Energetic and effective industry collaboration is key to developing standards that enable convenient and trusted digital services across market sectors.

Our committees manage the maintenance and evolution of GlobalPlatform standardized technologies and certifications, focusing on specific technology areas:

  • Secure Element (SE)
  • Trusted Execution Environment (TEE)
  • Trusted Platform Services (TPS)

Each committee compromises diverse member companies working in partnership with industry and regulatory bodies from around the world.

These committees are open to full and participating members.

What we do

Secure Element Committee

GlobalPlatform’s SE Committee defines industry and technology neutral specifications for application management on embedded or integrated tamper resistant components, including SE, SIM/UICC, smart microSD and smart cards. It works to develop, maintain and evolve GlobalPlatform’s SE documents and tools, and recommends security evaluation processes and features to ensure that GlobalPlatform technology offers appropriate security in line with market requirements.

Learn more

Trusted Execution Environment Committee

GlobalPlatform’s TEE Committee defines an open security architecture for consumer and connected devices using a TEE to develop and deploy secure services from multiple service providers. It works to manage, prioritize and develop TEE and related documents, including Application Programming Interface (API) specifications that enable the development of Trusted Applications (TAs) that interact with secure peripherals such as the trusted user interface, biometrics and SEs. The committee is also working to extend these efforts to secure MCU technology.

Learn more

Trusted Platform Services Committee

The aim of GlobalPlatform’s TPS Committee is to make it easier for service providers and application developers in different market sectors, to link together the strong security technology offered by secure components in their products. The committee creates open specifications that can be used to utilize secure services offered by standardized secure components within a device, and Chains of Trust to be built from the Root of Trust (RoT) to the cloud service.

Learn more
Hey There!

It seems you are using an outdated browser, unfortunately this means that our website will not render properly for you. Update your browser to view this website correctly.