Content deleted Content added
Zeroandones (talk | contribs) mNo edit summary |
VulcanSphere (talk | contribs) Rescuing 2 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(147 intermediate revisions by 87 users not shown) | |||
Line 1:
{{Short description|American-based computer technology consortium}}
{{Infobox company
| name = Trusted Computing Group
| logo = Trusted Computing Group logo.png
| type = [[Consortium]]
| location_city = [[Beaverton, OR]]<ref>{{Cite web |url=https://trustedcomputinggroup.org/about/ |title=About Trusted Computing Group |access-date=2020-10-29 |archive-date=2020-11-17 |archive-url=https://web.archive.org/web/20201117131744/https://trustedcomputinggroup.org/about/ |url-status=live }}</ref>
| location_country = United States
| foundation = 2003
| founder = [[AMD]], [[Hewlett-Packard]], [[IBM]], [[Intel]], [[Microsoft]]
| homepage = {{URL|https://trustedcomputinggroup.org}}
}}
The '''Trusted Computing Group''' is a group formed in 2003 as the successor to the Trusted Computing Platform Alliance which was previously formed in 1999 to implement [[Trusted Computing]] concepts across personal computers.<ref name="TCGInception">{{cite web
| url=http://www.eetimes.com/document.asp?doc_id=1202119
| title=New group aims to secure PCs, PDAs, cell phones
| author=Rick Merritt
| date=April 8, 2003
| accessdate=2014-11-17
| archive-date=2014-11-29
| archive-url=https://web.archive.org/web/20141129031123/http://www.eetimes.com/document.asp?doc_id=1202119
| url-status=live
}}</ref> Members include [[Intel]], [[AMD]], [[IBM]], [[Microsoft]], and [[Cisco]].
The core idea of trusted computing is to give hardware manufacturers control over what software does and does not run on a system by refusing to run unsigned software.<ref>{{cite web |url=https://www.trustedcomputinggroup.org/faq/TPMFAQ/ |title=Trusted Computing Group: TPM FAQ |website=www.trustedcomputinggroup.org |access-date=17 January 2022 |archive-url=https://web.archive.org/web/20061003155033/https://www.trustedcomputinggroup.org/faq/TPMFAQ/ |archive-date=3 October 2006 |url-status=dead}}</ref>
==
{{pic|File:Logo of the Trusted Computing Group (2004).svg|Logo as of 2004}}
On October 11, 1999, the Trusted Computing Platform Alliance (abbreviated as TCPA), a consortium of various technology companies including Compaq, Hewlett-Packard, IBM, Intel, and Microsoft, was formed in an effort to promote trust and security in the personal computing platform.<ref name="TCPAInception">{{cite web
| url=https://www-03.ibm.com/press/us/en/pressrelease/2016.wss
| archive-url=https://web.archive.org/web/20141129042827/https://www-03.ibm.com/press/us/en/pressrelease/2016.wss
| url-status=dead
| archive-date=November 29, 2014
| title=Compaq, Hewlett Packard, IBM, Intel, and Microsoft Announce Open Alliance to Build Trust and Security into PCs for e-business
| author=IBM News Room
| date=October 11, 1999
| accessdate=2014-11-17}}</ref> In November 1999, the TCPA announced that over 70 leading hardware and software companies joined the alliance in the first month.<ref name="TCPA-FC">{{cite web
|url=http://www.trustedpc.org/press/pdf/TCPA111999REL.pdf
|title=Trusted Computing Platform Alliance Holds Founding Conference
|author=Jeanne Orfinik
|date=November 19, 1999
|accessdate=2014-11-17
|url-status=unfit
|archiveurl=https://web.archive.org/web/20020606142131/http://www.trustedpc.org/press/pdf/TCPA111999REL.pdf |archivedate=June 6, 2002 }}</ref> On January 30, 2001, version 1.0 of the Trusted Computing Platform Specifications was released.<ref name="TCPA-v1.0">{{cite web|url=http://www.trustedcomputing.org/docs/tcpa_final.pdf
|title=Trusted Computing Platform Alliance Announces v.1.0 Specifications for Trusted Computing
|author=Trusted Computing Platform Alliance
|date=January 30, 2001 |accessdate=2014-11-17
|url-status=unfit
|archiveurl=https://web.archive.org/web/20020806140425/http://www.trustedcomputing.org/docs/tcpa_final.pdf
|archivedate=August 6, 2002 }}</ref> IBM was the first [[original equipment manufacturer]] to incorporate hardware features based on the specifications with the introduction of its ThinkPad T30 mobile computer in 2002.<ref name="IBM-TP">{{cite web
| url=http://www.eetimes.com/document.asp?doc_id=1144608
| title=IBM ThinkPad complies with TCPA security spec
| author=Rick Merritt
| date=April 24, 2002
| accessdate=2014-11-17}}</ref>
In 2003, the TCPA was succeeded by the Trusted Computing Group, with an increased emphasis on mobile devices.<ref name="TCGInception"/>
Membership fees vary by level. Promoters pay annual membership fees of $30,000, contributors pay $15,000, and depending upon company size, adopters pay annual membership fees of either $2,500 or $7,500.<ref>{{cite web
|url=https://trustedcomputinggroup.org/membership/
|title=Membership
|publisher=Trusted Computing Group
|date=2020-05-01
|accessdate=2020-05-01}}</ref>
== Overview ==
TCG's most successful effort was the development of a [[Trusted Platform Module]] (TPM), a [[semiconductor intellectual property core]] or [[integrated circuit]] that conforms to the specification to enable [[trusted computing]] features in computers and mobile devices. Related efforts involved [[Trusted Network Connect]], to bring trusted computing to network connections, and [[Storage Core Architecture]] / [[Opal_Storage_Specification|Security Subsystem Class]], to bring trusted computing to disk drives and other storage devices. These efforts have not achieved the same level of widespread adoption as the trusted platform module.
==Criticism==
{{
The group historically faced opposition from the [[free software]] community on the grounds that the technology had a negative impact on the users' privacy and can create customer [[vendor lock-in|lock-in]], especially if it is used to create [[Digital rights management|DRM]] applications. It received criticism from the [[Linux]] and [[FreeBSD]] communities, as well as the software development community in general.
==ISO standardization==
In 2009, ISO/IEC release trusted platform module standards
* ISO/IEC 11889-1:2009 Information technology—Trusted Platform Module—Part 1: Overview
* ISO/IEC 11889-2:2009 Information technology—Trusted Platform Module—Part 2: Design principles
* ISO/IEC 11889-3:2009 Information technology—Trusted Platform Module—Part 3: Structures
* ISO/IEC 11889-4:2009 Information technology—Trusted Platform Module—Part 4: Commands
==References==
{{Reflist|30em}}
==External links==
* {{Official website}}
{{Authority control}}
[[Category:Trusted computing| ]]
[[Category:Computer security organizations]]
[[Category:
[[Category:Companies based in Beaverton, Oregon]]
[[Category:
[[Category:American companies established in 2003]]
[[Category:2003 establishments in Oregon]]
[[Category:Computer companies of the United States]]
[[Category:Computer hardware companies]]
[[Category:Software companies of the United States]]
|