Statements (78)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:software
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:Java_Enhancement_Proposal
|
gptkbp:allows |
secure boot
|
gptkbp:collaborated_with |
open-source projects
|
gptkbp:designed_by |
gptkb:CEO
|
gptkbp:developed_by |
gptkb:CEO
|
gptkbp:education_institution |
security best practices
|
gptkbp:enables |
secure communications
secure storage digital rights management secure execution environment |
gptkbp:enhances |
system security
|
gptkbp:facilitates |
digital rights management
secure boot |
https://www.w3.org/2000/01/rdf-schema#label |
ARM Trust Zone
|
gptkbp:integrates_with |
hypervisors
|
gptkbp:introduced |
AR Mv6 architecture
|
gptkbp:is_adopted_by |
automotive systems
major technology companies |
gptkbp:is_challenged_by |
side-channel attacks
malware threats physical attacks emulation attacks |
gptkbp:is_compatible_with |
gptkb:ARM_processors
various operating systems |
gptkbp:is_critical_for |
secure transactions
|
gptkbp:is_designed_for |
low-power devices
|
gptkbp:is_documented_in |
gptkb:ARM_architecture_reference_manuals
|
gptkbp:is_enhanced_by |
firmware updates
|
gptkbp:is_evaluated_by |
security audits
|
gptkbp:is_implemented_in |
gptkb:smartphone
system-on-chip (So C) designs |
gptkbp:is_integrated_with |
authentication protocols
encryption technologies secure boot mechanisms secure elements |
gptkbp:is_part_of |
gptkb:architect
gptkb:ARM_ecosystem gptkb:ARM_Cortex_processors trusted computing system on chip (So C) designs secure computing frameworks |
gptkbp:is_promoted_by |
developer conferences
ARM community |
gptkbp:is_related_to |
secure enclaves
secure elements hardware security modules (HS Ms) |
gptkbp:is_supported_by |
gptkb:document
industry standards software development kits (SD Ks) |
gptkbp:is_used_for |
identity protection
|
gptkbp:is_used_in |
gptkb:Io_T_devices
gptkb:smartphone embedded systems cloud computing environments |
gptkbp:is_utilized_in |
gptkb:financial_services_company
gptkb:smartphone gptkb:High_School identity management systems operating systems tablets access control systems automotive systems wearable devices network security solutions healthcare applications government applications data protection solutions application security solutions |
gptkbp:origin |
new security technologies
|
gptkbp:provides |
access control
secure storage hardware isolation secure world and normal world separation |
gptkbp:supports |
secure firmware updates
trusted applications |
gptkbp:used_in |
gptkb:smartphone
|