ARM TrustZone技术简介
2014-05-23 16:57
155 查看
原文出自:http://www.arm.com/zh/products/processors/technologies/trustzone/index.php
![](http://www.arm.com/zh/images/logo-trustzone.gif)
ARM TrustZone® technology is a system-wide approach to security for a wide array of client and server computing platforms, including handsets, tablets, wearable devices and enterprise systems. Applications enabled by the technology are extremely
varied but include payment protection technology, digital rights management, BYOD, and a host of secured enterprise solutions.
TrustZone technology is tightly integrated tightly into Cortex™-A processors but the secure state is also extended throughout the system via the AMBA® AXI™ bus and specific TrustZone System IP blocks. This system approach means that it is possible
to secure peripherals such as secure memory, crypto blocks, keyboard and screen to ensure they can be protected from software attack.
Devices developed with TrustZone technology, according to the recommendations of the Trusted Base System Architecture specification, enables the delivery of platforms capable of supporting a full
Trusted Execution Environment (TEE) and security aware applications and secure services, or Trusted Applications (TA). A Trusted Execution Environment is a small secure kernel, and normally developed with standard APIs, developed to the TEE specification
evolved by the Global Platform industry forum .
TrustZone enables the development of separate Rich Operating System and Trusted Execution Environments by creating additional operating modes to the Normal domain, known as the Secure domain and the Monitor mode. The Secure domain has the same capabilities
to the normal domain while operating in a separate memory space. The Secure Monitor acts as a virtual gatekeeper controlling migration between the domains.
Read more information on the use and development of
TEEs and Secure Monitor Code.
为什么选择 TrustZone?
硬件架构
软件架构
系统架构
系统组件
Mobile devices have evolved into open software platforms capable of downloading a huge variety of applications from the internet. These applications are validated by the device OEM to ensure quality, however malicious code is increasingly
being created to target this class of devices.
In parallel, the demand for mobile devices to handle high-value services is gaining significant momentum. New business models are emerging, from the capability to pay for, download and view the latest Hollywood blockbuster for a specific period, or the ability
to pay bills and manage bank accounts remotely from a handset.
These trends have already made mobile devices the next frontier for software attack vectors such as malware, trojans and rootkits. However, through the application of advanced security technology based on ARM TrustZone technology and integrating
SecurCore™ tamper resistant elements it is possible to develop devices that can offer both a feature-rich open operating environment and robust security solutions.
Protection against trojans, phishing and APT (Advanced Persistent Threats)
Enable deployment and consumption of high-value media (DRM)
BYOD (Bring your own device) device persons and application separation
Software license management
Loyalty-based applications
Access control of cloud-based documents
e-Ticketing Mobile TV
ARM processors supporting TrustZone include:
ARM Cortex-A57
ARM Cortex-A53
ARM Cortex-A15
ARM Cortex-A12
ARM Cortex-A9
ARM Cortex-A8
ARM Cortex-A7
ARM Cortex-A5
ARM1176
TrustZone
![](http://www.arm.com/zh/images/logo-trustzone.gif)
ARM TrustZone® technology is a system-wide approach to security for a wide array of client and server computing platforms, including handsets, tablets, wearable devices and enterprise systems. Applications enabled by the technology are extremely
varied but include payment protection technology, digital rights management, BYOD, and a host of secured enterprise solutions.
TrustZone technology is tightly integrated tightly into Cortex™-A processors but the secure state is also extended throughout the system via the AMBA® AXI™ bus and specific TrustZone System IP blocks. This system approach means that it is possible
to secure peripherals such as secure memory, crypto blocks, keyboard and screen to ensure they can be protected from software attack.
Devices developed with TrustZone technology, according to the recommendations of the Trusted Base System Architecture specification, enables the delivery of platforms capable of supporting a full
Trusted Execution Environment (TEE) and security aware applications and secure services, or Trusted Applications (TA). A Trusted Execution Environment is a small secure kernel, and normally developed with standard APIs, developed to the TEE specification
evolved by the Global Platform industry forum .
TrustZone enables the development of separate Rich Operating System and Trusted Execution Environments by creating additional operating modes to the Normal domain, known as the Secure domain and the Monitor mode. The Secure domain has the same capabilities
to the normal domain while operating in a separate memory space. The Secure Monitor acts as a virtual gatekeeper controlling migration between the domains.
Read more information on the use and development of
TEEs and Secure Monitor Code.
为什么选择 TrustZone?
硬件架构
软件架构
系统架构
系统组件
Mobile devices have evolved into open software platforms capable of downloading a huge variety of applications from the internet. These applications are validated by the device OEM to ensure quality, however malicious code is increasingly
being created to target this class of devices.
In parallel, the demand for mobile devices to handle high-value services is gaining significant momentum. New business models are emerging, from the capability to pay for, download and view the latest Hollywood blockbuster for a specific period, or the ability
to pay bills and manage bank accounts remotely from a handset.
These trends have already made mobile devices the next frontier for software attack vectors such as malware, trojans and rootkits. However, through the application of advanced security technology based on ARM TrustZone technology and integrating
SecurCore™ tamper resistant elements it is possible to develop devices that can offer both a feature-rich open operating environment and robust security solutions.
Application Examples
Secured PIN entry for enhanced user authentication in mobile payments & bankingProtection against trojans, phishing and APT (Advanced Persistent Threats)
Enable deployment and consumption of high-value media (DRM)
BYOD (Bring your own device) device persons and application separation
Software license management
Loyalty-based applications
Access control of cloud-based documents
e-Ticketing Mobile TV
ARM processors supporting TrustZone include:
ARM Cortex-A57
ARM Cortex-A53
ARM Cortex-A15
ARM Cortex-A12
ARM Cortex-A9
ARM Cortex-A8
ARM Cortex-A7
ARM Cortex-A5
ARM1176
相关文章推荐
- ARM TrustZone技术简介 -- 4 (TrustOS)
- ARM TrustZone技术简介 -- 2
- ARM TrustZone技术简介(四)(TrustOS)
- ARM TrustZone技术简介(二)
- ARM 虚拟化扩展技术简介
- TrustZone技术简介
- ARM Jazelle技术简介
- 使用TrustZone技术的移动终端匿名认证协议论文PPT:DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone
- ARM TrustZone技术简介 -- 3 (BL31 Secure Monitor简介)
- ARM DSP & SIMD技术简介
- ARM TrustZone技术简介 -- 1
- ARM的TrustZone技术
- ARM VFP技术简介
- TrustZone技术简介
- RFID相关技术和应用标准简介
- Mac OS 的Component技术简介
- BI构架及相关技术简介(中)
- RFID中间件技术简介
- J2ME 3D技术简介
- RichClient技术简介