- Software & Tools
Protecting integrity and authenticity of embedded devices and systems
Standardized and certified protection for a broad range of applications
OPTIGA™ TPM (Trusted Platform Module) offers a broad portfolio of standardized security controllers to protect the integrity and authenticity of embedded devices and systems. With a secured key store and support for a variety of encryption algorithms, OPTIGA™ TPM security chips provide robust protection for critical data and processes through their rich functionality.
OPTIGA™ TPM security controllers are ideal for platforms running both Windows and Linux (and its derivatives). Based on Trusted Computing Group (TCG) standards, they support the TPM 1.2 or the latest innovative TPM 2.0 standard.
| OPTIGA™ TPM
This family builds a root of trust in PC, mobile and embedded solutions based on the Trusted Computing Group specifications.
|SLB 9645*||SLB 9660*||SLB 9665||SLB 9670||SLB 9670|
|TPM 1.2||TPM 1.2||TPM 2.0||TPM 1.2||TPM 2.0|
|I2C interface||LPC interface||LPC interface||SPI interface||SPI interface|
|Based on Common Criteria Certified Code||
Common Criteria Certified
|Common Criteria Certified||Common Criteria Certified||Common Criteria Certified|
*product versions for Chrome OS available
Protecting integrity, authenticity and confidentiality of information with OPTIGA™ TPM
- High-end security controller with advanced cryptographic algorithms implemented in hardware (e.g. RSA & ECC256, SHA-256)
- Common Criteria (EAL4+) and FIPS security certification
- Flexible integration thanks to SPI, I2C or LPC interface support
- Extended temperature range (-40 to +85°C) for a variety of applications
- Reduced risk based on proven technology
- Fast time to market through concept reuse
- Flexibility thanks to wide range of security functions as well as dedicated key management
- Easy integration into all platform architectures and operating systems (Windows, Linux & derivatives
- PC and embedded computing
- Network equipment
- Industrial control systems
- Home security and automation
- Energy generation and distribution systems
- Automotive electronics
|907 KB||10 Dec 2015||12_14|
|553 KB||29 Feb 2016||11_15|
|564 KB||01 Mar 2016||11_15|
|1.4 MB||10 Dec 2015||02_14|
|929 KB||10 Dec 2015||10_15|
|277 KB||06 Oct 2015||10_15|
Additional Product Information
|265 KB||20 Jul 2016||07_16|
|428 KB||23 Jan 2014||03_00|
|238 KB||04 Apr 2012||01_00|
|163 KB||04 Apr 2012||01_00|
|1.8 MB||17 Feb 2016||01_01|
|2.6 MB||04 Jul 2016||06_16|
|94 KB||19 Jul 2012||01_00|
|236 KB||05 Apr 2012||01_00|
Product Selection Guide
|2.1 MB||03 Nov 2015||11_15|
|1.5 MB||18 Feb 2016||02_16|
|1.2 MB||10 Nov 2015||11_15|
|625 KB||01 Feb 2016||01_16|
|2.2 MB||26 Oct 2015||10_15|
|2.6 MB||23 Jun 2016||06_16|
This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module).
To protect transferred data and enable the reliable operation of devices, strong security measures are crucial. Check out the demo how using a Raspberry Pi board with an Infineon OPTIGA™ TPM enables secured communication of connected devices.
In the Internet of Things (IoT) mobile devices are becoming the center of the connected world. Large amounts of sensitive data are stored on the device are accessed remotely via network connections. Comprehensive security measures are essential to protect the device and its data and ensure long term satisfaction of customers. As market leader in Trusted Computing, Infineon combines proven track record with reliable platform security to enable trust in connected devices.
Demonstrations of Cisco and Infineon
Trusted Computing is one of the strongest technologies to enable security for IoT devices and networks. The video shows a demonstrator in the field of building application based on Infineon’s OPTIGA™ TPM.
This demo shows how sensitive data can be communicated through secured channels from one production site to another using OPTIGA™ TPM (Trusted Platform Module). The security chips (OPTIGA™ TPM) identify computers, routers and machines in networks and grant access to the company network only to authorized persons and non-manipulated devices. Only after the successful authentication process, encrypted data can be transmitted from one business site to another via secure telecommunications networks. OPTIGA™ TPM is a standardized, feature-rich security solution which protects the integrity and authenticity of devices and systems in embedded industrial networks. It builds on proven technologies and supports the latest TPM 2.0 standard.
Infineon offers a range of security solutions for industrial automation that strengthen the security of industrial systems. These solutions support the limitation of system or network access to trustworthy components and machines.
Demonstration at Embedded World 2016
Infineon welcomes your comments and questions.
If you have any questions concerning our products, please fill out the following form. Your inquiry will be sent to the appropriate specialist who will be in touch with you as soon as possible.
You will receive a confirmation E-mail to validate your address in our system. Any attached file to the reply which will help to support your inquiry is highly appreciated.