Device Security

Devices are secured in a variety of ways through the use of the TEE. Different applications and end users use different security features all enabled by the TEE.

Secure storage of data outside the host OS

  • Stores private keys
  • Templates for making matches
  • Configuration for policies to be used

Isolated processing of keys in isolation for other activities

  • Keeping private keys away from malware

Protected execution of policies

  • Enabling the implementation of policies specific to the use case and the required access rights

Secured input and output of data

  • Keeps secure and PINs, secures the display and enables the secure use of finger print and other biometric recognition

Connect with us