Trusted Execution Environment definition

Trusted Execution Environment means having: (a) a hardware-enforced security environment with a hardware-secured chain of trust, a secure boot, a secure update process, hardware protection and encryption of cryptographic keys, and individualization of the Security Solution client, (b) a secure video playback chain for the Licensed Programs, including a secure video path, a secure video buffer, secure drivers, secure memory, security partitions and a secure area in hardware for the receiving, storing, decrypting and processing of the Security Solution keys and content keys, for the decrypting, decoding and rendering of the Licensed Programs and for the protection of decrypted frames, (c) no user-exposed busses on which unencrypted Licensed Programs can be transmitted, and (d) technological protections to prevent unauthorized firmware or software from interacting with the Licensed Programs (including, without limitation of and in addition to the foregoing, signed certificates, secure code isolation, runtime integrity checking of software applications, and intrusion and tampering detection).
Trusted Execution Environment. (TEE) means a processing environment on a device that, using hardware enforcement, prevents unauthorized hardware and software from discovering, modifying or interfering with its code and data.
Trusted Execution Environment means having: (a) a hardware-enforced security environment with a hardware-secured chain of trust, a secure boot, a secure update process, hardware protection and encryption of cryptographic keys, and individualization of the Security Solution client, (b) a secure video playback chain for the Licensed Programs, including a secure video path, a secure video buffer, secure drivers, secure memory, security partitions and a secure area in hardware for the receiving, storing, decrypting and processing of the Security Solution keys and content keys, for the decrypting, decoding and rendering of the Licensed Programs and for the protection of decrypted frames, (c) no user-exposed busses on which unencrypted Licensed Programs can be transmitted, and (d) technological protections designed to prevent unauthorized firmware or software from interacting with the Licensed Programs (including, without limitation of and in addition to the foregoing, signed certificates, secure code isolation, runtime integrity checking of software applications, and intrusion and tampering detection).

Examples of Trusted Execution Environment in a sentence

  • Memory locations used to temporarily hold CSPs must be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s).

  • Memory locations used to temporarily hold decrypted content shall be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s).

  • The ECP Protection Functions and Standard Protection Functions running in a Trusted Execution Environment being part of the CI Plus ECP Trusted Boundary should be isolated from other software running in the Trusted Execution Environment.

  • Furthermore, to overcome the problem of colluding network participants, Fabric chaincode runtime environment, and ledger storage can be transferred to a Trusted Execution Environment (TEE) [3].

  • Memory locations used to temporarily hold decrypted Included Programs shall be secured from access by any code running outside of the Trusted Execution Environment.

  • Memory locations used to temporarily hold CSPs must be secured from modification by any driver or any other process other than authorized code running inside the Trusted Execution Environment.

  • As a conclusion, it comes that classical (e.g., Trusted Execution Environment (TEE), remote authentication, runtime integrity) and novel (singularization, self-authentication, geo-location, control flow run-time monitoring and execution control) techniques can significantly improve AI/ML taking part in 5G networks, independently to what data-centric AML techniques would bring.

  • Furthermore, to overcome the problem of colluding network participants, Fabric chaincode runtime environment, and ledger storage can be transferred to a Trusted Execution Environment (TEE) [5].

  • SNTP Simple Network Time Protocol SSH Secure Shell SUC System under Consideration, or Subject under Consideration TCP/IP Transmission Control Protocol / Internet Protocol TEE Trusted Execution Environment TEPT Trained Execution Path Tree TOE Target Of Evaluation TSO Transmission System Operator.

  • The probe is deployed together with Tages' Systemic solution providing a Trusted Execution Environment (TEE) in order to protect it against illegal tampering and modification attacks.

Related to Trusted Execution Environment

  • Hostile environment means a situation in which bullying among students is sufficiently severe or pervasive to alter the conditions of the school climate;

  • Materials of Environmental Concern any gasoline or petroleum (including crude oil or any fraction thereof) or petroleum products or any hazardous or toxic substances, materials or wastes, defined or regulated as such in or under any Environmental Law, including asbestos, polychlorinated biphenyls and urea-formaldehyde insulation.

  • Environment means soil, land surface or subsurface strata, surface waters (including navigable waters, ocean waters, streams, ponds, drainage basins and wetlands), groundwaters, drinking water supply, stream sediments, ambient air (including indoor air), plant and animal life and any other environmental medium or natural resource.