Microchip logo
  • All
  • Products
  • Documents
  • Applications Notes

Trusted Platform Module

Complete Security for PCs and Embedded Systems

The FIPS 140-2 Certified Trusted Platform Module (TPM) provides strong hardware-based public key (RSA) security for both personal computers and embedded processors on a single chip. It is a complete turnkey system that integrates our industry-leading AVR® microcontroller architecture, EEPROM technology and security technology. Implementing version 1.2 of the Trusted Computing Group (TCG) specification for TPMs, the chip supports secure boot via platform integrity measurements, intellectual property protection, authentication, and secure communications. The AT97SC* series is offered in three different interfaces: SPI, LPC, and I2C. All revisions are supported in both Commercial and Industrial grades.

Download the TPM Selection Guide

Key Features

  • Turnkey solution — The TPM includes integrated, protected nonvolatile storage for cryptographic keys, secrets, and authorization information.
  • Full TCG compliance — According to TCG, applications based on the trusted computing infrastructure exhibit superior security governance and risk management.
  • Hardware security — The TPM includes a high-quality hardware random number generator, active shielding, and a variety of tamper-detection and response circuits.
  • High performance — The TPM’s cryptographic accelerator can compute a 2048-bit RSA signature in 200 ms.
  • Energy savings — The TPM supports SIRQ for interrupts and CLKRUN to permit clock stopping for power savings in mobile computers.
  • Software support — BIOS and hardware drivers are available for both Windows® and Linux® operating systems; third-party system and application software is also available.
  • Two interfaces — There is a 33 MHz LPC interface for PC integration and a 2-wire interface for non-PC and embedded computing systems.
Device FamilySummary BenefitApplicationsTechnologiesKey Parameters
TCG Version 1.2Standards-based hardware security 

Network authentication 

Internet 'compatible' 

Turnkey solution 

Full TCG compliance 

High performance 

Software support libraries

Two interfaces – LPC and 2-wire
System, device and network authentication 

Intellectual property protection, system integrity and secure communications.

AVR Microcontrollers

EEPROM technology 

Hardware Security technology 

Cryptographic accelerator 

Random Number Generator 

Anonymous ID


Trusted Platform Module 

PC security 

Tablet security 


Trusted Computing Group