Statements (58)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:football_club
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Qualcomm_Snapdragon_810_Plus
|
gptkbp:enhances |
security of cryptographic operations
|
gptkbp:features |
gptkb:Io_T_devices
gptkb:smartphone laptops tablets biometric authentication systems secure mobile payment systems |
https://www.w3.org/2000/01/rdf-schema#label |
Hardware-backed Keystore
|
gptkbp:is_a_solution_for |
data protection
identity protection secure communications |
gptkbp:is_accessible_by |
API calls
|
gptkbp:is_compatible_with |
gptkb:FIPS_140-2
gptkb:Common_Criteria |
gptkbp:is_designed_for |
high security applications
|
gptkbp:is_designed_to |
prevent unauthorized access
ensure data integrity ensure confidentiality |
gptkbp:is_implemented_in |
gptkb:CEO
gptkb:operating_system |
gptkbp:is_integrated_with |
operating systems
|
gptkbp:is_maintained_by |
device manufacturers
|
gptkbp:is_part_of |
gptkb:trusted_execution_environment_(TEE)
cryptographic protocols secure application development secure firmware updates secure cloud services secure messaging systems secure network communications secure boot process secure data storage solutions device security architecture secure file storage systems secure key exchange mechanisms |
gptkbp:is_protected_by |
physical attacks
|
gptkbp:is_used_by |
gptkb:mobile_application
|
gptkbp:is_used_for |
encryption
digital signatures decryption |
gptkbp:is_used_in |
gptkb:smartphone
enterprise applications government applications |
gptkbp:is_vulnerable_to |
physical extraction
software attacks |
gptkbp:provides |
secure storage for cryptographic keys
|
gptkbp:requires |
gptkb:computer
certain compliance standards |
gptkbp:storage |
certificates
symmetric keys asymmetric keys |
gptkbp:supports |
key management
key generation key storage |
gptkbp:updates |
firmware updates
|
gptkbp:uses |
gptkb:hardware_security_module_(HSM)
|