Infrastructure

The Infrastructure Work Group works on the adoption and integration of TCG platform specific specifications into Internet and enterprise infrastructure technologies to enable various business models in a mixed environment of open platform architectures. Conventions for representing and exchanging information useful in making trust decisions are being established by leveraging existing Internet and related infrastructure standards. Considerations are made for representing platform roots of trust, trust chaining, key lifecycle services and the relationship these may have to owner policies. The work group aims to define an architectural framework, interfaces and metadata necessary to bridge infrastructure gaps.


Carolin Latze

Consultant; Work Group Co-Chair


Resources

Resource NameResource TypeResource Tag
TCG EK Credential Profile for TPM Family 2.0Specification
TPM Keys for Platform Identity for TPM 1.2Specification
Infrastructure Work Group TCG Credential Profiles SpecificationSpecification
TCG Infrastructure Working Group A CMC Profile for AIK Certificate EnrollmentSpecification
TCG Attestation PTS Protocol: Binding to TNC IF-MSpecification
TCG Architecture Overview, Version 1.4Specification
TCG Core Integrity Schema SpecificationSpecification

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.