Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    ARM, Partners Create Trustonic for Greater Mobile Device Security

    By
    Jeff Burt
    -
    December 18, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      ARM Holdings, whose low-power chip designs dominate the booming smartphone and tablet markets, is leading the effort to create a new company whose aim is to make those mobile computing devices more secure.

      ARM, along with security software makers Gemalto of the Netherlands and German company Giesecke & Devrient, on Dec. 18 unveiled Trustonic, a joint venture that is proposing a security standard that is separate from the operating system and can be built into the mobile devices by manufacturers.

      Trustonic’s technology will enable more secure e-commerce on smartphones and tablets, a key consideration as consumers move away from traditional desktop and notebook PCs and do more on their mobile computing devices, according to Ben Cade, the former ARM executive who is now Trustonic’s CEO. Given the growing number of online financial and business transactions—from shopping to banking—being done on smartphones and tablets, these devices need greater security.

      “If we do nothing else [in regards to security], we will end up with the situation we have with PCs,” Cade told eWEEK.

      Trustonic’s offering is based on ARM’s TrustZone technology, a security solution tightly integrated into ARM-designed Cortex mobile chips that are made by the likes of Samsung Electronics, Qualcomm and Nvidia. The technology was first developed by ARM in 2002, and the first chips with TrustZone came out two years later.

      The technology has become a key part of the chips ARM’s partnerships offer manufacturers; Cade said that over the past 12 months, “tens of millions to hundreds of millions” of chips with TrustZone have shipped.

      Trustonic combines the TrustZone technology with security software from Gemalto and G&D, which had been creating offerings that leverage TrustZone. Through Trustonic, these companies are bringing these solutions into a product that can be embraced by device manufacturers.

      The offering enables the creation of a Trusted Execution Environment (TEE) within the mobile device that is separate from the operating system, and thus immune from the malware that targets the OS, Cade said. Within the TEE, users can securely store such sensitive personal information as account data, personal identification numbers (PINs) and passwords. Trustonic will license the TEE technology to chip makers—similar to how ARM licenses its designs to its partners—and will help create a standard that banks, online retailers and service providers can adopt to leverage the TEE in smartphones and tablets.

      The TEE environment also could be helpful to enterprises, which are having to deal with an increasing number of mobile devices looking for access to their corporate networks, thanks to such trends as mobile computing, remote workers and bring your own device (BYOD).

      In talking about the TEE, Cade compared it to a bank deposit box. Users can take advantage of all the services the bank has to offer—just as they do the capabilities found in smart mobile devices—and their most important and private belongings are securely stored away in the deposit box, away from others. The TEE plays a role similar to that of the deposit box.

      In addition to the greater security, TEE will also make doing business online easier and faster, Cade said. A normal e-commerce transaction from a laptop takes 120 keystrokes and 2.5 minutes, he said. From a mobile phone equipped with TEE, a similar transaction would take six keystrokes and seven seconds.

      Trustonic officials said the company already has a number of partners, ranging from tech vendors like Nvidia, Cisco Systems, Good Technology, Symantec and Samsung, to companies like 20th Century Fox Home Entertainment and MasterCard.

      ARM isn’t the only chip maker to push hardware-based security in its processors. Intel, which last year bought security software maker McAfee, in September 2011 unveiled DeepSafe, hardware-based security technology that results from the McAfee acquisition. Intel also has partnerships with MasterCard and Visa.

      For their part, officials with chip maker Advanced Micro Devices said in June they were going to incorporate ARM’s TrustZone technology into their own x86-based processors.

      Jeff Burt
      Jeffrey Burt has been with eWEEK since 2000, covering an array of areas that includes servers, networking, PCs, processors, converged infrastructure, unified communications and the Internet of things.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×