To further ensure protection against attacks, a secure chip-interconnect allows peripherals and memories access only by the secure environment and/or by secure DMA channels so that the confidentiality of sensitive information is guaranteed through the entire data path, from origin to destination.
Examples of peripherals and memories of the device with controlled secure access include:
MMI peripherals such as keyboards, LCDs, cameras, fingerprint sensors
Smart card physical interface
Serial interfaces involved in multimedia content rendering
External flashes and SDRAMs
Secure Middleware Component API
Secure Middleware Component
M-Shield mobile security technology software
Secure ROM Code
Root Public Key Random Key
RNG SHA/MD5 DES/3DES AES PKA
Open Application Environment
Secure State Machine
Secure Chip Interconnect
Other Security Features
M-Shield™ Mobile Security Technology
Provides hardware and software system level security solution
TI’s M-Shield mobile security technology includes a public-key infrastructure that provides a secure means to validate the authenticity and integrity of various software on the platform before execution. The M-Shield mobile security technology solution provides a state-of-the-art hardware-based AES and public-key accelerator (PKA), as well as DES/3DES, SHA and MD5 hardware accelerators.
M-Shield mobile security technology hardware accelerators enhance the user experience by authentication and fast content decryption and integrity checking.
The strength M-Shield mobile security technology solution infrastructure provides reduces the unauthor- ized use of handsets and fraud while enabling the deployment of value-added secure services.
The M-Shield mobile security technology solution infrastructure provides the highest level of security to reduce the unauthorized use of handsets and fraud while enabling the deployment of value-added secure services.
M-Sheild™ mobile security technology: making wireless secure