OPTIGA™ TPM

  • Products
  • Highlights
  • Documents
  • Boards
  • Simulation
  • Videos
  • Forums
  • Support
  • Software & Tools
  • Sales Insight

Protecting integrity and authenticity of embedded devices and systems


OPTIGA™ TPM subcategories


OPTIGA™ TPM (Trusted Platform Module) offers a broad portfolio of standardized security controllers to protect the integrity and authenticity of embedded devices and systems. With a secured key store and support for a variety of encryption algorithms, OPTIGA™ TPM security chips provide robust protection for critical data and processes through their rich functionality.

 

OPTIGA™ TPM security controllers are ideal for platforms running both Windows and Linux (and its derivatives). Based on Trusted Computing Group (TCG) standards, they support the TPM 1.2 or the latest innovative TPM 2.0 standard.

 

  iot_award_infineon         

IoT Solutions World Congress, Barcelona 2016:

Best Solution in Manufacturing

 

The IoT Solutions World Congress awarded Infineon for Best Solution in Manufacturing. Mocana, who recently joined the Infineon Security Partner Network (ISPN) and Infineon take security for IoT to the next level by combining advanced security features with our highly valued and widely used OPTIGA™ TPM.

 


Product Product Description Interfaces Ambient Temperature Package Additional Information
Matching Results: 15
descending ascending descending ascending descending ascending descending ascending descending ascending descending ascending descending ascending
SLB 9670 VQ2.0 FW7.40   Security cryptocontroller for trusted platform modules
SPI
-20.0 °C
85.0 °C
VQFN-32
Version 2.0 Rev. 01.16
SLB 9670 XQ2.0 FW7.40   Security cryptocontroller for trusted platform modules
SPI
-40.0 °C
85.0 °C
VQFN-32
Version 2.0 Rev. 01.16
SLB 9670 XQ1.2 FW6.40   Security cryptocontroller for trusted platform modules
SPI
-40.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116
SLB 9670 VQ1.2 FW6.40   Security cryptocontroller for trusted platform modules
SPI
-20.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116
SLB 9665 TT2.0 FW5.51   Security cryptocontroller for trusted platform modules
LPC
-20.0 °C
85.0 °C
TSSOP-28
Version 2.0 Rev. 01.16
SLB 9665 VQ2.0 FW5.51   Security cryptocontroller for trusted platform modules
LPC
-20.0 °C
85.0 °C
VQFN-32
Version 2.0 Rev. 01.16
SLB 9665 XT2.0 FW5.51   Security cryptocontroller for trusted platform modules
LPC
-40.0 °C
85.0 °C
TSSOP-28
Version 1.2 Rev. 116
SLB 9665 XQ2.0 FW5.51   Security cryptocontroller for trusted platform modules
LPC
-40.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116
SLB 9660 TT1.2 FW4.40   Security cryptocontroller for trusted platform modules
LPC
-20.0 °C
85.0 °C
TSSOP-28
Version 1.2 Rev. 116
SLB 9660 VQ1.2 FW4.40   Security cryptocontroller for trusted platform modules
LPC
-20.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116
SLB 9660 XT1.2 FW4.40   Security cryptocontroller for trusted platform modules
LPC
-40.0 °C
85.0 °C
TSSOP-28
Version 1.2 Rev. 116
SLB 9660 XQ1.2 FW4.40   Security cryptocontroller for trusted platform modules
LPC
-40.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116
SLB 9645 TT1.2 FW133.32   Security cryptocontroller for trusted platform modules
I2C
-20.0 °C
85.0 °C
TSSOP-28
Version 1.2 Rev. 116
SLB 9645 XT1.2 FW133.32   Security cryptocontroller for trusted platform modules
I2C
-40.0 °C
85.0 °C
TSSOP-28
Version 1.2 Rev. 116
SLB 9645 XQ1.2FW133.32   Security cryptocontroller for trusted platform modules
I2C
-40.0 °C
85.0 °C
VQFN-32
Version 1.2 Rev. 116

Standardized and certified protection for a broad range of applications

OPTIGA™ TPM

Standardized and feature-rich security solution for larger platforms based on the Trusted Computing Group specifications.

SLB 9645* TPM 1.2

I2C interface

Based on Common Criteria Certified Code

SLB 9660 TPM 1.2

LPC interface

Common Criteria Certified

SLB 9665 TPM 2.0

LPC interface

Common Criteria Certified

SLB 9670 TPM 1.2

SPI interface

Common Criteria Certified

SLB 9670 TPM 2.0

SPI interface

Common Criteria Certified

 

 *product versions for Chrome OS available 

 

Key features

  • High-end security controller with advanced cryptographic algorithms implemented in hardware (e.g. RSA & ECC256, SHA-256)
  • Common Criteria (EAL4+) and FIPS security certification
  • Flexible integration thanks to SPI, I2C or LPC interface support
  • Extended temperature range (-40 to +85°C) for a variety of applications

 

Key benefits

  • Reduced risk based on proven technology
  • Fast time to market through concept reuse
  • Flexibility thanks to wide range of security functions as well as dedicated key management
  • Easy integration into all platform architectures and operating systems (Windows, Linux & derivatives

 

Applications

  • PC and embedded computing
  • Network equipment
  • Industrial control systems
  • Home security and automation
  • Energy generation and distribution systems
  • Automotive electronics

 

 

 Whitepaper:

> Hardware-based Secure Identities for machines in smart factories

 

 

 

 Video:

> What´s the right security for IoT?

 

 

  Articles:

> Hardware-based solutions secure machine identities in smart factories

> Root of trust approach secures the IoT

 


Data Sheet

Title Size Date Version
907 KB 10 Dec 2015 12_14
553 KB 29 Feb 2016 11_15
564 KB 01 Mar 2016 11_15
1.4 MB 10 Dec 2015 02_14
929 KB 10 Dec 2015 10_15

Product Brief

Title Size Date Version
277 KB 06 Oct 2015 10_15

Whitepaper

Title Size Date Version
2.6 MB 23 Jun 2016 06_16

Additional Product Information

Title Size Date Version
265 KB 20 Jul 2016 07_16
428 KB 23 Jan 2014 03_00
232 KB 04 Apr 2012 01_00
163 KB 04 Apr 2012 01_00

Application Notes

Title Size Date Version
1.8 MB 17 Feb 2016 01_01
2.6 MB 04 Jul 2016 06_16

Getting Started

Title Size Date Version
94 KB 19 Jul 2012 01_00

Product Selection Guide

Title Size Date Version
2.1 MB 03 Nov 2015 11_15

Article

Title Size Date Version
358 KB 02 Feb 2016 01_00

Application Brochure

Title Size Date Version
1.2 MB 10 Nov 2015 11_15
625 KB 01 Feb 2016 01_16
2.2 MB 26 Oct 2015 10_15
1.5 MB 18 Feb 2016 02_16

Evaluation Boards

Board Family Description Status
TPM 45 IRIDIUMBOARD OPTIGA™ family The TPM provides hardware security for embedded platforms. A seamless integration into Raspberry Pi® Model B and BeagleBoard xM Rev C with OS Linux kernel version 3.14 is available for download. A secured channel can be established with OpenSSL and GnuTLS utilizing a TPM-protected Server Certificate.

    Security for smart factories – secured industrial networks with OPTIGA™ TPM

    This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module).

     
    Length 4:45

     

    Securing communication in the Internet of Things – Raspberry Pi with OPTIGA™ TPM

    To protect transferred data and enable the reliable operation of devices, strong security measures are crucial. Check out the demo how using a Raspberry Pi board with an Infineon OPTIGA™ TPM enables secured communication of connected devices.

     
    Length 2:36

     

     

    Advanced trusted computing with OPTIGA™ TPM

    In the Internet of Things (IoT) mobile devices are becoming the center of the connected world. Large amounts of sensitive data are stored on the device are accessed remotely via network connections. Comprehensive security measures are essential to protect the device and its data and ensure long term satisfaction of customers. As market leader in Trusted Computing, Infineon combines proven track record with reliable platform security to enable trust in connected devices.

     

    Length 1:37

    Trusted computing for IoT security

    Demonstrations of Cisco and Infineon

    Trusted Computing is one of the strongest technologies to enable security for IoT devices and networks. The video shows a demonstrator in the field of building application based on Infineon’s OPTIGA™ TPM.

     

    Length 3:13

     

    Security for smart factories – secured industrial networks with OPTIGA™ TPM

    This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module). The security chips (OPTIGA™ TPM) identify computers, routers and machines in networks and grant access to the company network only to authorized persons and non-manipulated devices. Only after the successful authentication process, encrypted data can be transmitted from one business site to another via secure telecommunications networks. OPTIGA™ TPM is a standardized, feature-rich security solution which protects the integrity and authenticity of devices and systems in embedded industrial networks. It builds on proven technologies and supports the latest TPM 2.0 standard.

     

    Length 4:45

     

    Security Solutions for Industrial Automation with OPTIGA™ Trust Family

    Infineon offers a range of security solutions for industrial automation that strengthen the security of industrial systems. These solutions support the limitation of system or network access to trustworthy components and machines.

    Demonstration at Embedded World 2016

     

    Length 1:32

     

    Self Service

    Infineon welcomes your comments and questions.

    If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.

    You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.

    I agree that my personal data mentioned above (including my e-mail address and phone number) can be gathered, processed and used for sales promotion and market research by Infineon Technologies AG and its licensed distribution partners.

    For more information about our privacy policy please click on Privacy Policy

    Where to buy

    Please use our location finder to get in contact with your nearest Infineon distributor or sales office

    Find a location

    Ask Infineon