Browse Prior Art Database

Restricted Access Supervision using Access Counters Disclosure Number: IPCOM000131977D
Original Publication Date: 2005-Dec-25
Included in the Prior Art Database: 2005-Dec-25

Publishing Venue


Related People

Other Related People:


Content protection such as OMA DRM (OMA, Open Mobile Alliance; DRM, Digital Rights Management), e-commerce or even legacy security demands such as SIM-lock/IMEI (SIM, Security Identity Module; IMEI, International Mobile Equipment Identification) can become challenging, especially in case of open-OS (Operating System). Often, only a few applications such as DRM player need to be protected, whereas most of the standard user applications are not security related. A protection scheme for critical runtime software components requires some kind of tamper resistant trusted execution environment (TEE). Apart from providing security-related services such as cryptographically signing data, a TEE can as well be used to supervise critical software components during runtime such as a DRM client. A few TEE concepts for example the "dedicated trusted processor core" in which critical HW (hardware) resources are accessible by a trusted core only. Also, concepts in which the same core implements secure and non-secure execution environment and "dedicated hardware-state machines in combination with ROM code" have been proposed to this point in time. For either of the mentioned options, problems remain to be solved with respect to hardware resources that need to be accessed from both, secure and non-secure environment. Some of the issues can be solved by using the dedicated trusted core concept. The handling of the hardware resources is not a problem in either concept. Still, the issues that occur are listed in the following: