The purpose of the Server Working Group provides definitions, specifications, guidelines, and technical requirements as they pertain to the implementation of TCG technology in servers. The work group endeavors to produce material that allows compatibility with currently specified API’s and further enables current TCG infrastructures.

Servers are a fundamental element of the internet architecture, including public and private deployments, clouds, and data centers. Servers are central components of architectures and instantiations across the spectrum of uses, for example data processing, web serving, smart device applications, telecommunications, and the Internet of Things. As such, servers are a central component of the TCG Architecture and Trusted Computing ecosystem.

Carey Huscroft

Cybersecurity and Advanced Technology Strategist, Hewlett-Packard Enterprise; Work Group Chair

Carey Huscroft develops strategy in cybersecurity and advanced technology in Hewlett-Packard Enterprise (HPE). Carey is a lead architect on the Hewlett Packard Labs The Machine project. Carey is also active in security research and in developing technology roadmaps.


Resource Name
TCG Physical Presence Interface Specification
TCG ACPI Specification
TCG EFI Protocol Specification
TCG Architecture Overview, Version 1.4


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.