<t base Trusted Application Development

Size: px
Start display at page:

Download "<t base Trusted Application Development"

Transcription

1 <t base Trusted Application Development Prepared for: Praxisforum Anwender und Anbieter im Dialog Mobile Sicherheit im Unternehmen am in München Markus Katzenberger Project Manager Trustonic GmbH 1

2 Agenda Who we are The Trusted Execution Environment TEE <t-base OTA Ecosystem Typical Use Cases for TEE <t-base architecture and APIs <t-base devices 2

3 Trustonic EXECUTIVE TEAM Ben Cade CEO Olivier Leger EVP Sales & Marketing Chris Jones COO Stephan Spitz EVP Engineering Jon Geater CTO OVER 100 EMPLOYEES LOCATED BETWEEN Cambridge, London, Maidenhead, Bath Munich Helsinki Tokyo Seattle, Austin, San Francisco Sophia, Paris Seoul Taipei 3

4 Trustonic EXECUTIVE TEAM Seattle, Austin, San Francisco Ben Cade CEO Olivier Leger EVP Sales & Marketing 2 years of Trustonic (Dec 2012 Dec 2014) Munich Chris Jones COO Stephan Spitz EVP Engineering What an amazing 2 years it s been. Helsinki Jon Geater CTO Trustonic OVER 100 EMPLOYEES technology LOCATED can already BETWEEN be found in over 300 Million smart devices and our growing ecosystem of service providers Cambridge, London, Tokyo stands at over Maidenhead, 50 companies Bath spanning enterprise, content protection, commerce and identity management segments. So, thank you to our partners for helping to establish this common Seoul Sophia, foundation Paris of trust in devices Now 2015 promises to be a year full of opportunity for those looking to deliver Taipei trust enhanced experiences to the masses! 4

5 Why use a TEE? Key assets exposed Key assets protected LOGO COLOR VERSIONS SMART CONNECTED DEVICE Normal App Security Critical Assets LOGO TEE Enabled App API Call on Security critical Routine Secure Container Trusted App - Secured Critical Assets Isolated space for handling high value assets MAIN OPERATING SYSTEM TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 5

6 Where does t-base fit? A/V OUTPUT LOGO IN BLACK SMART CONNECTED DEVICE TRUSTZONE SYSTEM-ON-CHIP APPLICATIONS LOGO ON PROCESSOR BLACK NFC BLUETOOTH WI-FI RADIO MASS STORAGE SECURE ELEMENT LOCATION SENSOR BASEBAND RADIO TOUCHSCREEN SENSOR BIOMETRIC SENSOR 6

7 The Ecosystem <t-directory <t-kph TAM SERVICE PROVIDERS <t-dev DEVICE MAKER LOGO COLOR VERSIONS APP DEVELOPERS <t-sdk LOGO <t-base CHIP MAKER APP STORE LOGO IN BLACK LOGO ON BLACK SILICON IP END USERS 7

8 8 Use Cases for t-base TEE

9 Content Protection Content Service DTCP/IP LOGO COLOR VERSIONS LOGO Link Protection MAIN OS LOGO IN BLACK SMART CONNECTED DEVICE TEE Enabled Content Service App DRM and Media Framework APIs TRUSTZONE SYSTEM-ON-CHIP LOGO ON BLACK Secure Container DRM Decryption TRUSTONIC TEE Secure Playback Secure Boot Device Authentication User Authentication DRM Protection Trusted time source Secure Playback Link Protection DTCP Downloadable Scheme Trustonic protects video path from studio to user 9

10 Payments LOGO COLOR VERSIONS SMART CONNECTED DEVICE LOGO TEE Enabled Wallet App Secure Container Signed Sealed User Input Data API Call to Authenticate User Login/Password or Biometric Secure Input MAIN OS TRUSTONIC TEE LOGO IN BLACK LOGO ON BLACK TRUSTZONE SYSTEM-ON-CHIP 10 Trustonic protects PINs and Passwords and access to Biometric sensors

11 Enterprise LOGO GO COLOR VERSIONS APPLICATION LEVEL 2 Factor User Authentication Identity Management Authorization and SSO Physical access control with HCE Secure messaging: Voice and Data Data loss prevention SYSTEM LEVEL Secured dual persona Secured MDM and MAM Biometric matching LOGO IN BLACK LOGO ON BLACK DEVICE LEVEL Secure boot and integrity checks Bulk storage encryption Biometric hardware interfaces 11

12 Automotive Mobile as car remote control BLUETOOTH LE NFC Identity Management PIN/Fingerprint Unlock Remote Lock/Unlock Car personalization Performance and comfort Insurance Interface Driver risk profiled discounts Location based payments Parking Fuel/recharging Road tolls Premium Traffic information Entertainment Movies Apps 12

13 Internet of Things ENERGY BROKERAGE ADVERTISER HOME GATEWAY APPLIANCE MAKER HOME INSURER CONNECTION REQUESTS AUTHORIZATIONS SMART DEVICE GATEWAY User controls who can access what data Authentication Authorization Energy suppliers bid for contracts Smart meter Appliances request service Insurers discount on occupancy User location Temperature SMART METER THERMO- STAT CONNECTED APPLIANCES 13

14 Healthcare Health card Identity/Authorization Secure access to records Sensors and monitoring Privacy protected activity logging Secure connection to medical equipment Secure Storage of medical data MEDICAL EQUIPMENT 14

15 Trusted Application Development 15

16 <t-base Architecture Normal-World Application Secure-World Container Trusted Application Connector TCI Trusted Application <t-base Client API Trusted Application API <t-base daemon kernel COM System Crypto Security <t-base driver MCI <t-base OS ARM TrustZone enabled SoC 16

17 Development Tools TA Development <t-sdk (header files, libs, sample code, scripts) ARM DS-5 for compiling and debugging GNU GCC for compiling Secure Driver Development <t-ddk (header files, libs, sample code, scripts) ARM DS-5 for compiling debugging via JTAG according to SoC Tools Normal-World Development Existing Android driver is open-source Normal-World OS tools should be used 17

18 <t-base Normal world Normal-World Application Trusted Application Connector Memory Session Device <t-base Client API Device Access Session Management Memory Mapping <t-base Client API <t-base daemon kernel <t-base driver 18

19 <t-base Secure World Trusted Application API COM a set of functions for inter-world communication System <t-base system information and functions Crypto <t-base crypto provider Security Secure object functions for binary data Secure-World Containers Trusted Application Trusted Application API Security Crypto System COM <t-base OS 19

20 20 <t-base-300 GlobalPlatform API

21 GlobalPlatform API In addition to the <t-base-2xx APIs, <t-base 300 introduced the key GP features that are already standardized TEE Client API for client applications TEE Internal API for TA Cryptography Trusted Storage Memory Management Equivalent functionality of what is already available to develop Trusted Applications on <t-base-2xx 21

22 TEE Client API TEEC_InitializeContext TEEC_FinalizeContext TEEC_OpenSession TEEC_CloseSession TEEC_InvokeCommand TEEC_AllocateSharedMemory TEEC_RegisterSharedMemory TEEC_ReleaseSharedMemory 22

23 TEE Internal API: TA Interface TA_CreateEntryPoint TA_DestroyEntryPoint TA_OpenSessionEntryPoint TA_CloseSessionEntryPoint TA_InvokeCommandEntryPoint Trusted Applications are multi-instance 23

24 TEE Internal API: Memory Mgmt. Functions TEE_CheckMemoryAccessRights TEE_SetInstanceData TEE_GetInstanceData TEE_Malloc TEE_Realloc TEE_Free TEE_MemMove TEE_MemCompare TEE_MemFill 24

25 TEE Internal API: Object Functions TEE_GetObjectInfo TEE_GetObjectBufferAttribute TEE_GetObjectValueAttribute TEE_CloseObject TEE_AllocateTransientObject TEE_FreeTransientObject TEE_ResetTransientObject TEE_PopulateTransientObject TEE_InitRefAttribute TEE_InitValueAttribute TEE_CopyObjectAttributes TEE_GenerateKey TEE_OpenPersistentObject TEE_CreatePersistentObject TEE_CloseAndDeletePersistentObject TEE_ReadObjectData TEE_WriteObjectData TEE_TruncateObjectData TEE_SeekObjectData 25

26 TEE Internal API: Cryptographic Functions TEE_AllocateOperation TEE_FreeOperation TEE_GetOperationInfo TEE_SetOperationKey TEE_DigestUpdate TEE_DigestDoFinal TEE_CipherInit TEE_CipherUpdate TEE_CipherDoFinal TEE_MACInit TEE_MACUpdate TEE_MACComputeFinal TEE_MACCompareFinal TEE_AsymmetricEncrypt TEE_AsymmetricDecrypt TEE_AsymmetricSignDigest TEE_AsymmetricVerifyDigest TEE_GenerateRandom Keys must be transient objects 26

27 <t-base devices Arndale development board Exynos 5250 SoC System or Service Provider TAs Driver development Commercial Devices Each device must be added to Trustonic test infrastructure TA can be bundled in your APK in the /res folder We will support demos and POCs We can advise on suitable devices CONFIDENTIAL

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014

Verfahren zur Absicherung von Apps. Dr. Ullrich Martini IHK, 4-12-2014 Verfahren zur Absicherung von Apps Dr. Ullrich Martini IHK, 4-12-2014 Agenda Introducing G&D Problem Statement Available Security Technologies Smartcard Embedded Secure Element Virtualization Trusted Execution

More information

Symbian phone Security

Symbian phone Security ITSX Overview Symbian OS. Risks and Features. Taking it apart. Conclusions. Symbian History Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 EPOC32 was designed with OO in C++ 1998:

More information

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation

Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation Giesecke & Devrient Mobile Sicherheitein sicheres Ecosystem für die mobile Kommunikation 22.04.2010 Dr. Kai Grassie SVP, CTO Darmstadt, 13.12.2012 Contents G&D: Who we are Innovation accelerates: From

More information

Android Virtualization from Sierraware. Simply Secure

Android Virtualization from Sierraware. Simply Secure Android Virtualization from Sierraware Simply Secure Integration Challenges DRM Mandates TrustZone TEE Hypervisor provides the flexibility and security needed for BYOD Power management, responsibility

More information

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations

DOWNLOAD COURSE PRESENTATIONS. Scan to download course presentations DOWNLOAD COURSE PRESENTATIONS 2 Scan to download course presentations ZYNQ OS SUPPORT 3 AGENDA 4 > OS/Ecosystem Overview > Xilinx Petalinux/OSL > AMP Reference Design Information > Linux Partial Reconfiguration

More information

Sierraware Overview. Simply Secure

Sierraware Overview. Simply Secure Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,

More information

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper. EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple

More information

H MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch

H MICRO CASE STUDY. Device API + IPC mechanism. Electrical and Functional characterization of HMicro s ECG patch H MICRO CASE STUDY HMicro HMicro is a wireless healthcare chip company to enable industry s first fully disposable wireless patches with high reliability, high data integrity, low cost, small form factor

More information

POPP Hub Gateway. Manual

POPP Hub Gateway. Manual POPP Hub Gateway Manual 008900 POPP Hub Gateway Manual Quick Start... 2 Hardware... 2 Smart Home User Interface... 2 Applications (Apps) realize the intelligence of your Smart Home... 3 Functions of the

More information

Android pay. Frequently asked questions

Android pay. Frequently asked questions Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

m Commerce Working Group

m Commerce Working Group m-powering Development Initiative Advisory Board second meeting Geneva, 23 rd of May 2014 m Commerce Working Group M-Commerce structure 2 Definitions Mobile Device m-commerce MFS m-marketing m-banking

More information

An Example of a Derived Credentials Architecture

An Example of a Derived Credentials Architecture An Example of a Derived Credentials Architecture Francisco Corella, PhD fcorella@pomcor.com Karen Lewison, MD kplewison@pomcor.com Original: March 31, 2014; updated: April 27, 2014 Abstract NIST has released

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

EMV-TT. Now available on Android. White Paper by

EMV-TT. Now available on Android. White Paper by EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions

More information

Internet Of things. Petr Ulvr, petr.ulvr@intel.com Business Development Manager Intel Corp. CEE New Biz Virtual Team

Internet Of things. Petr Ulvr, petr.ulvr@intel.com Business Development Manager Intel Corp. CEE New Biz Virtual Team Internet Of things Petr Ulvr, petr.ulvr@intel.com Business Development Manager Intel Corp CEE New Biz Virtual Team Intel s vision If it is smart and connected, it is best with Intel. Data Center/Network

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

Mobile Cloud Computing

Mobile Cloud Computing Mobile Cloud Computing Dr Samia Bouzefrane Laboratoire CEDRIC CNAM, 292 rue Saint Martin http://cedric.cnam.fr/~bouzefra samia.bouzefrane@cnam.fr 1 Agenda Mobile Cloud computing Mobile trusted computing

More information

Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink

Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink Track One Building a connected home automation device with the Digi ConnectCore Wi-i.MX51 using LinuxLink Session 1 Assembling and booting a small footprint Linux platform To join the teleconference -------------------------------------------------------

More information

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks 2011 www.dialog-semiconductor.com Technology benefits Easy to install and use, perfect for self-installed

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

ARM mbed IoT Device Platform. November 3 rd, 2014

ARM mbed IoT Device Platform. November 3 rd, 2014 ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the

More information

Reminders. Lab opens from today. Many students want to use the extra I/O pins on

Reminders. Lab opens from today. Many students want to use the extra I/O pins on Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students

More information

Wireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks

Wireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks Wireless networks that make sense Low-energy semiconductor solutions for wireless sensor networks 2011 www.dialog-semiconductor.com Technology benefits Ultra-low-energy technology based on proven DECT

More information

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone

Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Comprehensive Security for Internet-of-Things Devices With ARM TrustZone Howard Williams mentor.com/embedded Internet-of-Things Trends The world is more connected IoT devices are smarter and more complex

More information

Protect Your Mobile World

Protect Your Mobile World Protect Your Mobile World Doward Wilkinson Mobile Strategic Trend s May, 2012 1 It is a Fact We Live in a Mobile World People Devices Apps Access Payments Commerc Market e Opportuni At Risk ty 2 In the

More information

Secure Cloud and Remote Service Connections for AllJoyn Applications

Secure Cloud and Remote Service Connections for AllJoyn Applications Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group

More information

Questions from The New SensorTag - IoT Made Easy Webinar

Questions from The New SensorTag - IoT Made Easy Webinar Questions from The New SensorTag - IoT Made Easy Webinar Are there any plans to make a Windows API available (preferably portable for use in Windows 10 Universal applications) It is in our queue of projects,

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

Mobile and Embedded/IoT market Overview and Trends. June 2014

Mobile and Embedded/IoT market Overview and Trends. June 2014 Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum

More information

BlackBerry 10.3 Work and Personal Corporate

BlackBerry 10.3 Work and Personal Corporate GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

Introduction to Silicon Labs. November 2015

Introduction to Silicon Labs. November 2015 Introduction to Silicon Labs November 2015 1 Company Background Global mixed-signal semiconductor company Founded in 1996; public since 2000 (NASDAQ: SLAB) >1,100 employees and 11 R&D locations worldwide

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Penetration Testing for iphone Applications Part 1

Penetration Testing for iphone Applications Part 1 Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone

More information

CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel

CSE597a - Cell Phone OS Security. Cellphone Hardware. William Enck Prof. Patrick McDaniel CSE597a - Cell Phone OS Security Cellphone Hardware William Enck Prof. Patrick McDaniel CSE597a - Cellular Phone Operating Systems Security - Spring 2009 - Instructors McDaniel and Enck 1 2 Embedded Systems

More information

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM

ARM Processors and the Internet of Things. Joseph Yiu Senior Embedded Technology Specialist, ARM ARM Processors and the Internet of Things Joseph Yiu Senior Embedded Technology Specialist, ARM 1 Internet of Things is a very Diverse Market Human interface Location aware MEMS sensors Smart homes Security,

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Weak Spots in Enterprise Mobility Management Dennis Schröder

Weak Spots in Enterprise Mobility Management Dennis Schröder Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager

More information

Windows Phone 8 Security deep dive

Windows Phone 8 Security deep dive October 2012 Windows Phone 8 Security deep dive David Hernie Technical Evangelist Microsoft Belux Office Microsoft Corporation All large screen, dual-core, LTE and NFC Nokia Lumia 920 Nokia Lumia 820 Samsung

More information

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO

NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe. MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information

More information

Lecture 2 PLATFORM SECURITY IN ANDROID OS

Lecture 2 PLATFORM SECURITY IN ANDROID OS Lecture 2 PLATFORM SECURITY IN ANDROID OS You will be learning: Android as a software platform Internals and surrounding ecosystem Security techniques in Android: Application signing Application isolation

More information

Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months

Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months Our program is a practical knowledge oriented program aimed at making innovative and attractive applications for mobile

More information

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and procedures to govern who has access to electronic protected

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Computer Automation Techniques. Arthur Carroll

Computer Automation Techniques. Arthur Carroll Computer Automation Techniques Arthur Carroll 1 Three Types of Computers Micro-Controller Single Board Computer Desktop Computer 2 The Micro-Controller Small inexpensive DIP or surface mount chips Roughly

More information

The Impact of IoT on Semiconductor Companies

The Impact of IoT on Semiconductor Companies Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection

More information

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit

More information

Security Requirements in the Era of Mobile communication The case of the financial industry

Security Requirements in the Era of Mobile communication The case of the financial industry Security Requirements in the Era of Mobile communication The case of the financial industry 7th February 2012 Dr. Kai Grassie, CTO Agenda Development and status of Mobile Payment Technology-Trends in Mobile

More information

BlackBerry 10.3 Work Space Only

BlackBerry 10.3 Work Space Only GOV.UK Guidance BlackBerry 10.3 Work Space Only Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network architecture

More information

Android on i.mx Applications Processors

Android on i.mx Applications Processors July 2009 Android on i.mx Applications Processors Sridharan Subramanian Senior Product Manager Software and Platforms Abstract Android is a software platform and operating system for mobile devices, based

More information

Dell Wyse Cloud Connect

Dell Wyse Cloud Connect Dell Wyse Cloud Connect Secure productivity from work, home, and on the go. The ultra-compact personal cloud device that can make any HDMI/MHL-equipped display your own. For personal access to all of your

More information

Threat Model for Software Reconfigurable Communications Systems

Threat Model for Software Reconfigurable Communications Systems Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the

More information

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks

Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks Wireless networks that make sense Complete semiconductor solutions for wireless sensor networks The right choice for wireless networks Wireless networking is an emerging, fast-growing market, and is making

More information

En Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df 0 2 26

En Wireless Mobile Utility (Android) User s Manual. D610, D600, D7100, D5300, D5200, D3300, Df 0 2 26 1 En Wireless Mobile Utility (Android) User s Manual Install the Wireless Mobile Utility on your smart device (smartphone or tablet) to download pictures from a camera or take pictures remotely. The Wireless

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Best Practices for a BYOD World

Best Practices for a BYOD World Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile

More information

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.

More information

Networking Services Trusted at every level and every phase

Networking Services Trusted at every level and every phase Networking Services Trusted at every level and every phase freescale.com/netservices Networking Services Overview Freescale has over 1000 in-house software resources providing networking expertise, software

More information

Mobile Application Security

Mobile Application Security Mobile Application Security Rebecca Finnin, AT&T ISACA Geek Week 08/20/2013 AGENDA Mobile Application Development Review Gartner Framework of Mobile App Development Challenges Outline Security Implications

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Technology.Transfer.Application.

Technology.Transfer.Application. Technology.Transfer.Application. Steinbeis Research Center Elektromobility and Information Systems 2015 Steinbeis Technology. Transfer. Application. www.steinbeis.de Open and Secure Operating for mobility

More information

Developing for MSI Android Devices

Developing for MSI Android Devices Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Introduction to Trusted Execution Environments (TEE) IY5606

Introduction to Trusted Execution Environments (TEE) IY5606 Introduction to Trusted Execution Environments (TEE) IY5606 Steven J. Murdoch Computer Laboratory Learning objectives Trusted Execution Environment (TEE) Understand what a TEE is and why it is of interest

More information

M-Shield Mobile Security Technology: making wireless secure

M-Shield Mobile Security Technology: making wireless secure WHITE PAPER Jerome Azema Distinquished Member of Technical Staff WTBU Chief Technology Office - Security Texas Instruments Gilles Fayad Worldwide Strategic Marketing Manager, Mobile Platform Security and

More information

AllJoyn Android Environment Setup Guide

AllJoyn Android Environment Setup Guide 80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3

More information

How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or

How To Use An Atmel Atmel Avr32848 Demo For Android (32Bit) With A Microcontroller (32B) And An Android Accessory (32D) On A Microcontroller (32Gb) On An Android Phone Or APPLICATION NOTE Atmel AVR32848: Android Accessory Demo 32-bit Atmel Microcontrollers Features Control an accessory from an Android device Send data to and from an Android device to an accessory Supported

More information

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY

SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY SSL ACCELERATION DEPLOYMENT STRATEGIES FOR ENTERPRISE SECURITY Introduction OPTIMIZING SSL DEPLOYMENT On-demand business breaks down the traditional network perimeter, creating interconnected systems between

More information

Enhanced Project Management for Embedded C/C++ Programming using Software Components

Enhanced Project Management for Embedded C/C++ Programming using Software Components Enhanced Project Management for Embedded C/C++ Programming using Software Components Evgueni Driouk Principal Software Engineer MCU Development Tools 1 Outline Introduction Challenges of embedded software

More information

CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu

CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends

More information

Integrating Mobile into Your Cross- Platform Strategy with Qt

Integrating Mobile into Your Cross- Platform Strategy with Qt Integrating Mobile into Your Cross- Platform Strategy with Qt Tuukka Ahoniemi Technical Product Marketing Manager tuukka.ahoniemi@theqtcompany.com Qt Developer Days 2014 Agenda Qt and Mobile Platforms

More information

BLE113 DEVELOPMENT KIT

BLE113 DEVELOPMENT KIT BLE113 DEVELOPMENT KIT QUICK START Thursday, 14 March 2013 Version 1.5 Copyright 2000-2013 Bluegiga Technologies Bluegiga Technologies reserves the right to alter the hardware, software, and/or specifications

More information

En Wireless Mobile Utility (Android) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df 0 2 31

En Wireless Mobile Utility (Android) User s Manual. D750, D610, D600, D7200, D7100, D5500, D5300, D5200, D3300, Df 0 2 31 1 En Wireless Mobile Utility (Android) User s Manual Install the Wireless Mobile Utility on your smart device (smartphone or tablet) to download pictures from a camera or take pictures remotely. The Wireless

More information

Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.

Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc. Creating a More Secure Device with Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact

More information

Take your Work along with Connected Mobility

Take your Work along with Connected Mobility Take your Work along with Connected Mobility A dedicated Mobility arm, 7 state of the art testing labs across 3 continents, award winning mobility solutions, an app store with 30,000+ apps and 15+ providers

More information

Software Prerequisites Linux Ubuntu 12.04 LTS. Estimated completion time: 15min. The goal of this hands-on is to:

Software Prerequisites Linux Ubuntu 12.04 LTS. Estimated completion time: 15min. The goal of this hands-on is to: TRAINING MANUAL Using SAM-BA for Linux on SAMA5D3 Xplained AN-8995 Prerequisites Hardware Prerequisites Atmel SAMA5D3 Xplained USB serial TTL adapter (optional) FTDI TTL-232R-3V3 USB to TTL serial cable

More information

RoverPal - A Mobile Payment Application

RoverPal - A Mobile Payment Application White Paper RoverPal - A Mobile Payment Application Introduction Online shopping has been a favorable experience with most of us. Still, we come across instances where we are out on shopping and we run

More information

NXP s Solution to ecall Brussels, October 19 th, 2010

NXP s Solution to ecall Brussels, October 19 th, 2010 NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough

More information

Enterprise Mobility S.E.A.L / Galaxy S III

Enterprise Mobility S.E.A.L / Galaxy S III Enterprise Mobility S.E.A.L / Galaxy S III B2B Division, Solution Sales Samsung Electronics, Nordics Kenneth Broberg Nov 2012 2 Worldwide Results 313 Million mobile devices shipped in 2011, as the world

More information

The Trusted Execution Environment:

The Trusted Execution Environment: The Trusted Execution Environment: Delivering Enhanced Security at a Lower Cost to the Mobile Market White Paper June 2015, revised from February 2011 secretariat@globalplatform.org www.globalplatform.org

More information

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Mobile Device as a Platform for Assured Identity for the Federal Workforce Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft

More information