X hits on this document

11 views

0 shares

0 downloads

0 comments

5 / 6

Texas Instruments

To further ensure protection against attacks, a secure chip-interconnect allows peripherals and memories access only by the secure environment and/or by secure DMA channels so that the confidentiality of sensitive information is guaranteed through the entire data path, from origin to destination.

Examples of peripherals and memories of the device with controlled secure access include:

  • MMI peripherals such as keyboards, LCDs, cameras, fingerprint sensors

  • Smart card physical interface

  • Cryptographic accelerators

  • Serial interfaces involved in multimedia content rendering

  • Internal memories

  • External flashes and SDRAMs

File System

Secure Middleware Component API

Secure Storage

Secure Middleware Component

User Application

M-Shield mobile security technology software

Secure ROM Code

Secure RAM

Protected Application

Secret Data

Root Public Key Random Key

RNG SHA/MD5 DES/3DES AES PKA

Open Application Environment

Secure Environment

Secure State Machine

Secure DMA

Secure Chip Interconnect

Other Security Features

M-Shield™ Mobile Security Technology

Provides hardware and software system level security solution

TI’s M-Shield mobile security technology includes a public-key infrastructure that provides a secure means to validate the authenticity and integrity of various software on the platform before execution. The M-Shield mobile security technology solution provides a state-of-the-art hardware-based AES and public-key accelerator (PKA), as well as DES/3DES, SHA and MD5 hardware accelerators.

M-Shield mobile security technology hardware accelerators enhance the user experience by authentication and fast content decryption and integrity checking.

The strength M-Shield mobile security technology solution infrastructure provides reduces the unauthor- ized use of handsets and fraud while enabling the deployment of value-added secure services.

The M-Shield mobile security technology solution infrastructure provides the highest level of security to reduce the unauthorized use of handsets and fraud while enabling the deployment of value-added secure services.

M-Sheild™ mobile security technology: making wireless secure

February 2008

5

Document info
Document views11
Page views11
Page last viewedWed Dec 07 17:26:33 UTC 2016
Pages6
Paragraphs145
Words2347

Comments