Feeds

EU approves push to get the unknown security in ARM chips into use

Chipmaker must promise to let others join the TEE party

5 things you didn’t know about cloud backup

The European Commission has approved the creation of a new secure-element company backed by ARM, Gemalto and Giesecke & Devrient, just as long as ARM promises to keep its hardware open.

The new company will develop and sell products running software from G&D and Gemalto on the TrustZone element embedded in ARM chips, complete with management software, but the EU required promises from ARM that it wouldn't unfairly lock out competitive offerings.

"ARM will provide the necessary hardware information to competitors at the same conditions as to the joint venture to enable them to develop alternative TEE [Trusted Execution Environment] solutions. Moreover, ARM will not design its IP in a way that would degrade the performance of alternative TEE solutions."

That restriction lasts eight years, after which all bets are off.

ARM will own 40 of cent of the new venture, which builds on the growing need for better security on smartphones and other mobile devices, with Gemalto and G&D splitting the remaining 60 per cent between them. However, as the two software companies currently have different business models for their code (Gemalto licenses while G&D gives it away, making money on the servers) the model to be adopted by the new venture is a still work in progress.

TrustZone is built into ARM's chip designs, which are licensed out to processor manufacturers which have put the technology into around 90 per cent of mobile phones, though very few have the software to take advantage of it. Neither can that software easily be downloaded, as downloaded software can't be trusted, but the facility can easily be utilised in new handsets where the software can be securely preloaded.

Such apps run with the TrustZone, isolating them from the operating system and malware which could be lurking there. The process is not as secure as putting the secure element in the SIM, according to the SIM manufacturers at least, but it’s a good deal more secure than the phone's architecture.

But despite the ubiquity of TrustZone, and its ability to secure the OS, verify downloads, authenticate users and prevent man-in-the-middle attacks, almost no one is using it, which is what's promoting this new collaboration. The three companies will promote a single trusted execution environment making it much easier for banks, and other people interested in secure tokens, to create applications, and competing with the operator-owned secure element in the SIM.

NFC Times has more details, and points out that GlobalPlatform has been busy creating a standard API for communicating with an embedded secure element which could be important as phones with Intel chips inside use that company's Secure Element instead.

So soon we won't have to trust our mobile phone OS at all, we'll just have to trust the Secure Element supplier instead, which is (probably) good news for all concerned. ®

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
HUGE iPAD? Maybe. HUGE ADVERTS? That's for SURE
Noo! Hand not big enough! Don't look at meee!
AMD unveils 'single purpose' graphics card for PC gamers and NO ONE else
Chip maker claims the Radeon R9 285 is 'best in its class'
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.