Summary


A Protocol for Dynamic Trusted Execution Environment Enablement

Chips used on smart phones, tablets, and many consumer appliances today have built-in support for a so-called Trusted Execution Environment (TEE). The TEE is a security concept that separates normal operating systems, like Linux, from code that requires higher security protection, like security-related code. The underlying idea of this sandboxing approach is to have smaller code that is better reviewed and test and to provide it with more rights. They run on the so-called Secure World (in comparison to the Linux operating system that would run in the Normal World).

TEEs have been on the market for a while and have been successfully used for a number of applications, such as payment. However, the technology hasn't reached its full potential since ordinary developers who could make use of such functionality have a hard time getting access to it, and to write applications for it .

With the Open Trust Protocol, see https://tools.ietf.org/html/draft-pei-opentrustprotocol-03, we have been trying to develop this application layer security protocol that allows the management of credentials and the update of such applications. This list is used for the discussion of Protocol for Dynamic Trusted Execution Environment Enablement.

To contact the list owners, use the following email address: teep-owner@ietf.org

Archives

IETF Mailarchive


Subscription / Unsubscription

To subscribe or unsubscribe from this list, please sign in first. If you have not previously signed in, you may need to set up an account with the appropriate email address.

Sign In


You can also subscribe without creating an account. If you wish to do so, please use the form below.