Dismiss
We will be performing system updates on Sunday, July 21st, from 9-noon ET. You may experience brief service interruptions during that time.
Browse Prior Art Database

Restricted Access Supervision using Access Counters

IP.com Disclosure Number: IPCOM000131977D
Original Publication Date: 2005-Dec-25
Included in the Prior Art Database: 2005-Dec-25
Document File: 7 page(s) / 106K

Publishing Venue

Siemens

Related People

Other Related People:

Abstract

Content protection such as OMA DRM (OMA, Open Mobile Alliance; DRM, Digital Rights Management), e-commerce or even legacy security demands such as SIM-lock/IMEI (SIM, Security Identity Module; IMEI, International Mobile Equipment Identification) can become challenging, especially in case of open-OS (Operating System). Often, only a few applications such as DRM player need to be protected, whereas most of the standard user applications are not security related. A protection scheme for critical runtime software components requires some kind of tamper resistant trusted execution environment (TEE). Apart from providing security-related services such as cryptographically signing data, a TEE can as well be used to supervise critical software components during runtime such as a DRM client. A few TEE concepts for example the "dedicated trusted processor core" in which critical HW (hardware) resources are accessible by a trusted core only. Also, concepts in which the same core implements secure and non-secure execution environment and "dedicated hardware-state machines in combination with ROM code" have been proposed to this point in time. For either of the mentioned options, problems remain to be solved with respect to hardware resources that need to be accessed from both, secure and non-secure environment. Some of the issues can be solved by using the dedicated trusted core concept. The handling of the hardware resources is not a problem in either concept. Still, the issues that occur are listed in the following: