The world of IoT/Consumer mobile devices keeps on evolving at a quick pace with an increasingly number of day-to-day critical services available. As we rely more and more on these devices, they carry increasingly sensitive data. IoT/Consumer devices are now permanently connected to the Internet. This evolution increases the level of risk attached to each one of these devices.
Many of these IoT/Consumer devices are built on software platforms that cannot be secured because of design choices made many years ago, such as Linux and Android. These platforms do not offer an acceptable level of security to customers that need to work with confidential data. Security solutions that build on such platforms (such as container solutions or “hardened” versions of these platforms) are ultimately limited to a low level of security.
Security must be built from the ground up.
One of the standard approaches for securing IoT/Consumer devices is to leverage on a Trusted Execution Environment (TEE) architecture, a concept that was introduced in 2001 by Dominique Bolignano, President and Founder of ProvenRun, and is now widely deployed in the Mobile industry and is at the heart of any smartphone security architecture.
How we can help
At ProvenRun, we have world-class experts in TEE security engineering. We can help our customers with their TEE projects in many different ways such as:
- Development of Trusted Applets: for your TEE, whether proprietary, OpTEE or ProvenCore
- TEE hardening: helping customers re-enforcing the security of their TEE to meet the security requirements for their market and project
- Addressing advanced use cases: leveraging on the unique properties of our ProvenCore unique features
Please refer to our Security Engineering services for more details