原文出自:http://www.arm.com/zh/products/processors/technologies/trustzone/index.php

TrustZone

ARM TrustZone® technology is a system-wide approach to security for a wide array of client and server computing platforms, including handsets, tablets, wearable devices and enterprise systems. Applications enabled by the technology are extremely varied but include payment protection technology, digital rights management, BYOD, and a host of secured enterprise solutions.

TrustZone technology is tightly integrated tightly into Cortex™-A processors but the secure state is also extended throughout the system via the AMBA® AXI™ bus and specific TrustZone System IP blocks. This system approach means that it is possible to secure peripherals such as secure memory, crypto blocks, keyboard and screen to ensure they can be protected from software attack.

Devices developed with TrustZone technology, according to the recommendations of the Trusted Base System Architecture specification, enables the delivery of platforms capable of supporting a full Trusted Execution Environment (TEE) and security aware applications and secure services, or Trusted Applications (TA). A Trusted Execution Environment is a small secure kernel, and normally developed with standard APIs, developed to the TEE specification evolved by the Global Platform industry forum .

TrustZone enables the development of separate Rich Operating System and Trusted Execution Environments by creating additional operating modes to the Normal domain, known as the Secure domain and the Monitor mode. The Secure domain has the same capabilities to the normal domain while operating in a separate memory space. The Secure Monitor acts as a virtual gatekeeper controlling migration between the domains.

Read more information on the use and development of TEEs and Secure Monitor Code.

  • 为什么选择 TrustZone?
  • 硬件架构
  • 软件架构
  • 系统架构
  • 系统组件
Mobile devices have evolved into open software platforms capable of downloading a huge variety of applications from the internet. These applications are validated by the device OEM to ensure quality, however malicious code is increasingly being created to target this class of devices.

In parallel, the demand for mobile devices to handle high-value services is gaining significant momentum. New business models are emerging, from the capability to pay for, download and view the latest Hollywood blockbuster for a specific period, or the ability to pay bills and manage bank accounts remotely from a handset.

These trends have already made mobile devices the next frontier for software attack vectors such as malware, trojans and rootkits. However, through the application of advanced security technology based on ARM TrustZone technology and integrating SecurCore™ tamper resistant elements it is possible to develop devices that can offer both a feature-rich open operating environment and robust security solutions.

Application Examples

  • Secured PIN entry for enhanced user authentication in mobile payments & banking
  • Protection against trojans, phishing and APT (Advanced Persistent Threats)
  • Enable deployment and consumption of high-value media (DRM)
  • BYOD (Bring your own device) device persons and application separation
  • Software license management
  • Loyalty-based applications
  • Access control of cloud-based documents
  • e-Ticketing Mobile TV

ARM processors supporting TrustZone include:

  • ARM Cortex-A57
  • ARM Cortex-A53
  • ARM Cortex-A15
  • ARM Cortex-A12
  • ARM Cortex-A9
  • ARM Cortex-A8
  • ARM Cortex-A7
  • ARM Cortex-A5
  • ARM1176

ARM TrustZone技术简介相关推荐

  1. ARM系列之ARM Trustzone 技术浅析(二)——— ARMv7-A Processor modes registers 的安全扩展

    ARM系列之ARM Trustzone 技术浅析(二) Processor modes Registers ARM 引入 Trustzone 技术,最重要的改动就是 CPU 架构的调整.ARM tru ...

  2. TrustZone技术简介

    TrustZone技术,该技术是ARM 公司提出的一种硬件级的安全运行解决方案.TrustZone将系统分为了TEE和REE两个区域,REE中运行着我们熟悉的Android系统,而 TEE有独立的运算 ...

  3. [trustzone]-ARM trustzone技术下常见的软件框图

    文章目录 常用软件框图 1.Trustzone技术下常用软件框图 2.指纹TEE采集数据的框图 3.locksetting框架 4.gatekeeper框架 5.生物认证框架 6.keymaster框 ...

  4. ARM 虚拟化技术简介

    一. 虚拟化技术 二. 虚拟化技术的比较         2.1 全虚拟化和二进制重写(Pure virtualization and binary rewriting)         2.2 半虚 ...

  5. 12. Arm 动态 Trustzone 技术介绍

    源自 李平: 十多年来,TrustZone 一直在成功保护基于 Arm 的设备上的媒体管道.在此期间,这些设备的要求随着比特率.分辨率.帧速率.图像质量和用户界面的创新而显着增长.所有这些都在推动最初 ...

  6. 容器化技术最佳实践1--容器化技术简介与Docker入门

    容器化技术最佳实践1–容器化技术简介与Docker入门 文章目录 容器化技术最佳实践1--容器化技术简介与Docker入门 容器化简介 通过虚拟化了解容器化 对开发和运维的好处 容器化部署特点 什么情 ...

  7. ARM SIMD NEON 简介 (翻译自 Introducing NEON Development Article)

    目录 NEON简介 SIMD是什么? ARM SIMD 指令集 NEON是什么? NEON架构概览 支持的数据类型 NEON寄存器 NEON指令 NEON开发 汇编器 Intrinsics 自动向量化 ...

  8. 【科普】Xilinx 3D IC技术简介

    Xilinx 3D IC技术简介 跨Die约束?SLR?SSI?这些是使用UltraScale+/V7常见的概念,但是这些概念到底什么意思?有什么联系?下面我们从根本上去解释这些概念. 目录 目录 S ...

  9. AXI总线技术简介——ZYNQ PS和PL的互联技术

    AXI总线技术简介--ZYNQ PS和PL的互联技术 1.AXI总线介绍 2.AXI协议通道介绍 3.ZYNQ芯片内部的AXI总线 4.常用AXI接口IP介绍 5. 多个AXI接口互联交互 1.AXI ...

  10. 企业数字化基础设施技术简介

    企业数字化基础设施技术简介 1.基础设施架构简述 从办公数字化和生活数字化到万物数字化是一个必然的发展过程,数据驱动的智能应用充斥在生活的方方面面,随着社会的发展和技术的演进,数据的增长量呈现越来越快 ...

最新文章

  1. 第七周项目一-成员函数(4)
  2. 传递对象_洮北区司法局矫正对象献爱心传递社会正能量
  3. Docker 的插件式设计
  4. 胡伟 | 面向多实体人机协作消解的对比表生成自动化方法
  5. Spark之SparkStreaming理论篇
  6. Qt网络获取本机网络信息
  7. jquery ajax修改密码,提交form表单---修改密码 ajax、jQuery
  8. 十字链表实现矩阵存储
  9. Windows API函数大全(精心总结)
  10. 一文读懂《“十四五”软件和信息技术服务业发展规划》
  11. 灰鸽子病毒——网络神偷之后应用最广的反弹端口***
  12. pycharm代码删除恢复
  13. 曲苑杂坛--数据库更新探秘
  14. 现代几何学在计算机科学中的应用,CNCC2017
  15. nodejs 做动态网页
  16. 热衷于摸鱼的大一新生
  17. 加密聊天应用依然安全
  18. Imu_heading源码阅读(三)——Ransac_fitline部分
  19. 从入门到精通,看了这篇文章,你离老黑的路就不远了
  20. 超详细的 DNS 协议解析

热门文章

  1. 指纹的对比分析系统概述
  2. mysql快照数据_制作mysql数据快照
  3. android学习之展示图片资源
  4. 【ML】管理和跟踪机器学习实验
  5. 爬虫进阶 -- 神级程序员:让你的爬虫就像人类的用户行为!
  6. 使用Cytoscape-BiNGO 对非模式生物做go富集
  7. wordpress页脚添加备案号等版权信息
  8. Python导出exe文件
  9. 查看users表空间使用率高的原因
  10. Gradle之maven-publish插件发布到nexus私有仓库