Media Room - FAQs

What is the Trusted Computing Group (TCG)?

The Trusted Computing Group was formed in 2003 to develop and support open industry specifications for trusted computing across multiple platform types. To enable open specification development, the group is incorporated, has a patent policy and provides industry advocacy programs, including marketing programs. Information on how to join the TCG can be found at

For more information on the concepts of Trusted Computing, go to

Who is a member of TCG?

TCG has more than 100 members from across computing, including component vendors, software developers, systems vendors, network and infrastructure companies and others. A complete list is online at

How is TCG organized?

TCG is an incorporated organization. The organization has a majority rule structure to facilitate progress. The group provides for marketing programs, democratic organizational management and independent advocacy. Finally, the organization provides a reasonable and non-discriminatory (RAND) patent licensing policy, which typically streamlines adoption of industry standards.

How can companies become involved in TCG?

TCG has several classes of membership. These include contributor membership, which enables full participation in work groups, including development of specifications. Adopter members can participate in some programs, while a new class of membership, the Associate, is targeted to enterprise and integrator/reseller end users who would like to provide some input into the organization’s direction and to its solutions-focused work groups.

Potential members can obtain a TCG Membership Agreement and related documents by completing the online request form here,

What is available from TCG?

Through more than a dozen work groups, TCG has created specifications to enable security and trusted systems enterprise-wide, including for embedded and consumer devices.  These include:

  • The Trusted Platform Module (TPM) and complementary specifications for its use in PCs, servers and other systems.
  • The Trusted Network Connect architecture for network security
  • The Opal and enterprise-class Trusted Storage specifications for self-encrypting drives
  • The Mobile Trusted Module for mobile phones.

TCG also has created work groups to address emerging computing security issues, including those for cloud computing, embedded systems and mobile systems. These work groups will build on existing specifications and provide guidance and best practices for using Trusted Computing.

For specifics on these and other topics, please see the following:

View All FAQs

  • 1-5