s Director General for Information Assurance and Security. “The cooperation with Infineon is a significant first step in enabling the use of Trusted Computing technology in UK government networks.”
To strongly authenticate authorized notebook and desktop PC platforms and to securely store keys and passwords, the Infineon TPM, the SLB 9635 TT 1.2, offers hardware-based security features. Integrated onto the motherboard of a mobile or stationary PC, Infineon’s TPM helps shield the stored data against unauthorized access, provides strong authentication and improves the system integrity. In government applications, it enables more secure data storage and secure online information exchange while protecting privacy.