As the use of Trusted Computing expands beyond PCs and other conventional information systems to embedded systems of all sorts, the Embedded Systems Work Group provides the expert guidance needed. Early successes include digital copiers and printers, kiosks, gaming systems, and industrial systems. More recent application domains include automotive, network equipment, and IoT.
Embedded systems vary widely but they all need good security. Therefore, each embedded systems domain (automotive, hard copy, etc.) must be analyzed to determine which Trusted Computing technologies apply. The Embedded Systems Work Group forms a Sub Group including domain experts (e.g., printer experts) to identify threats, appropriate countermeasures, and special challenges. Domain-specific guidance is published and special challenges are addressed.
Steve Hanna is a Senior Principal at Infineon Technologies. He is co-chair of the Embedded Systems Work Group in the Trusted Computing Group (TCG) and a member of the Security Area Directorate in the Internet Engineering Task Force. Hanna also serves as the liaison from the TCG to the Industrial Internet Consortium. He is the author of several IETF and TCG standards and published papers, an inventor or co-inventor on 43 issued U.S. patents, and a regular speaker at industry events. He holds a Bachelor’s degree in Computer Science from Harvard University.
Dr. Seigo Kotani is the Principal Expert for the Mobility IoT Division at Fujitsu Limited. Dr. Kotani joined Fujitsu Laboratories Ltd. in 1982 and conducted research on superconductivity and LSI devices, including cryptographic chips and authored numerous papers. In 2001, he transitioned to Fujitsu Ltd. and led the research and business development of security devices, systems and services including DRM, TCPA/TCG, biometrics, time-stamps, secure storage and secure network infrastructure. Read more…
|TCG TPM 2.0 Library Profile for Automotive-Thin|
|TCG Guidance for Securing Network Equipment|
|Establishing Network Equipment Security|
|Secure Embedded Platforms with Trusted Computing: Automotive and Other Systems in the Internet of Things Must Be Protected|
|TCG Guidance for Securing Resource- Constrained Devices|
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.