arm trustzone n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
ARM Trustzone PowerPoint Presentation
Download Presentation
ARM Trustzone

Loading in 2 Seconds...

play fullscreen
1 / 9

ARM Trustzone - PowerPoint PPT Presentation


  • 342 Views
  • Uploaded on

ARM Trustzone. Group 2 Jason Hill Ryan Long Joye Turnage Jonathan Ashworth. What is Trustzone?. Trustzone overview Deals with security features in many digital electronic devices such as: Set-top boxes Next-generation smart phones Payment and network equipment. What is Trustzone?.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'ARM Trustzone' - hosanna


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
arm trustzone

ARM Trustzone

Group 2

Jason Hill

Ryan Long

Joye Turnage

Jonathan Ashworth

what is trustzone
What is Trustzone?
  • Trustzone overview
  • Deals with security features in many digital electronic devices such as:
    • Set-top boxes
    • Next-generation smart phones
    • Payment and network equipment
what is trustzone1
What is Trustzone?

Software application built directly into the hard drive

Ensures that security is an intrinsic feature at the heart of any device

how does it work
How does it work?

Memory Management Unit (MMU) & Caches- uses tables to determine which level a particular level of memory exists in

  • Secure Mode
  • Non-secure Mode
modes of operation
Modes of operation

Secure Mode- ensures that vital information is not intercepted by a third party

Non-secure Mode- allows more access to less protected information

applications
Applications
  • Over-the-Air Reprogramming
  • SIMLock Security
  • Terminal Identity
  • Managing Content
  • M-Wallet Transactions
  • Virtual Private Networks
conclusion
Conclusion

Security is clearly a growing concern in many markets.

Trustzone uses a hardware-enforced security domain in order to systemize the implementation of secure systems.

conclusion1
Conclusion

Trustzone technology will make the development of secure applications easier, ultimately expanding the range of data services available to network administrators.