Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Collaboration provides security platform for innovative mobile services from Network Operators

LONDON, UK – February 18, 2015: Trustonic, the leading provider of Trusted Execution Environments (TEE) for securing smart devices, today announced collaboration with ZTE, a global leader in innovation and design. Trustonic TEE enabled ZTE devices will be available globally to customers starting in Q2 of 2015.

Hardware based security has traditionally been isolated, limited, and locked down at the point of manufacturing to a single use case or to a developer. The Trustonic and ZTE collaboration unlocks hardware enabled security to the larger ecosystem of developers to enable a new set of secure services for customers. These secure services are designed to protect customers from software based attacks.  Furthermore, Trustonic TEE allows over the air deployment of applications and services, allowing developers to deploy (and update) their services without the need to embed components during manufacturing of the device.

“Partnership with Trustonic will enable our smartphone customers to benefit from hardware enabled secure services provided by Trustonic’s ecosystem of partners. This will also allow us to deliver on the asks from our operator customers for a secure platform.” said Jill Guo, Strategic Planning Director, ZTE Corporation.

Ben Cade, CEO of Trustonic, said: “Trustonic’s partnership with ZTE is underpinned by the need for a simpler, quicker and safer device experience that will enhance the digital lives of users.  Security needs to be simple and effective, in any context.  Trustonic makes it quick and easy for service providers and developers to add trust-enhanced services and to enrich the way people shop, work and view premium content.”

About TEE

The Trusted Execution Environment (TEE) is a secure area that resides in the application processor of an electronic device.  Separated by hardware from the main operating system, the TEE ensures the secure storage and processing of sensitive data and trusted applications.  The TEE enables mobile operators and developers to provide a new set of secure services, and is designed to protect applications and data from software-based attacks.  Services can be protected from the cloud to the device to the user, including interactions with touchscreens, displays and fingerprint sensors.

About ZTE

ZTE Corporation is a globally-leading provider of telecommunications equipment and network solutions. With operations in 160 countries, the company is a leader in technology innovation, delivering superior products and business solutions to clients all over the world. Founded in 1985, ZTE is listed on both the Hong Kong and Shenzhen Stock Exchanges and is China’s largest listed telecoms equipment company. For more information, please visit www.ZTE.com.cn.

Related content

The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.

What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment (TEE) is an environment for executing code, in which those executing the code can have high levels of trust in that surrounding environment, because it can ignore threats from the rest of the device.

What is TrustZone?

Arm® TrustZone® technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich operating system, from a much smaller, secure operating system.

All Enterprise posts
Back to top