Member Testimonial

"Our membership in TCG not only offers us the opportunity to share solutions for today's security problems, it also gives us the opportunity to understand the demands of the market, including vendors and users. This knowledge has proven very useful in developing products. Furthermore, our product development activities are executed in the context of a motivated, expert peer-reviewed standards development process.  Overall, our visibility in the market has benefited from TCG's many marketing programs."

- David Mattes, Tempered Networks

Learn More

Quick Links

Resources337 Results

icon

GlobalPlatform & TCG Liaison Discussion

Jon Geater, CTO of Trustonic, outlines the joint work that is ongoing between GlobalPlatform and Trusted Computing Group (TCG) and......

January 2015 | Presentations | Add to Briefcase

icon

PC Client Protection Profile for TPM 2.0

This protection profile describes the security requirements for the Trusted Computing Group (TCG) PC Client Specific Trusted......

January 2015 | Specifications | Add to Briefcase

icon

TCG Physical Presence Interface Specification

The Physical Presence Interface utilizes the industry-standard Advanced Configuration and Power Interface (ACPI) to provide a......

December 2014 | Specifications | Add to Briefcase

icon

Server ACPI Specification

The Trusted Computing Group (TCG) has announced the availability of a new version of the TCG ACPI Specification. ...

December 2014 | Specifications | Add to Briefcase

icon

TPM 2.0 Mobile Command Response Buffer Interface Specification

The Trusted Computing Group has published two Trusted Platform Module (TPM) 2.0 Mobile Specifications: ...

December 2014 | Specifications | Add to Briefcase

icon

TPM 2.0 Mobile Reference Architecture Specification

The Trusted Computing Group has published two Trusted Platform Module (TPM) 2.0 Mobile Specifications: ...

December 2014 | Specifications | Add to Briefcase

icon

TNC Endpoint Compliance Profile Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open architecture for network security, including standard......

December 2014 | Specifications | Add to Briefcase

icon

TNC IF-IMV Specification

The Trusted Network Connect Work Group (TNC-WG) has defined an open solution architecture that enables network operators to......

December 2014 | Specifications | Add to Briefcase

icon

TPM Keys for Platform Identity for TPM 1.2

The following TCG Infrastructure Work Group specification has been posted for public review. ...

December 2014 | Specifications | Add to Briefcase

icon

TSS Feature API Specification

The TSS 2.0 Feature API is meant to be a very high level API, aimed at having commands in it that will allow 80% of the......

November 2014 | Specifications | Add to Briefcase

icon

TCG EK Credential Profile for TPM Family 2.0

The purpose of this document is to define the TPM 2.0 Endorsement Key (EK) Credential. This specification describes the content of......

November 2014 | Specifications | Add to Briefcase

icon

TPM Library Specification

TCG has released the TPM 2.0 library specification that provides updates to the previous published TPM main specifications. ...

October 2014 | Specifications | Add to Briefcase

icon

TCG TPM 2.0 Library Profile for Automotive-Thin

The following TCG Embedded Systems Work Group specification has been posted for public review. ...

October 2014 | Specifications | Add to Briefcase

icon

Where Trust Begins

View this infographic on protecting the connected ecosystem. ...

September 2014 | White Papers | Add to Briefcase