Trusted Execution Environment definition

Trusted Execution Environment means having: (a) a hardware-enforced security environment with a hardware-secured chain of trust, a secure boot, a secure update process, hardware protection and encryption of cryptographic keys, and individualization of the Security Solution client, (b) a secure video playback chain for the Licensed Programs, including a secure video path, a secure video buffer, secure drivers, secure memory, security partitions and a secure area in hardware for the receiving, storing, decrypting and processing of the Security Solution keys and content keys, for the decrypting, decoding and rendering of the Licensed Programs and for the protection of decrypted frames, (c) no user-exposed busses on which unencrypted Licensed Programs can be transmitted, and (d) technological protections to prevent unauthorized firmware or software from interacting with the Licensed Programs (including, without limitation of and in addition to the foregoing, signed certificates, secure code isolation, runtime integrity checking of software applications, and intrusion and tampering detection).
Trusted Execution Environment. (TEE) means a processing environment on a device that, using hardware enforcement, prevents unauthorized hardware and software from discovering, modifying or interfering with its code and data.

Examples of Trusted Execution Environment in a sentence

  • Memory locations used to temporarily hold CSPs must be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s).

  • Memory locations used to temporarily hold decrypted content shall be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s).

  • SNTP Simple Network Time Protocol SSH Secure Shell SUC System under Consideration, or Subject under Consideration TCP/IP Transmission Control Protocol / Internet Protocol TEE Trusted Execution Environment TEPT Trained Execution Path Tree TOE Target Of Evaluation TSO Transmission System Operator.

  • It is common to require that such functions be executed within a Trusted Execution Environment (TEE) as it protects the execution of the security functions and the data stored in and processed by the TEE.

  • The Trusted Execution Environment Security Management module focuses on the development of functionalities that allow 5GZORRO to protect their tenant service or application running in a computing node against a stakeholder with malicious intentions.

  • To further supplement the increased levels of privacy achieved via a private permissioned DLT, a Trusted Execution Environment (TEE) could be used in 5GZORRO to ensure attestation of the trustworthiness of data being submitted to the DLT.

  • The Trusted Execution Environment (TEE) [6] is an isolated processing environment in which applications can be securely executed irrespective of the rest of the system, in particular on a separated kernel.

  • Furthermore, to overcome the problem of colluding network participants, Fabric chaincode runtime environment, and ledger storage can be transferred to a Trusted Execution Environment (TEE) [3].

  • Cambridge University Press [39] Wikipedia Trusted Execution Environment.

  • Memory locations used to temporarily hold CSPs must be secured from modification by any driver or any other process other than authorized code running inside the Trusted Execution Environment.