User:Tech Dir/Trusted execution environment
![]() | This is not a Wikipedia article: It is an individual user's work-in-progress page, and may be incomplete and/or unreliable. For guidance on developing this draft, see Wikipedia:So you made a userspace draft. Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Trusted Execution Environment (TEE) is a standardized technology developed and promoted by GlobalPlatform . TEE is a separate execution environment that runs in a secure chip alongside the Rich OS and provides security services to that rich environment. The TEE isolates access to its hardware and software security resources from the Rich OS and its applications. The Figure below shows the architecture of the TEE.
Key concepts
At the highest level, a Trusted Execution Environment (TEE) is an environment where the following are true:
- Any code executing inside the TEE is trusted in authenticity and integrity.
- The other assets are also protected in confidentiality.
- The TEE shall resist to all known remote and software attacks, and a set of external hardware attacks.
- Both assets and code are protected from unauthorized tracing and control through debug and test features
Available specification
All specification are available in the GlobalPlatform web site.
TEE and OMTP TR1
Open Mobile Terminal Platform (OMTP] organization has published in 2009 an Advanced trusted environment TR1.
References
Blog on TEE from Ullrich Martini here
Blog from Björn Ekelund here
Christophe Colas's presentation on TEE : here
NFC times article about Trusted User interface and TEE [1]
ARM Trustzone and TEE [2]