Premio TPM 2.0

TPM 2.0 Technology: Premio’s Cybersecurity Armor for Connected Computing

Embedded and rugged edge compute systems collecting and processing sensitive data become targets for cyberattacks as they connect to the IoT. Intellectual property, personal data and machine commands become increasingly susceptible to exfiltration or manipulation with increased connectivity. To protect its systems — as wells as the people, products and services dependent on their security — Premio integrates trusted platform modules (TPMs) with TPM 2.0 standards. Learn more about TPM 2.0 for IoT

security module

Security Standard

TPM 2.0 is the international standard for microcontrollers dedicated to hardware security.

security standard

Discrete Module

The tamper-resistant TPM cryptoprocessor is physically connected to the motherboard.

IoT Core

IoT Core Edition

Control access to protected data at connected endpoints and cloud interfaces.

Premio TPM 2.0 Shield
TPM technology secures connected systems at the hardware level. Premio’s embedded and rugged edge computers are deployable with TPM microcontrollers protecting systems and data. This enterprise-level security is extended to IoT devices connected to systems through authentication and key management.

Trusted Platform Module 2.0

TPM standards ensure secure data storage, as well as platform authentication and integrity auditing. TPM 2.0’s three hierarchies permit multiple root keys for improved security over TPM 1.2 standards. This provides better resistance to malware and rogue applications affecting legitimate processes.

Hardware Base Security

TPMs scan BIOS to detect unauthorized changes to the system.

Secure When Hardware is Altered

The TPM locks the system when the hard drive is unexpectedly relocated.

BitLocked Drive Encryption

The TPM can enable BitLocker Drive encryption to determine if conditions are safe for booting.



TPM Features

  • Safeguards data with a secure hardware-integrated algorithm
  • Protects against hackers, malware and physical theft
  • Resists brute force decryption attack
  • Generates quality random numbers
  • Provides support for encryption in the platform
  • Establishes platform identities
  • Store keys and data
  • Signs and verifies digital signatures
  • Audits key usage and data access