Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Flagship ‹t™-base TEE technology to be used across ALCATEL ONETOUCH range to provide secure authentication to premium content users in U.S. and Europe

LONDON, UK – October 23, 2014: Trustonic, the leading provider of Trusted Execution Enviroments (TEEs) for smart connected devices, today announced its collaboration with Alcatel Onetouch to bring hardware-class authentication to its devices, starting with the new flagship handset – HERO 2, which was launched at IFA in Berlin and is available now. This move will enable network operators worldwide to push enriched premium content services to their subscribers, improving user experience and providing secure authentication. 

Recognised by the major studios as a means of protecting and enabling premium content services, Trustonic’s ‹t™-base TEE technology provides a hardware-isolated space that service providers can harness to provide secure content delivery from the studio to the consumer. This collaboration between Trustonic and TCL will enable network operators to deploy new services and premium content without having to pre-integrate with the device maker, creating an improved user experience for subscribers.

As one of the fastest growing consumer electronics brand, ALCATEL ONETOUCH offers colourful, easy-to-use devices equipped with the technology consumers need at cost efficient prices. Incorporating Trustonic’s ‹t™-base TEE technology, the handset range now offers best-in-class High-bandwidth Digital Content Protection (HDCP), enabling viewing of premium content on an additional device screen, with no subsequent increase in cost. The technology is also contained in the company’s latest flagship handset, the HERO 2.

Ben Cade, CEO of Trustonic, said “As digital rights and content ownership become more of an issue, it’s imperative that smart connected devices have the capabilities to provide end-to-end protection without compromising usability. This is why we are delighted to be partnering with ALCATEL ONETOUCH; not only have we added to our ecosystem of device and chip manufacturers, we are also sharing our knowledge of secure authentication and user-friendly experiences across the ALCATEL ONETOUCH range.”

Dan Dery, CMO of ALCATEL ONETOUCH, said: “Providing customers with seamless and enjoyable experiences when using their mobile devices is one of our main priorities. Consumers want to access the service they need on devices they trust. This is why we’ve selected Trustonic’s ‹t™-base TEE technology to feature in our latest devices. Our collaboration will enable mobile network operators to push premium services and content in a secure manner and also allow our customers to enjoy them without the extra hassle associated with fragmented authentication.”

Related content

Casio Chooses Trustonic to Secure and Enhance Next-gen Smartwatches

Trustonic Secured Platform helps Casio protect new flagship wearable device

September 24, 2019 – Device and application security leader Trustonic today announces that Casio has selected Trustonic Secured Platform (TSP) to bring additional security and trust to its next-generation flagship wearable. The Casio PRO TREK Smart WSD-F21HR launched in August with a range of innovative features, including GPS, offline maps, heart rate and VO2 max measurement, designed for athletes and consumers who enjoy the outdoors.


The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.


What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment (TEE) is an environment for executing code, in which those executing the code can have high levels of trust in that surrounding environment, because it can ignore threats from the rest of the device.


What is TrustZone?

Arm® TrustZone® technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich operating system, from a much smaller, secure operating system.


All Trusted Execution Environment (TEE) posts
Back to top