ARM adding hardware-based security to its cores

Tuesday, 27 May 2003, 4:02 PM EST

Chip designer ARM Ltd. Tuesday said it will add extensions to its processor core next year that incorporate hardware-based security technologies.

Future versions of the company's ARM core for mobile and wireless handset chips will contain protected areas for storage of user authentication keys, and areas of the processor that are off-limits to unauthorized users, said Mary Inglis, director of operating systems and alliances for ARM.

TrustZone, as the extensions are called, creates a parallel domain where secure applications can run alongside nonsecure applications. The operating system or application vendors set the security policies as to what data is designated as secure, and what isn't, Inglis said.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //