Trusted Computing Group
Encyclopedia
The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative started by AMD, Hewlett-Packard
, IBM
, Intel, and Microsoft
to implement Trusted Computing
. Many others followed.
(TPM), a semiconductor intellectual property core
or integrated circuit
that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing
features. TCG-compliant functionality has since been integrated directly into certain mass-market chipset
s.
TCG also recently released the first version of their Trusted Network Connect
("TNC") protocol specification, based on the principles of AAA
, but adding the ability to authorize network clients on the basis of hardware
configuration, BIOS
, kernel version, and which updates that have been applied to the OS
and anti-virus software, etc.
In 2009, TCG released a set of specifications that describe the protocol to communicate with self encrypting disk drives
. The TCG Storage Work Group (SWG) Storage Core Architecture Specification describes in detail how to implement and utilize trust and security services on storage device
s. Security Subsystem Class (SSC) Specifications describe the requirements for specific classes of devices; specifically, the Enterprise SSC defines minimum requirements for Data Center and Server Class devices while the Opal SSC defines minimum requirements for client devices.
The owner of a TPM-enabled system has complete control over what software does and does not run on their system This does include the possibility that a system owner would choose to run a version of an operating system
(OS) that refuses to load unsigned or unlicensed software, but those restrictions would have to be enforced by the operating system and not by the TCG technology. What a TPM does provide in this case is the capability for the OS to lock software to specific machine configurations, meaning that "hacked" versions of the OS designed to get around these restrictions would not work. While there is legitimate concern that OS vendors could use these capabilities to restrict what software would load under their OS (hurting small software companies or open source
/shareware
/freeware
providers, and causing vendor lock-in
for some data formats), no OS vendor has yet suggested that this is planned. Furthermore, since restrictions would be a function of the operating system, TPMs could in no way restrict alternative operating systems from running, including free or open source operating systems. There are several projects which are experimenting with TPM support in free operating systems; examples of such projects include a TPM device driver for Linux, an open source implementation of the TCG's Trusted Software Stack called TrouSerS (recently also ported to Windows Vista
and Windows 7), a Java
interface to TPM capabilities called TPM/J, and a TPM-supporting version of the Grub
bootloader called TrustedGrub.
and application programs. Therefore, numerous other TPM-related projects are in progress, the purpose of which is to make it possible to launch and measure a trusted subenvironment from within an untrusted environment. The TPM specification 1.2 has been enhanced to accommodate this mode of operation. Additionally, hardware changes are required in the CPU and chipset (note that this should not be confused with the inclusion of TPM functionality into the chipset even though this is a possibility too). Intel's approach is called Trusted Execution Technology (TXT). Many of Intel's Core 2 Duo CPUs are advertised to support these extensions. However, chipset support is required for the extensions to be operational. Currently, Intel's chipset Q35 Express supports TXT. In addition to chipset support, the mainboard must also feature a TPM 1.2 chip. Intel currently advertises DQ35MP and DQ35JO as being compliant with the technology. The first application of the technology will be a set of manageability enhancements under the brand name vPro.
AMD's platform is called Secure Execution Mode.
In 2002-2003, Microsoft announced an initiative called Next-Generation Secure Computing Base
(formerly Palladium). This was basically a vision of how a TPM 1.2 chip, CPU, chipset and software could provide an environment and a software ecosystem in which trusted applications (launched from within "regular" Windows) could be developed. Intel's TXT and AMD's SEM can be seen as realizations of the hardware side of the NGSCB vision. Owing to significant difficulties in creating a working implementation that third-party developers were interested in using and in unavailability of the enhancements to CPU and chipset, NGSCB was not included with Microsoft Windows Vista
. Instead, Vista ships with a few technologies that can make use of a subset of the functions of the TPM chip (but not of Intel's TXT or AMD's SEM), such as BitLocker Drive Encryption
, and a new version of the Microsoft Cryptography API
.
community on the grounds that the technology they are developing has a negative impact on the users' privacy and can create customer lock-in
, especially if it is used to create DRM
applications. It has received criticism from the GNU/Linux
and FreeBSD
communities, as well as the software development community in general. Significant backlash amongst the Trusted Computing Group was present during Richard Stallman
's speech at the Hackers on Planet Earth conference in July 2006, in New York. Richard Stallman and the Free Software Foundation
have also criticized the group publicly in other speeches. The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable.
Privacy concerns with the TCG revolve around the fact that each TPM has a unique keypair, called the "endorsement key", that identifies the platform. In initial versions of the TPM (version 1.1), the TCG addressed privacy concerns by suggesting the use of a "Privacy CA
" that could certify pseudonymous
machine credentials. By having separate credentials for interacting with different parties, actions could not be linked, and so some level of privacy is provided. However, this requires trust in the Privacy CA, who could still link pseudonyms to the common, identifying machine credential. Since this left unresolved privacy concerns, version 1.2 of the TPM specification introduced "Direct anonymous attestation
": a protocol based on the idea of a zero-knowledge proof
which allows a TPM user to receive a certification in such a way that the Privacy CA would not be able to link requests to a single user or platform, while still being able to identify rogue TPMs.
Privacy concerns for TPM were heightened when Christopher Tarnovsky presented methods to access and compromise the Infineon TPM non-volatile memory capacity which contains user data at Black Hat
2010.
Membership fees vary by level. Promoters pay annual membership fees of $55,000, contributors pay $16,500, and depending upon company size, adopters pay annual membership fees of either $1,000 or $8,250.
Hewlett-Packard
Hewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, USA that provides products, technologies, softwares, solutions and services to consumers, small- and medium-sized businesses and large enterprises, including...
, IBM
IBM
International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...
, Intel, and Microsoft
Microsoft
Microsoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...
to implement Trusted Computing
Trusted Computing
Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...
. Many others followed.
Overview
TCG's original goal was the development of a Trusted Platform ModuleTrusted Platform Module
In computing, Trusted Platform Module is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security...
(TPM), a semiconductor intellectual property core
Semiconductor intellectual property core
In electronic design a semiconductor intellectual property core, IP core, or IP block is a reusable unit of logic, cell, or chip layout design that is the intellectual property of one party. IP cores may be licensed to another party or can be owned and used by a single party alone...
or integrated circuit
Integrated circuit
An integrated circuit or monolithic integrated circuit is an electronic circuit manufactured by the patterned diffusion of trace elements into the surface of a thin substrate of semiconductor material...
that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing
Trusted Computing
Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...
features. TCG-compliant functionality has since been integrated directly into certain mass-market chipset
Chipset
A chipset, PC chipset, or chip set refers to a group of integrated circuits, or chips, that are designed to work together. They are usually marketed as a single product.- Computers :...
s.
TCG also recently released the first version of their Trusted Network Connect
Trusted Network Connect
Trusted Network Connect or TNC is an open architecture for Network Access Control, promulgated by the Trusted Network Connect Work Group of the Trusted Computing Group . -History:...
("TNC") protocol specification, based on the principles of AAA
AAA protocol
In computer security, AAA commonly stands for authentication, authorization and accounting.- Authentication :Authentication refers to the process where an entity's identity is authenticated, typically by providing evidence that it holds a specific digital identity such as an identifier and the...
, but adding the ability to authorize network clients on the basis of hardware
Computer hardware
Personal computer hardware are component devices which are typically installed into or peripheral to a computer case to create a personal computer upon which system software is installed including a firmware interface such as a BIOS and an operating system which supports application software that...
configuration, BIOS
BIOS
In IBM PC compatible computers, the basic input/output system , also known as the System BIOS or ROM BIOS , is a de facto standard defining a firmware interface....
, kernel version, and which updates that have been applied to the OS
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
and anti-virus software, etc.
In 2009, TCG released a set of specifications that describe the protocol to communicate with self encrypting disk drives
Hardware-based full disk encryption
Hardware-based full disk encryption is available from many hard disk drive vendors, including: Seagate Technology, Hitachi, Western Digital, Samsung, Toshiba and also solid-state drive vendors such as Samsung...
. The TCG Storage Work Group (SWG) Storage Core Architecture Specification describes in detail how to implement and utilize trust and security services on storage device
Storage device
Storage device may refer to:*Box, or any of a variety of containers or receptacles*Data storage device, a device for recording information, which could range from handwriting to video or acoustic recording, or to electromagnetic energy modulating magnetic tape and optical discs* Object storage...
s. Security Subsystem Class (SSC) Specifications describe the requirements for specific classes of devices; specifically, the Enterprise SSC defines minimum requirements for Data Center and Server Class devices while the Opal SSC defines minimum requirements for client devices.
The owner of a TPM-enabled system has complete control over what software does and does not run on their system This does include the possibility that a system owner would choose to run a version of an operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
(OS) that refuses to load unsigned or unlicensed software, but those restrictions would have to be enforced by the operating system and not by the TCG technology. What a TPM does provide in this case is the capability for the OS to lock software to specific machine configurations, meaning that "hacked" versions of the OS designed to get around these restrictions would not work. While there is legitimate concern that OS vendors could use these capabilities to restrict what software would load under their OS (hurting small software companies or open source
Open source
The term open source describes practices in production and development that promote access to the end product's source materials. Some consider open source a philosophy, others consider it a pragmatic methodology...
/shareware
Shareware
The term shareware is a proprietary software that is provided to users without payment on a trial basis and is often limited by any combination of functionality, availability, or convenience. Shareware is often offered as a download from an Internet website or as a compact disc included with a...
/freeware
Freeware
Freeware is computer software that is available for use at no cost or for an optional fee, but usually with one or more restricted usage rights. Freeware is in contrast to commercial software, which is typically sold for profit, but might be distributed for a business or commercial purpose in the...
providers, and causing vendor lock-in
Vendor lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services, unable to use another vendor without substantial switching costs...
for some data formats), no OS vendor has yet suggested that this is planned. Furthermore, since restrictions would be a function of the operating system, TPMs could in no way restrict alternative operating systems from running, including free or open source operating systems. There are several projects which are experimenting with TPM support in free operating systems; examples of such projects include a TPM device driver for Linux, an open source implementation of the TCG's Trusted Software Stack called TrouSerS (recently also ported to Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...
and Windows 7), a Java
Java (programming language)
Java is a programming language originally developed by James Gosling at Sun Microsystems and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object model and fewer low-level facilities...
interface to TPM capabilities called TPM/J, and a TPM-supporting version of the Grub
GNU GRUB
GNU GRUB is a boot loader package from the GNU Project. GRUB is the reference implementation of the Multiboot Specification, which provides a user the choice to boot one of multiple operating systems installed on a computer or select a specific kernel configuration available on a particular...
bootloader called TrustedGrub.
Related projects
The TPM 1.1 specification envisioned a standard PC platform equipped with a TPM chip. In this scenario, the TPM chip can serve as a hardware key storage. Additionally, it can keep track of so-called measurements of the platform (i.e. hashes of various software) and be able to produce signed statements about the running software chain. Particularly the latter mode of operation proved unfeasible in practice, since the amount of software that has to be measured and trusted is very large; it includes (in addition to the system firmware) the operating system, driversDevice driver
In computing, a device driver or software driver is a computer program allowing higher-level computer programs to interact with a hardware device....
and application programs. Therefore, numerous other TPM-related projects are in progress, the purpose of which is to make it possible to launch and measure a trusted subenvironment from within an untrusted environment. The TPM specification 1.2 has been enhanced to accommodate this mode of operation. Additionally, hardware changes are required in the CPU and chipset (note that this should not be confused with the inclusion of TPM functionality into the chipset even though this is a possibility too). Intel's approach is called Trusted Execution Technology (TXT). Many of Intel's Core 2 Duo CPUs are advertised to support these extensions. However, chipset support is required for the extensions to be operational. Currently, Intel's chipset Q35 Express supports TXT. In addition to chipset support, the mainboard must also feature a TPM 1.2 chip. Intel currently advertises DQ35MP and DQ35JO as being compliant with the technology. The first application of the technology will be a set of manageability enhancements under the brand name vPro.
AMD's platform is called Secure Execution Mode.
In 2002-2003, Microsoft announced an initiative called Next-Generation Secure Computing Base
Next-Generation Secure Computing Base
The Next-Generation Secure Computing Base , formerly known as Palladium, is a software architecture designed by Microsoft which is expected to implement parts of the controversial "Trusted Computing" concept on future versions of the Microsoft Windows operating system. NGSCB is part of...
(formerly Palladium). This was basically a vision of how a TPM 1.2 chip, CPU, chipset and software could provide an environment and a software ecosystem in which trusted applications (launched from within "regular" Windows) could be developed. Intel's TXT and AMD's SEM can be seen as realizations of the hardware side of the NGSCB vision. Owing to significant difficulties in creating a working implementation that third-party developers were interested in using and in unavailability of the enhancements to CPU and chipset, NGSCB was not included with Microsoft Windows Vista
Windows Vista
Windows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...
. Instead, Vista ships with a few technologies that can make use of a subset of the functions of the TPM chip (but not of Intel's TXT or AMD's SEM), such as BitLocker Drive Encryption
BitLocker Drive Encryption
BitLocker Drive Encryption is a full disk encryption feature included with the Ultimate and Enterprise editions of Microsoft's Windows Vista and Windows 7 desktop operating systems, as well as the Windows Server 2008 and Windows Server 2008 R2 server platforms. It is designed to protect data by...
, and a new version of the Microsoft Cryptography API
Cryptographic Application Programming Interface
The Cryptographic Application Programming Interface is an application programming interface included with Microsoft Windows operating systems that provides services to enable developers to secure Windows-based applications using cryptography...
.
Criticism
The group has faced widescale opposition from the free softwareFree software
Free software, software libre or libre software is software that can be used, studied, and modified without restriction, and which can be copied and redistributed in modified or unmodified form either without restriction, or with restrictions that only ensure that further recipients can also do...
community on the grounds that the technology they are developing has a negative impact on the users' privacy and can create customer lock-in
Vendor lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services, unable to use another vendor without substantial switching costs...
, especially if it is used to create DRM
Digital rights management
Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...
applications. It has received criticism from the GNU/Linux
GNU
GNU is a Unix-like computer operating system developed by the GNU project, ultimately aiming to be a "complete Unix-compatible software system"...
and FreeBSD
FreeBSD
FreeBSD is a free Unix-like operating system descended from AT&T UNIX via BSD UNIX. Although for legal reasons FreeBSD cannot be called “UNIX”, as the direct descendant of BSD UNIX , FreeBSD’s internals and system APIs are UNIX-compliant...
communities, as well as the software development community in general. Significant backlash amongst the Trusted Computing Group was present during Richard Stallman
Richard Stallman
Richard Matthew Stallman , often shortened to rms,"'Richard Stallman' is just my mundane name; you can call me 'rms'"|last= Stallman|first= Richard|date= N.D.|work=Richard Stallman's homepage...
's speech at the Hackers on Planet Earth conference in July 2006, in New York. Richard Stallman and the Free Software Foundation
Free Software Foundation
The Free Software Foundation is a non-profit corporation founded by Richard Stallman on 4 October 1985 to support the free software movement, a copyleft-based movement which aims to promote the universal freedom to create, distribute and modify computer software...
have also criticized the group publicly in other speeches. The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable.
Privacy concerns with the TCG revolve around the fact that each TPM has a unique keypair, called the "endorsement key", that identifies the platform. In initial versions of the TPM (version 1.1), the TCG addressed privacy concerns by suggesting the use of a "Privacy CA
Certificate authority
In cryptography, a certificate authority, or certification authority, is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate...
" that could certify pseudonymous
Pseudonymity
Pseudonymity is a word derived from pseudonym, meaning 'false name', and anonymity, meaning unknown or undeclared source, describing a state of disguised identity. The pseudonym identifies a holder, that is, one or more human beings who possess but do not disclose their true names...
machine credentials. By having separate credentials for interacting with different parties, actions could not be linked, and so some level of privacy is provided. However, this requires trust in the Privacy CA, who could still link pseudonyms to the common, identifying machine credential. Since this left unresolved privacy concerns, version 1.2 of the TPM specification introduced "Direct anonymous attestation
Direct anonymous attestation
The Direct Anonymous Attestation is a cryptographic protocol which enables the remote authentication of a trusted platform whilst preserving the user's privacy...
": a protocol based on the idea of a zero-knowledge proof
Zero-knowledge proof
In cryptography, a zero-knowledge proof or zero-knowledge protocol is an interactive method for one party to prove to another that a statement is true, without revealing anything other than the veracity of the statement....
which allows a TPM user to receive a certification in such a way that the Privacy CA would not be able to link requests to a single user or platform, while still being able to identify rogue TPMs.
Privacy concerns for TPM were heightened when Christopher Tarnovsky presented methods to access and compromise the Infineon TPM non-volatile memory capacity which contains user data at Black Hat
Black hat
A black hat is the villain or bad guy, especially in a western movie in which such a character would stereotypically wear a black hat in contrast to the hero's white hat, especially in black and white movies....
2010.
ISO standardization
Efforts to have the TCG specifications standardized by ISO was active for a first part in October 2007. Member states of the ISO/DIS JTC1 were expected to send their opinion to ISO by July 24, 2008. On May 18, 2009, TCG managed to achieve standardization for their TPM specifications:- ISO/IEC 11889-1:2009 Information technology—Trusted Platform Module—Part 1: Overview
- ISO/IEC 11889-2:2009 Information technology—Trusted Platform Module—Part 2: Design principles
- ISO/IEC 11889-3:2009 Information technology—Trusted Platform Module—Part 3: Structures
- ISO/IEC 11889-4:2009 Information technology—Trusted Platform Module—Part 4: Commands
Members
As of June 2011, about 110 enterprises are promoters of, contributors to, or adopters of TCG specifications.Membership fees vary by level. Promoters pay annual membership fees of $55,000, contributors pay $16,500, and depending upon company size, adopters pay annual membership fees of either $1,000 or $8,250.
Promoters
- AMD
- FujitsuFujitsuis a Japanese multinational information technology equipment and services company headquartered in Tokyo, Japan. It is the world's third-largest IT services provider measured by revenues....
- Hewlett-PackardHewlett-PackardHewlett-Packard Company or HP is an American multinational information technology corporation headquartered in Palo Alto, California, USA that provides products, technologies, softwares, solutions and services to consumers, small- and medium-sized businesses and large enterprises, including...
- IBMIBMInternational Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...
- Infineon
- Intel CorporationIntel CorporationIntel Corporation is an American multinational semiconductor chip maker corporation headquartered in Santa Clara, California, United States and the world's largest semiconductor chip maker, based on revenue. It is the inventor of the x86 series of microprocessors, the processors found in most...
- Lenovo Holdings Limited
- MicrosoftMicrosoftMicrosoft Corporation is an American public multinational corporation headquartered in Redmond, Washington, USA that develops, manufactures, licenses, and supports a wide range of products and services predominantly related to computing through its various product divisions...
- Wave Systems Corp
Contributors
- Absolute Software
- American Megatrends, Inc.American MegatrendsAmerican Megatrends Incorporated is an American hardware and software company that specializes in PC hardware and firmware. The company was founded in 1985 by Pat Sarma and S. Shankar, who was chairman and president...
- AMOSSYS
- AtmelAtmelAtmel Corporation is a manufacturer of semiconductors, founded in 1984. Its focus is on system-level solutions built around flash microcontrollers...
- BAE SystemsBAE SystemsBAE Systems plc is a British multinational defence, security and aerospace company headquartered in London, United Kingdom, that has global interests, particularly in North America through its subsidiary BAE Systems Inc. BAE is among the world's largest military contractors; in 2009 it was the...
- Bertin Technologies
- Broadcom Corporation
- Cypress SemiconductorCypress SemiconductorCypress Semiconductor Corporation is a Silicon Valley-based semiconductor design and manufacturing company founded by T. J. Rodgers and others from Advanced Micro Devices. It was formed in 1982 with backing by Sevin Rosen and went public in 1986. The company initially focused on the design and...
- Dell, Inc.
- Digital Management
- Enterasys NetworksEnterasys NetworksFormed in March 2000 as a spin-off of Cabletron Systems, Enterasys Networks is a networking company catering almost exclusively to large enterprises...
- Ericsson Mobile Platforms ABSony EricssonSony Ericsson Mobile Communications AB is a joint venture established on October 1, 2001 by the Japanese consumer electronics company Sony Corporation and the Swedish telecommunications company Ericsson to manufacture mobile phones....
- Freescale SemiconductorFreescale SemiconductorFreescale Semiconductor, Inc. is a producer and designer of embedded hardware, with 17 billion semiconductor chips in use around the world. The company focuses on the automotive, consumer, industrial and networking markets with its product portfolio including microprocessors, microcontrollers,...
- Fritz Technologies
- Fujitsu Xerox
- Gemalto NVGemaltoGemalto is an international digital security company, providing secure personal devices such as smart cards and tokens in addition to software applications and managed services. The company was formed in June 2006 by the combination of two companies Axalto and Gemplus International...
- General Dynamics C4 SystemsGeneral Dynamics C4 SystemsGeneral Dynamics C4 Systems is a business unit of General Dynamics. General Dynamics C4 Systems is a leading integrator of secure communication and information systems and technology.-History:...
- Hitachi, Ltd.Hitachi, Ltd.is a Japanese multinational conglomerate headquartered in Marunouchi 1-chome, Chiyoda, Tokyo, Japan. The company is the parent of the Hitachi Group as part of the larger DKB Group companies...
- Huawei Technologies Co., Ltd.HuaweiHuawei is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China...
- InfobloxInfobloxInfoblox, Inc. is a privately held developer and provider of enterprise network infrastructure automation software and hardware that provide DNS, DHCP, IPAM, and NCCM network services...
- InsightInsightInsight is the understanding of a specific cause and effect in a specific context. Insight can be used with several related meanings:*a piece of information...
- InterDigital Communications, LLC
- Juniper Networks, Inc.
- LSI Logic
- Lumeta
- Marvell Semiconductor, Inc.
- Micron Technology, Inc.
- NetApp
- NokiaNokiaNokia Corporation is a Finnish multinational communications corporation that is headquartered in Keilaniemi, Espoo, a city neighbouring Finland's capital Helsinki...
- Nuvoton technologiesNuvotonNuvoton Technology Corporation is a Taiwan-based semiconductor company established in 2008. It spun off from Winbond Electronics Corp. as a wholly owned subsidiary.-Overview:...
- NVIDIANVIDIANvidia is an American global technology company based in Santa Clara, California. Nvidia is best known for its graphics processors . Nvidia and chief rival AMD Graphics Techonologies have dominated the high performance GPU market, pushing other manufacturers to smaller, niche roles...
- OracleOracle CorporationOracle Corporation is an American multinational computer technology corporation that specializes in developing and marketing hardware systems and enterprise software products – particularly database management systems...
- Panasonic CorporationPanasonicPanasonic is an international brand name for Japanese electric products manufacturer Panasonic Corporation, which was formerly known as Matsushita Electric Industrial Co., Ltd...
- Phoenix TechnologiesPhoenix TechnologiesPhoenix Technologies Ltd designs, develops and supports core system software for personal computers and other computing devices. Phoenix's products — commonly referred to as BIOS or firmware — support and enable the compatibility, connectivity, security and management of the various components and...
- PMC-SierraPMC-SierraPMC-Sierra is a fabless semiconductor company which develops and sells devices into the communications, storage, printing, and embedded computing marketplaces.-Corporate history:...
- QualcommQualcommQualcomm is an American global telecommunication corporation that designs, manufactures and markets digital wireless telecommunications products and services based on its code division multiple access technology and other technologies. Headquartered in San Diego, CA, USA...
- Renesas Electronics Corporation
- Ricoh Company LTDRicohor Ricoh, is a Japanese company that was established in 1936 on February 6th, as , a company in the RIKEN zaibatsu. Its headquarters is located in Ricoh Building in Chūō, Tokyo....
- SafeNet
- Samsung ElectronicsSamsung ElectronicsSamsung Electronics is a South Korean multinational electronics and information technology company headquartered in Samsung Town, Seoul...
- SandForceSandForceSandForce is an American "fabless" semiconductor company based in Milpitas, California, that designs and manufactures flash memory controllers for solid-state drives . On October 26th 2011 it was acquired by LSI Corporation....
- SanDisk Corporation
- Seagate TechnologySeagate TechnologySeagate Technology is one of the world's largest manufacturers of hard disk drives. Incorporated in 1978 as Shugart Technology, Seagate is currently incorporated in Dublin, Ireland and has its principal executive offices in Scotts Valley, California, United States.-1970s:On November 1, 1979...
- Security Innovation, Inc.
- SMSC
- Sony Corporation
- SophosSophosSophos is a developer and vendor of security software and hardware, including anti-virus, anti-spyware, anti-spam, network access control, encryption software and data loss prevention for desktops, servers, email systems and other network gateways....
- STMicroelectronicsSTMicroelectronicsSTMicroelectronics is an Italian-French electronics and semiconductor manufacturer headquartered in Geneva, Switzerland.While STMicroelectronics corporate headquarters and the headquarters for EMEA region are based in Geneva, the holding company, STMicroelectronics N.V. is registered in Amsterdam,...
- SymantecSymantecSymantec Corporation is the largest maker of security software for computers. The company is headquartered in Mountain View, California, and is a Fortune 500 company and a member of the S&P 500 stock market index.-History:...
- Texas Intruments
- Thales CommunicationsThales CommunicationsThales Communications Inc., a subsidiary of the Thales Group, is a leading manufacturer of tactical communications equipment, including the MBITR and JEM, currently fielded with the US Army and NATO forces worldwide. It is currently involved in the Joint Tactical Radio System program, fielding its...
- The Boeing Company
- Toshiba Corporation
- ULINKUlinkWessex Red is the brand for bus services run under contract for the University of the West of England and the University of Bristol in Bristol by Wessex Connect. The services originally began in September 2007 for students and staff of UWE only. However since September 2008 the bus services have...
- Western DigitalWestern DigitalWestern Digital Corporation is one of the largest computer hard disk drive manufacturers in the world. It has a long history in the electronics industry as an integrated circuit maker and a storage products company. Western Digital was founded on April 23, 1970 by Alvin B...
- WinMagic
Adopters
- Access Layers LTD
- Aruba NetworksAruba NetworksAruba Networks, Inc. is a networking vendor selling enterprise wireless LAN and edge access networking equipment. The company has over 500 employees and is headquartered in Sunnyvale, CA...
- AUCONET GmbH
- Bit9, Inc.
- BlueCat Networks
- BlueRISC, Inc.
- Bradford Networks
- Byres Security
- Certicom Corp.
- Credant Technologies
- Cryptomathic Ltd.
- CryptoMill Technologies LTD
- DECOIT GmbH
- F5 NetworksF5 NetworksF5 Networks, Inc. is a networking appliances company. It is headquartered in Seattle, Washington and has development and marketing offices worldwide. It originally manufactured and sold some of the very first load balancing products...
- ForeScout Technologies
- Giesecke & DevrientGiesecke & DevrientGiesecke & Devrient is a German company headquartered in Munich that provides banknote and securities printing, smart cards, and cash handling systems....
- GlobalSign nv-sa
- Great Bay Software, Inc
- Hagiwara Sys-Com Co., Ltd.
- Harris CorporationHarris CorporationHarris Corporation is a Florida-based international communications equipment company that produces wireless equipment, electronic systems, and both terrestrial and spaceborne antennas for use in the government, defense, and commercial sectors. It is also the largest private-sector employer in...
- High Density Devices AS
- Hirsch Electronics
- ImationImationImation is a US based multi-national technology corporation that designs, manufactures and sells recordable data storage media, consumer electronics products and accessories.The company is a 1996 spin off of 3M and is headquartered in Oakdale, Minnesota...
- Insightix, Ltd.
- Insyde Software Corp.
- mikado soft GmbH
- NCP engineering GmbH
- nSolutions, Inc.
- NXP Semiconductors
- Penza Research Electrotechnical Institute (FGUP "PNIEI")
- Phison Electronics Corporation
- Q1 Labs
- Sirrix AG Security Technologies
- Softex, Inc.
- STEC, Inc.STEC, Inc.STEC, Inc. is a multinational company and a leader in enterprise solid-state drive .The company is headquartered in Santa Ana, California...
- StillSecure
- Sypris Electronics
- Triumfant Inc.
- Tuscany Networks Ltd
- Valicore Technologies, Inc.
- ViaSat, Inc.ViaSatViaSat is a communication company based in Carlsbad, California, that provides equipment and services for military and commercial communications, primarily in satellite related technologies...
See also
- Trusted ComputingTrusted ComputingTrusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...
- Trusted Platform ModuleTrusted Platform ModuleIn computing, Trusted Platform Module is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that specification, often called the "TPM chip" or "TPM Security...
- Trusted Computing Platform Alliance
- Digital Rights ManagementDigital rights managementDigital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...
- Consumer Broadband and Digital Television Promotion ActConsumer Broadband and Digital Television Promotion ActThe Consumer Broadband and Digital Television Promotion Act was a United States bill proposed in 2002 that would have prohibited any kind of technology that could be used to read digital content without digital rights management —which prohibits copying and reading any content under copyright...