5 members / 145 guests (24 hours)
$0.00 (0.00%)
High: $0.00
Low: $0.00
Volume: 0

An Interesting IDB update! And how IDB got even faster.  IDB is fast, reliable, and FREE to use. Just join and start posting!

TPM Mobile will help get the TPM more widely known





TPM Mobile will help get the TPM more widely known


said Ari Singer (DMI)


TCG in Action - TCG Publishes Use Cases for BYOD Security -11/14/13


For example, device manufacturers can provide a foundation for BYOD security by installing a TPM Mobile (eg hosted in Global Platform TEE)  The TPM can be remotely provisioned and application installed.  This will enable strong user authentication, trusted device identity and endpoint health assessment.  The device maker can issue and reprovision the device.  Communication carriers can remotely provision the TPM and install standard applications.


Remember an oldie but goodie.  Lark Allen:  Trustonic:  Sounding Clarion Call for Trusted Computing in Mobile.  One of the TEE applications which is being standardized by the TCG is the TPM-M firmware version of the TPM.  While the TPM-M executes in the TEE the TPM's keys are actually held in hardware with in the device to provide highly secure roots of trust as the foundation of new, industry standard security.  In February, Wave demonstrated an Android device with a TPM mobile running inside a Trustzone/TEE provided by one of the new Trustonic partners, Trusted Logic, a division of Gemalto.


How is mobile security in the Chinese market changing?


Over the last month we have seen several key mobile device launches which shows the importance of mobile security to China consumers, and indicates a trend going global.


Finger print recognition has been possible for many years but ensuring its secure storage and use has been a more recent addition to mobile devices. We have seen fingerprint sensors first appearing in flagship mobile devices such as the Samsung Galaxy S6 - but last week Xiaomi launched a new phone, including a fingerprint sensor, at a $150 price point. This has been made possible by Xiaomi's use of Trustonic's Trusted Execution Environment (TEE) which builds on top of the already existent TrustZone technology that is built into every ARM Cortex-A class processor found in over 90% of mobile devices. This means this functionality can be included without additional chips needing to be designed in. Since it is hardware based it also is the quickest way of processing secure data giving a better user experience. (http://www.hardwarezone.com.sg/product-news-xiaomi-unveils-full-metal-redmi-note-3-and-android-or-windows-10-os-mi-pad-2)

But it’s not just Xiaomi who is including the increased security that using the Trusted User Interface functionality of the Trustonic TEE enables. Over the last year Meizu also announced their MX5, Pro 5 and m1 metal that introduces their mTouch 2.0 security and fingerprint recognition which also benefits from the added security of using Trustonic TEE (http://www.meizu.com/en/products/mx5/mtouch.html)

With two leading Chinese mobile device manufacturers making security one of the central features of their new handsets, we expect to see more and more device manufacturers taking a similar approach. It shows the consumer demand to have more secure interactions via their mobile devices and they want this available across a wider range of mobile phones.


Can the TPM in the TEE be far behind?  Granted there's a small staff now doing other things, but I think the TPM Mobile is highly combustible.