X hits on this document

14 views

0 shares

0 downloads

0 comments

4 / 6

4

Texas Instruments

OMAP-Vox solutions are built on the industry-leading OMAP architecture and integrate the modem and application processing into the same device. OMAP-Vox solutions are optimized to efficiently run a dynamic mixture of applications and communications functions on the same hardware. Complete

Features

OMAP™

OMAP2

OMAP3

OMAP-Vox™

Cryptopgrphy acceleration

Public key acceleration

Platform security

Secure environment

Interconnect firewalls

Secure middleware ARM TrustZone™ software compatible

ARM TrustZone hardware support

Secure demand paging

M-Shield™ echnology

M-Shield mobile security system solution infrastructure

OMAP-Vox solutions include the analog components, power management and RF devices. M-Shield mobile security technology provides the infrastructure needed to support platform-level security for the mobile device itself, as well as any high-value content transmitted or stored on the device. Safe execution of sensitive applications and secure storage of important data is enabled by a hardware-enforced secure environment. For example, secure on-chip keys (E-Fuse) are OEM-specific, one-time-programmable keys accessible only from inside the secure environment for authentication and encryption.

M-Shield mobile security technology offers the industry’s leading hardware-based secure environment, embedding a secure state machine (SSM) as well as secure ROM and RAM. The SSM applies and guarantees the system’s security policy rules while entering, executing and exiting from the secure environment. Also critical to the overall protection offered by M-Shield mobile security technology is the elimination of the vulnerability of chip interconnects and DMA transfers. TI’s M-Shield mobile security technology provides the capability of the secure environment to qualify DMA transfers as secure to protect the confidentiality of sensitive high-value data (such as DRM-protected content) during their processing and transfer throughout the platform.

M-Sheild™ mobile security technology: making wireless secure

February 2008

Document info
Document views14
Page views14
Page last viewedSat Dec 10 06:38:38 UTC 2016
Pages6
Paragraphs145
Words2347

Comments