Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
10342536 | Information Security Technical Report | 2005 | 9 Pages |
Abstract
The intent of trusted computing is to ensure that an information-processing device functions according to expectations. If the device has been designed to offer security protections, then it is reasonable for these expectations to include some assurance that the device will protect the security interests of the device's stakeholders. In the case of mobile phones, there are many different stakeholders that have diverse security interests. This paper discusses stakeholder interests in a mobile phone, describes how those interests are addressed using the Trusted Platform Module (TPM) specified by the Trusted Computing Group (TCG), and explains how improved protections are provided using the Freescale Advanced Trusted Platform (ATP).
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Carlin Covey, Mark Redman, Thomas Tkacik,