Ken is the IBM representative to the Trusted Computing Group (TCG), TPM working group, PC Client working group, and Compliance working group, and editor of the TPM 1.2 and TPM 2.0 specifications. He is also working on applying TCG technology to virtualization and hypervisors. He has a complete Unix and Windows TPM 2.0 implementation available for download under a BSD license as IBM’s Software TPM 2.0. with a companion Unix and Windows TSS 2.0 at IBM’s TPM 2.0 TSS, and a complete software TPM 1.2 implementation available for download under a BSD license as IBM’s Software Trusted Platform Module. Ken also assists all IBM product groups that are implementing TCG technology.
Ken is a coauthor of “A Practical Guide to TPM 2.0 Using the Trusted Platform Module in the New Age of Security”, available as a free download from Apress.
Secure hardware projects include the IBM 4758, 4764, and 4765 secure cryptographic coprocessors, and their application to secure enterprise code signing.
Previous projects include Matchbox and secure federated data mining, two projects that applied a secure cryptographic coprocessor to the problem of sharing databases among parties with limited trust in each other. Echeck and Identrus/Eleanor applied smart card technology to electronic payments.
A 33-year veteran of IBM who moved to OnBoard Security, Lee was an active presence in TCG for 11 years in a variety of roles, chairing some workgroups, providing essential contributions to others, and serving on the Board of Directors. He traveled the world to evangelize TCG’s message and to bridge the work of TCG’s marketing and technical workgroups. He worked tirelessly to develop new technologies based on TCG standards. He was the moving force behind the new TSS specification series and can be credited with the reinvigoration of the VPWG.We are grateful for all Lee did to promote and contribute to TCG over the years. Lee will be sorely missed by his many TCG friends and collaborators.
Dr. Seigo Kotani is the Director of Security Strategy, Professional Services Unit of Fujitsu. Dr. Kotani joined Fujitsu Laboratories Ltd. in 1982 and conducted researchon superconductivity and LSI devices, including cryptographic chips and authored numerous papers.
In 2001, he transitioned to Fujitsu Ltd. and led the research and business development of security devices, systems and services including DRM, TCPA/TCG, biometrics, time-stamps, secure storage and secure network infrastructure.In 2006, the TCG membership elected Dr. Kotani to the position of Director, Contributor Board Member for 2007. At that time, he transitioned to Fujitsu Labs of America, and proceeded to lead many TCG activities to success as a representative of Japan.
In 2008, he secured the position of Director, Promoter Board Member. In 2016, he transitioned again to Fujitsu Ltd. and now he is leading the trusted computing infrastructure and Vehicle/IoT businesses based on TCG technologies
Mr. Seiichi Kawano is a Principal Researcher of Lenovo Research, leading a Team focusing on ”Connected Devices” of “Device Innovation” research area. His team is located at Minatomirai, Yokohama in Japan.
Seiichi joined TCG in 2008 as BoD Alternative from Lenovo while he worked for Security Technology Research & Development for Lenovo ThinkPad & ThinkCentre products, leveraging TPM Chip. He has also joined JRF (Japan Regional Forum) in 2008 and led this community as a co-chair from September 2012 to March 2019. Seiichi’s background is in Software Engineering, majoring in Formal Specification & Operating System, and he has a Master degree of Software Engineering from Waseda University.
He has wide & deep knowledge of PC Architecture, BIOS, Embedded System Firmware and Device Driver through 15 years Engineering works for IBM PC and ThinkPad from 1988. He also has PC Security knowledge & skills, developed as a Researcher in IBM Research and Lenovo Research more than 7 years. Recently his Research focus is not Security Area directly but kept contribution to Lenovo Product security as well as Industry/Japan Security through TCG/JRF activity until now 2019.
Yoni is a David Bowie fan who does crafting as a data archeologist and Electronic Engineer at Western Digital CTO office, where he represents WD at various standard organizations. He joined TCG and the Storage Work Group 10 years ago where he found many friends and colleagues.
Born and raised in Israel until he relocated with my family to the US in the summer of 2018, Yoni graduated from the Israel Institute of Technology (Technion) with B.Sc degree in Electronic Engineering and M.B.A in Business Administration, and holds than 20 years of experience in the high-tech environment, when the last 13 years are in SanDisk/WD.
Yoni loves the outdoors and in his spare time you’ll find him trail running in the surrounding mountains of the bay area.
Jim Hatfield is a senior firmware engineer for Seagate Technology and has been an active leader in storage and security standards development since 2002. He is a founding member of the TCG Storage WG (2004), and is the author and editor of the TCG Storage Interface Interactions Specification. He is an officer or participant in many storage and security standards organizations (INCITS T10 and T13, SATA-IO, NVMe, IEEE (1667, 1619, 1912), Common Criteria (EE). He was part of the team that created the first self-encrypting disc drive (SED). With 40 years of experience in the tape, HDD and SSD storage industries, Jim provides the glue between security solutions and real-world storage interactions. He holds a B.A. in Computer Science and Mathematics.
Ned Smith is a Principal Security Architect in Intel’s Open Technology Center developing trusted edge computing technologies. He co-chairs the IETF Remote Attestation Procedures working group. He developed the Open Connectivity Foundation (OCF) security specification for IoT devices and was a security architect for Intel® vPro™ and related security technologies. He co-chaired the Trusted Computing Group’s (TCG) Infrastructure and Trusted Network Communication (TNC) working groups. He developed the Common Data Security Architecture (CDSA) specification in The Open Group. He holds over 150 US patents. He received Intel’s Top Inventor award in 2016 and was runner up for Intel’s distinguished inventor award in 2018. He is co-author of “Demystifying Internet of Things Security”, APress Publishers, August 2019.
His professional interests include trusted computing for cloud, edge, IoT and blockchain. His non-professional interests including scuba, motorcycles and genealogy.
Hiroshi Isozaki is a Chief Specialist at Toshiba Memory on SSD Product planning group. He received his M.S. in Electrical Computer Engineering from Carnegie Mellon University and Ph.D. in Media and Governance from Keio University. He had been engaged in the field of information security for more than 20 years and has been involved in various security standards bodies as a security researcher and an application engineer.
In the past 3 years, he has been working on TCG-related storage products and has been an active member of TCG Storage Work Group. His contribution to the Work Group includes providing the various technical inputs to TCG Ruby SSC, TCG Configurable Namespace Locking feature set, and TCG Opal Family Test Cases specifications. He is a primary editor of TCG Pyrite SSC v2.00 and Shadow MBR for Multiple Namespaces feature set specifications.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.