New Non-WG Mailing List: TEEP- A Protocol for Dynamic Trusted Execution Environment Enablement

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



A new IETF non-working group email list has been created.

List address: teep@ietf.org
Archive: https://mailarchive.ietf.org/arch/search/?email_list=teep
To subscribe: https://www.ietf.org/mailman/listinfo/teep

Purpose: 

Chips used on smart phones, tablets, and many consumer appliances today have built-in support for a so-called Trusted Execution Environment (TEE). The TEE is a security concept that separates normal operating systems, like Linux, from code that requires higher security protection, like security-related code. The underlying idea of this sandboxing approach is to have smaller code that is better reviewed and test and to provide it with more rights. They run on the so-called Secure World (in comparison to the Linux operating system that would run in the Normal World).

TEEs have been on the market for a while and have been successfully used for a number of applications, such as payment. However, the technology hasn't reached its full potential since ordinary developers who could make use of such functionality have a hard time getting access to it, and to write applications for it .

With the Open Trust Protocol, see https://tools.ietf.org/html/draft-pei-opentrustprotocol-03, we have been trying to develop this application layer security protocol that allows the management of credentials and the update of such applications. This list is used for the discussion of Protocol for Dynamic Trusted Execution Environment Enablement.




[Index of Archives]     [IETF]     [IETF Discussion]     [Linux Kernel]

  Powered by Linux