GC-TPM2.0_S – 12-1 Pin SPI TPM 2.0 Module – Discrete Hardware Security
A compact TPM 2.0 add-in card for motherboards that use the 12-1 pin SPI_TPM header. Provides hardware root-of-trust for BitLocker, measured boot, and platform attestation.
Description
This module plugs directly into a board’s SPI_TPM (12-1 pin) header and exposes a TPM 2.0 device to firmware and the OS. Ideal for enabling Windows and enterprise features that require a discrete TPM on systems without fTPM/PTT or when a removable module is preferred.
Technical Specifications
- Model / Part Number: GC-TPM2.0_S
- TPM Standard: 2.0
- Header Type: SPI_TPM, 12-1 pin (keyed)
- Bus/Interface: SPI (discrete TPM)
- Form Factor: Small vertical daughtercard, direct header plug-in
- Functions: Secure key storage, measured boot, PCR/attestation, true hardware RNG
- Firmware/OS: Works with UEFI systems that support discrete SPI TPM; enable in BIOS/UEFI setup
Interchangeable / Replacement Part Numbers
✅ Confirmed Compatibility
Please note that the following list is not exhaustive. Compatibility depends on your system’s specific configuration. It’s essential to verify compatibility with your system or enclosure manufacturer prior to installation.
✔ Intel Platform (boards with SPI_TPM 12-1 header):
Z390 series, H370 series, B360 series, H310 (2.0) series, X299 series, Z370 series; C246 series (e.g., C246-WU4, C246M-WU4, C246N-WU2)
✔ AMD Platform (boards with SPI_TPM 12-1 header):
X570, B550, X470, B450, X370, B350, TRX40, X399, A520
☑️ Key Features
- ☑️ Hardware root-of-trust for encryption keys and credentials
- ☑️ Direct 12-1 pin SPI_TPM plug-in—no cables required
- ☑️ TPM 2.0 support for BitLocker, Device Encryption, Secure Boot workflows
- ☑️ Low-power, compact module for desktops and workstations
⚙️ Fit Notes
- Header type matters: This is SPI_TPM (12-1 pin). It is not the 14-1 LPC style or 20-pin server-style TPM. Check your board’s silkscreen and header layout before ordering.
- Pin-1 orientation: Align the keyed pin correctly; never force insertion.
- BIOS/UEFI: Enable Discrete TPM (disable fTPM/PTT if your board requires choosing one).
- Re-use/migration: If moving the module to another system, clear/initialize the TPM in firmware before enabling BitLocker or similar features.