Trusted Computing Group
Encyclopedia
The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative started by AMD, Hewlett-Packard
Hewlett-Packard
Hewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, USA that provides products, technologies, softwares, solutions and services to consumers, small- and medium-sized businesses and large enterprises, including...

, IBM
IBM
International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...

, Intel, and Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

 to implement Trusted Computing
Trusted Computing
Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...

. Many others followed.

Overview

TCG's original goal was the development of a Trusted Platform Module
Trusted Platform Module
In computing, Trusted Platform Module is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security...

 (TPM), a semiconductor intellectual property core
Semiconductor intellectual property core
In electronic design a semiconductor intellectual property core, IP core, or IP block is a reusable unit of logic, cell, or chip layout design that is the intellectual property of one party. IP cores may be licensed to another party or can be owned and used by a single party alone...

 or integrated circuit
Integrated circuit
An integrated circuit or monolithic integrated circuit is an electronic circuit manufactured by the patterned diffusion of trace elements into the surface of a thin substrate of semiconductor material...

 that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing
Trusted Computing
Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...

 features. TCG-compliant functionality has since been integrated directly into certain mass-market chipset
Chipset
A chipset, PC chipset, or chip set refers to a group of integrated circuits, or chips, that are designed to work together. They are usually marketed as a single product.- Computers :...

s.

TCG also recently released the first version of their Trusted Network Connect
Trusted Network Connect
Trusted Network Connect or TNC is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group of the Trusted Computing Group . -History:...

 ("TNC") protocol specification, based on the principles of AAA
AAA protocol
In computer security, AAA commonly stands for authentication, authorization and accounting.- Authentication :Authentication refers to the process where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the...

, but adding the ability to authorize network clients on the basis of hardware
Computer hardware
Personal computer hardware are component devices which are typically installed into or peripheral to a computer case to create a personal computer upon which system software is installed including a firmware interface such as a BIOS and an operating system which supports application software that...

 configuration, BIOS
BIOS
In IBM PC compatible computers, the basic input/output system , also known as the System BIOS or ROM BIOS , is a de facto standard defining a firmware interface....

, kernel version, and which updates that have been applied to the OS
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

 and anti-virus software, etc.

In 2009, TCG released a set of specifications that describe the protocol to communicate with self encrypting disk drives
Hardware-based full disk encryption
Hardware-based full disk encryption is available from many hard disk drive vendors, including: Seagate Technology, Hitachi, Western Digital, Samsung, Toshiba and also solid-state drive vendors such as Samsung...

. The TCG Storage Work Group (SWG) Storage Core Architecture Specification describes in detail how to implement and utilize trust and security services on storage device
Storage device
Storage device may refer to:*Box, or any of a variety of containers or receptacles*Data storage device, a device for recording information, which could range from handwriting to video or acoustic recording, or to electromagnetic energy modulating magnetic tape and optical discs* Object storage...

s. Security Subsystem Class (SSC) Specifications describe the requirements for specific classes of devices; specifically, the Enterprise SSC defines minimum requirements for Data Center and Server Class devices while the Opal SSC defines minimum requirements for client devices.

The owner of a TPM-enabled system has complete control over what software does and does not run on their system This does include the possibility that a system owner would choose to run a version of an operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...

 (OS) that refuses to load unsigned or unlicensed software, but those restrictions would have to be enforced by the operating system and not by the TCG technology. What a TPM does provide in this case is the capability for the OS to lock software to specific machine configurations, meaning that "hacked" versions of the OS designed to get around these restrictions would not work. While there is legitimate concern that OS vendors could use these capabilities to restrict what software would load under their OS (hurting small software companies or open source
Open source
The term open source describes practices in production and development that promote access to the end product's source materials. Some consider open source a philosophy, others consider it a pragmatic methodology...

/shareware
Shareware
The term shareware is a proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience. Shareware is often offered as a download from an Internet website or as a compact disc included with a...

/freeware
Freeware
Freeware is computer software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights. Freeware is in contrast to commercial software, which is typically sold for profit, but might be distributed for a business or commercial purpose in the...

 providers, and causing vendor lock-in
Vendor lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services, unable to use another vendor without substantial switching costs...

 for some data formats), no OS vendor has yet suggested that this is planned. Furthermore, since restrictions would be a function of the operating system, TPMs could in no way restrict alternative operating systems from running, including free or open source operating systems. There are several projects which are experimenting with TPM support in free operating systems; examples of such projects include a TPM device driver for Linux, an open source implementation of the TCG's Trusted Software Stack called TrouSerS (recently also ported to Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

 and Windows 7), a Java
Java (programming language)
Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities...

 interface to TPM capabilities called TPM/J, and a TPM-supporting version of the Grub
GNU GRUB
GNU GRUB is a boot loader package from the GNU Project. GRUB is the reference implementation of the Multiboot Specification, which provides a user the choice to boot one of multiple operating systems installed on a computer or select a specific kernel configuration available on a particular...

 bootloader called TrustedGrub.

Related projects

The TPM 1.1 specification envisioned a standard PC platform equipped with a TPM chip. In this scenario, the TPM chip can serve as a hardware key storage. Additionally, it can keep track of so-called measurements of the platform (i.e. hashes of various software) and be able to produce signed statements about the running software chain. Particularly the latter mode of operation proved unfeasible in practice, since the amount of software that has to be measured and trusted is very large; it includes (in addition to the system firmware) the operating system, drivers
Device driver
In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device....

 and application programs. Therefore, numerous other TPM-related projects are in progress, the purpose of which is to make it possible to launch and measure a trusted subenvironment from within an untrusted environment. The TPM specification 1.2 has been enhanced to accommodate this mode of operation. Additionally, hardware changes are required in the CPU and chipset (note that this should not be confused with the inclusion of TPM functionality into the chipset even though this is a possibility too). Intel's approach is called Trusted Execution Technology (TXT). Many of Intel's Core 2 Duo CPUs are advertised to support these extensions. However, chipset support is required for the extensions to be operational. Currently, Intel's chipset Q35 Express supports TXT. In addition to chipset support, the mainboard must also feature a TPM 1.2 chip. Intel currently advertises DQ35MP and DQ35JO as being compliant with the technology. The first application of the technology will be a set of manageability enhancements under the brand name vPro.
AMD's platform is called Secure Execution Mode.

In 2002-2003, Microsoft announced an initiative called Next-Generation Secure Computing Base
Next-Generation Secure Computing Base
The Next-Generation Secure Computing Base , formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial "Trusted Computing" concept on future versions of the Microsoft Windows operating system. NGSCB is part of...

 (formerly Palladium). This was basically a vision of how a TPM 1.2 chip, CPU, chipset and software could provide an environment and a software ecosystem in which trusted applications (launched from within "regular" Windows) could be developed. Intel's TXT and AMD's SEM can be seen as realizations of the hardware side of the NGSCB vision. Owing to significant difficulties in creating a working implementation that third-party developers were interested in using and in unavailability of the enhancements to CPU and chipset, NGSCB was not included with Microsoft Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...

. Instead, Vista ships with a few technologies that can make use of a subset of the functions of the TPM chip (but not of Intel's TXT or AMD's SEM), such as BitLocker Drive Encryption
BitLocker Drive Encryption
BitLocker Drive Encryption is a full disk encryption feature included with the Ultimate and Enterprise editions of Microsoft's Windows Vista and Windows 7 desktop operating systems, as well as the Windows Server 2008 and Windows Server 2008 R2 server platforms. It is designed to protect data by...

, and a new version of the Microsoft Cryptography API
Cryptographic Application Programming Interface
The Cryptographic Application Programming Interface is an application programming interface included with Microsoft Windows operating systems that provides services to enable developers to secure Windows-based applications using cryptography...

.

Criticism

The group has faced widescale opposition from the free software
Free software
Free software, software libre or libre software is software that can be used, studied, and modified without restriction, and which can be copied and redistributed in modified or unmodified form either without restriction, or with restrictions that only ensure that further recipients can also do...

 community on the grounds that the technology they are developing has a negative impact on the users' privacy and can create customer lock-in
Vendor lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services, unable to use another vendor without substantial switching costs...

, especially if it is used to create DRM
Digital rights management
Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...

 applications. It has received criticism from the GNU/Linux
GNU
GNU is a Unix-like computer operating system developed by the GNU project, ultimately aiming to be a "complete Unix-compatible software system"...

 and FreeBSD
FreeBSD
FreeBSD is a free Unix-like operating system descended from AT&T UNIX via BSD UNIX. Although for legal reasons FreeBSD cannot be called “UNIX”, as the direct descendant of BSD UNIX , FreeBSD’s internals and system APIs are UNIX-compliant...

 communities, as well as the software development community in general. Significant backlash amongst the Trusted Computing Group was present during Richard Stallman
Richard Stallman
Richard Matthew Stallman , often shortened to rms,"'Richard Stallman' is just my mundane name; you can call me 'rms'"|last= Stallman|first= Richard|date= N.D.|work=Richard Stallman's homepage...

's speech at the Hackers on Planet Earth conference in July 2006, in New York. Richard Stallman and the Free Software Foundation
Free Software Foundation
The Free Software Foundation is a non-profit corporation founded by Richard Stallman on 4 October 1985 to support the free software movement, a copyleft-based movement which aims to promote the universal freedom to create, distribute and modify computer software...

 have also criticized the group publicly in other speeches. The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable.

Privacy concerns with the TCG revolve around the fact that each TPM has a unique keypair, called the "endorsement key", that identifies the platform. In initial versions of the TPM (version 1.1), the TCG addressed privacy concerns by suggesting the use of a "Privacy CA
Certificate authority
In cryptography, a certificate authority, or certification authority, is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate...

" that could certify pseudonymous
Pseudonymity
Pseudonymity is a word derived from pseudonym, meaning 'false name', and anonymity, meaning unknown or undeclared source, describing a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names...

 machine credentials. By having separate credentials for interacting with different parties, actions could not be linked, and so some level of privacy is provided. However, this requires trust in the Privacy CA, who could still link pseudonyms to the common, identifying machine credential. Since this left unresolved privacy concerns, version 1.2 of the TPM specification introduced "Direct anonymous attestation
Direct anonymous attestation
The Direct Anonymous Attestation is a cryptographic protocol which enables the remote authentication of a trusted platform whilst preserving the user's privacy...

": a protocol based on the idea of a zero-knowledge proof
Zero-knowledge proof
In cryptography, a zero-knowledge proof or zero-knowledge protocol is an interactive method for one party to prove to another that a statement is true, without revealing anything other than the veracity of the statement....

 which allows a TPM user to receive a certification in such a way that the Privacy CA would not be able to link requests to a single user or platform, while still being able to identify rogue TPMs.

Privacy concerns for TPM were heightened when Christopher Tarnovsky presented methods to access and compromise the Infineon TPM non-volatile memory capacity which contains user data at Black Hat
Black hat
A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat, especially in black and white movies....

 2010.

ISO standardization

Efforts to have the TCG specifications standardized by ISO was active for a first part in October 2007. Member states of the ISO/DIS JTC1 were expected to send their opinion to ISO by July 24, 2008. On May 18, 2009, TCG managed to achieve standardization for their TPM specifications:
  • ISO/IEC 11889-1:2009 Information technology—Trusted Platform Module—Part 1: Overview
  • ISO/IEC 11889-2:2009 Information technology—Trusted Platform Module—Part 2: Design principles
  • ISO/IEC 11889-3:2009 Information technology—Trusted Platform Module—Part 3: Structures
  • ISO/IEC 11889-4:2009 Information technology—Trusted Platform Module—Part 4: Commands

Members

As of June 2011, about 110 enterprises are promoters of, contributors to, or adopters of TCG specifications.

Membership fees vary by level. Promoters pay annual membership fees of $55,000, contributors pay $16,500, and depending upon company size, adopters pay annual membership fees of either $1,000 or $8,250.

Promoters

  1. AMD
  2. Fujitsu
    Fujitsu
    is a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. It is the world's third-largest IT services provider measured by revenues....

  3. Hewlett-Packard
    Hewlett-Packard
    Hewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, USA that provides products, technologies, softwares, solutions and services to consumers, small- and medium-sized businesses and large enterprises, including...

  4. IBM
    IBM
    International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...

  5. Infineon
  6. Intel Corporation
    Intel Corporation
    Intel Corporation is an American multinational semiconductor chip maker corporation headquartered in Santa Clara, California, United States and the world's largest semiconductor chip maker, based on revenue. It is the inventor of the x86 series of microprocessors, the processors found in most...

  7. Lenovo Holdings Limited
  8. Microsoft
    Microsoft
    Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...

  9. Wave Systems Corp


Contributors

  1. Absolute Software
  2. American Megatrends, Inc.
    American Megatrends
    American Megatrends Incorporated is an American hardware and software company that specializes in PC hardware and firmware. The company was founded in 1985 by Pat Sarma and S. Shankar, who was chairman and president...

  3. AMOSSYS
  4. Atmel
    Atmel
    Atmel Corporation is a manufacturer of semiconductors, founded in 1984. Its focus is on system-level solutions built around flash microcontrollers...

  5. BAE Systems
    BAE Systems
    BAE Systems plc is a British multinational defence, security and aerospace company headquartered in London, United Kingdom, that has global interests, particularly in North America through its subsidiary BAE Systems Inc. BAE is among the world's largest military contractors; in 2009 it was the...

  6. Bertin Technologies
  7. Broadcom Corporation
  8. Cypress Semiconductor
    Cypress Semiconductor
    Cypress Semiconductor Corporation is a Silicon Valley-based semiconductor design and manufacturing company founded by T. J. Rodgers and others from Advanced Micro Devices. It was formed in 1982 with backing by Sevin Rosen and went public in 1986. The company initially focused on the design and...

  9. Dell, Inc.
  10. Digital Management
  11. Enterasys Networks
    Enterasys Networks
    Formed in March 2000 as a spin-off of Cabletron Systems, Enterasys Networks is a networking company catering almost exclusively to large enterprises...

  12. Ericsson Mobile Platforms AB
    Sony Ericsson
    Sony Ericsson Mobile Communications AB is a joint venture established on October 1, 2001 by the Japanese consumer electronics company Sony Corporation and the Swedish telecommunications company Ericsson to manufacture mobile phones....

  13. Freescale Semiconductor
    Freescale Semiconductor
    Freescale Semiconductor, Inc. is a producer and designer of embedded hardware, with 17 billion semiconductor chips in use around the world. The company focuses on the automotive, consumer, industrial and networking markets with its product portfolio including microprocessors, microcontrollers,...

  14. Fritz Technologies
  15. Fujitsu Xerox
  16. Gemalto NV
    Gemalto
    Gemalto is an international digital security company, providing secure personal devices such as smart cards and tokens in addition to software applications and managed services. The company was formed in June 2006 by the combination of two companies Axalto and Gemplus International...

  17. General Dynamics C4 Systems
    General Dynamics C4 Systems
    General Dynamics C4 Systems is a business unit of General Dynamics. General Dynamics C4 Systems is a leading integrator of secure communication and information systems and technology.-History:...

  18. Hitachi, Ltd.
    Hitachi, Ltd.
    is a Japanese multinational conglomerate headquartered in Marunouchi 1-chome, Chiyoda, Tokyo, Japan. The company is the parent of the Hitachi Group as part of the larger DKB Group companies...

  19. Huawei Technologies Co., Ltd.
    Huawei
    Huawei is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China...

  20. Infoblox
    Infoblox
    Infoblox, Inc. is a privately held developer and provider of enterprise network infrastructure automation software and hardware that provide DNS, DHCP, IPAM, and NCCM network services...

  21. Insight
    Insight
    Insight is the understanding of a specific cause and effect in a specific context. Insight can be used with several related meanings:*a piece of information...

  22. InterDigital Communications, LLC
  23. Juniper Networks, Inc.
  24. LSI Logic
  25. Lumeta
  26. Marvell Semiconductor, Inc.
  27. Micron Technology, Inc.
  28. NetApp
  29. Nokia
    Nokia
    Nokia Corporation is a Finnish multinational communications corporation that is headquartered in Keilaniemi, Espoo, a city neighbouring Finland's capital Helsinki...

  30. Nuvoton technologies
    Nuvoton
    Nuvoton Technology Corporation is a Taiwan-based semiconductor company established in 2008. It spun off from Winbond Electronics Corp. as a wholly owned subsidiary.-Overview:...

  31. NVIDIA
    NVIDIA
    Nvidia is an American global technology company based in Santa Clara, California. Nvidia is best known for its graphics processors . Nvidia and chief rival AMD Graphics Techonologies have dominated the high performance GPU market, pushing other manufacturers to smaller, niche roles...

  32. Oracle
    Oracle Corporation
    Oracle Corporation is an American multinational computer technology corporation that specializes in developing and marketing hardware systems and enterprise software products – particularly database management systems...

  33. Panasonic Corporation
    Panasonic
    Panasonic is an international brand name for Japanese electric products manufacturer Panasonic Corporation, which was formerly known as Matsushita Electric Industrial Co., Ltd...

  34. Phoenix Technologies
    Phoenix Technologies
    Phoenix Technologies Ltd designs, develops and supports core system software for personal computers and other computing devices. Phoenix's products — commonly referred to as BIOS or firmware — support and enable the compatibility, connectivity, security and management of the various components and...

  35. PMC-Sierra
    PMC-Sierra
    PMC-Sierra is a fabless semiconductor company which develops and sells devices into the communications, storage, printing, and embedded computing marketplaces.-Corporate history:...

  36. Qualcomm
    Qualcomm
    Qualcomm is an American global telecommunication corporation that designs, manufactures and markets digital wireless telecommunications products and services based on its code division multiple access technology and other technologies. Headquartered in San Diego, CA, USA...

  37. Renesas Electronics Corporation
  38. Ricoh Company LTD
    Ricoh
    or Ricoh, is a Japanese company that was established in 1936 on February 6th, as , a company in the RIKEN zaibatsu. Its headquarters is located in Ricoh Building in Chūō, Tokyo....

  39. SafeNet
  40. Samsung Electronics
    Samsung Electronics
    Samsung Electronics is a South Korean multinational electronics and information technology company headquartered in Samsung Town, Seoul...

  41. SandForce
    SandForce
    SandForce is an American "fabless" semiconductor company based in Milpitas, California, that designs and manufactures flash memory controllers for solid-state drives . On October 26th 2011 it was acquired by LSI Corporation....

  42. SanDisk Corporation
  43. Seagate Technology
    Seagate Technology
    Seagate Technology is one of the world's largest manufacturers of hard disk drives. Incorporated in 1978 as Shugart Technology, Seagate is currently incorporated in Dublin, Ireland and has its principal executive offices in Scotts Valley, California, United States.-1970s:On November 1, 1979...

  44. Security Innovation, Inc.
  45. SMSC
  46. Sony Corporation
  47. Sophos
    Sophos
    Sophos is a developer and vendor of security software and hardware, including anti-virus, anti-spyware, anti-spam, network access control, encryption software and data loss prevention for desktops, servers, email systems and other network gateways....

  48. STMicroelectronics
    STMicroelectronics
    STMicroelectronics is an Italian-French electronics and semiconductor manufacturer headquartered in Geneva, Switzerland.While STMicroelectronics corporate headquarters and the headquarters for EMEA region are based in Geneva, the holding company, STMicroelectronics N.V. is registered in Amsterdam,...

  49. Symantec
    Symantec
    Symantec Corporation is the largest maker of security software for computers. The company is headquartered in Mountain View, California, and is a Fortune 500 company and a member of the S&P 500 stock market index.-History:...

  50. Texas Intruments
  51. Thales Communications
    Thales Communications
    Thales Communications Inc., a subsidiary of the Thales Group, is a leading manufacturer of tactical communications equipment, including the MBITR and JEM, currently fielded with the US Army and NATO forces worldwide. It is currently involved in the Joint Tactical Radio System program, fielding its...

  52. The Boeing Company
  53. Toshiba Corporation
  54. ULINK
    Ulink
    Wessex Red is the brand for bus services run under contract for the University of the West of England and the University of Bristol in Bristol by Wessex Connect. The services originally began in September 2007 for students and staff of UWE only. However since September 2008 the bus services have...

  55. Western Digital
    Western Digital
    Western Digital Corporation is one of the largest computer hard disk drive manufacturers in the world. It has a long history in the electronics industry as an integrated circuit maker and a storage products company. Western Digital was founded on April 23, 1970 by Alvin B...

  56. WinMagic


Adopters

  1. Access Layers LTD
  2. Aruba Networks
    Aruba Networks
    Aruba Networks, Inc. is a networking vendor selling enterprise wireless LAN and edge access networking equipment. The company has over 500 employees and is headquartered in Sunnyvale, CA...

  3. AUCONET GmbH
  4. Bit9, Inc.
  5. BlueCat Networks
  6. BlueRISC, Inc.
  7. Bradford Networks
  8. Byres Security
  9. Certicom Corp.
  10. Credant Technologies
  11. Cryptomathic Ltd.
  12. CryptoMill Technologies LTD
  13. DECOIT GmbH
  14. F5 Networks
    F5 Networks
    F5 Networks, Inc. is a networking appliances company. It is headquartered in Seattle, Washington and has development and marketing offices worldwide. It originally manufactured and sold some of the very first load balancing products...

  15. ForeScout Technologies
  16. Giesecke & Devrient
    Giesecke & Devrient
    Giesecke & Devrient is a German company headquartered in Munich that provides banknote and securities printing, smart cards, and cash handling systems....

  17. GlobalSign nv-sa
  18. Great Bay Software, Inc
  19. Hagiwara Sys-Com Co., Ltd.
  20. Harris Corporation
    Harris Corporation
    Harris Corporation is a Florida-based international communications equipment company that produces wireless equipment, electronic systems, and both terrestrial and spaceborne antennas for use in the government, defense, and commercial sectors. It is also the largest private-sector employer in...

  21. High Density Devices AS
  22. Hirsch Electronics
  23. Imation
    Imation
    Imation is a US based multi-national technology corporation that designs, manufactures and sells recordable data storage media, consumer electronics products and accessories.The company is a 1996 spin off of 3M and is headquartered in Oakdale, Minnesota...

  24. Insightix, Ltd.
  25. Insyde Software Corp.
  26. mikado soft GmbH
  27. NCP engineering GmbH
  28. nSolutions, Inc.
  29. NXP Semiconductors
  30. Penza Research Electrotechnical Institute (FGUP "PNIEI")
  31. Phison Electronics Corporation
  32. Q1 Labs
  33. Sirrix AG Security Technologies
  34. Softex, Inc.
  35. STEC, Inc.
    STEC, Inc.
    STEC, Inc. is a multinational company and a leader in enterprise solid-state drive .The company is headquartered in Santa Ana, California...

  36. StillSecure
  37. Sypris Electronics
  38. Triumfant Inc.
  39. Tuscany Networks Ltd
  40. Valicore Technologies, Inc.
  41. ViaSat, Inc.
    ViaSat
    ViaSat is a communication company based in Carlsbad, California, that provides equipment and services for military and commercial communications, primarily in satellite related technologies...



See also

  • Trusted Computing
    Trusted Computing
    Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...

  • Trusted Platform Module
    Trusted Platform Module
    In computing, Trusted Platform Module is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security...

  • Trusted Computing Platform Alliance
  • Digital Rights Management
    Digital rights management
    Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...

  • Consumer Broadband and Digital Television Promotion Act
    Consumer Broadband and Digital Television Promotion Act
    The Consumer Broadband and Digital Television Promotion Act was a United States bill proposed in 2002 that would have prohibited any kind of technology that could be used to read digital content without digital rights management —which prohibits copying and reading any content under copyright...


External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK