Tagged articles
4 articles
Page 1 of 1
OPPO Amber Lab
OPPO Amber Lab
Aug 18, 2023 · Information Security

How to Build TA‑to‑TA Communication in Qualcomm’s QSEE Trusted Execution Environment

This guide explains the fundamentals of Trusted Execution Environments, introduces ARM TrustZone and Qualcomm's QSEE, and provides step‑by‑step instructions—including IDL creation, service implementation, and client integration—to establish secure TA‑to‑TA communication with practical code examples and troubleshooting tips.

arm trustzoneqseesecure enclave
0 likes · 10 min read
How to Build TA‑to‑TA Communication in Qualcomm’s QSEE Trusted Execution Environment
Architects' Tech Alliance
Architects' Tech Alliance
Apr 6, 2023 · Information Security

Key Chip‑Level Security Technologies for the Internet of Things

The article explains the security challenges of IoT deployments and describes chip‑level protection methods such as TPM, Secure Boot, Trusted Execution Environments, and hardware‑based trusted computing mechanisms like ARM TrustZone, Intel TXT, and AMD PSP, highlighting their roles in building a trustworthy IoT architecture.

IoT securitySecure BootTPM
0 likes · 10 min read
Key Chip‑Level Security Technologies for the Internet of Things
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Mar 5, 2021 · Information Security

Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication

The article explains how Trusted Execution Environments (TEE), built on ARM TrustZone, provide a secure world separate from the Rich Execution Environment, detailing its architecture, GP API interactions, and how fingerprint enrollment and authentication are performed within TEE to protect sensitive biometric data.

GP APIMobile SecurityTEE
0 likes · 10 min read
Introduction to TEE (Trusted Execution Environment) and Its Application in Fingerprint Authentication
Architects' Tech Alliance
Architects' Tech Alliance
May 16, 2020 · Information Security

Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone

This article explains the concepts of secure boot and trusted boot, discusses their limitations on general-purpose devices, and compares the application workflows and security properties of Intel SGX and ARM TrustZone, highlighting practical usage scenarios such as DRM-protected media.

Information SecurityIntel SGXSecure Boot
0 likes · 10 min read
Understanding Secure Boot, Trusted Boot, Intel SGX, and ARM TrustZone