NTT DoCoMo, Intel and IBM released a new security specification called "Trusted Mobile Platform." The companies say this specification can help make advanced mobile-commerce services such as electronic tickets and e-wallets for online purchases more secure and help protect against viruses and other software attacks.
Trusted Mobile Platform has defined a set of hardware and software components that can be constructed to build devices offering different levels of security. Trusted Mobile Platform builds on well established, strong security techniques and applies them to the hardware and software architectures to define a trusted execution environment that protects the device both at boot time and during runtime.
These components function together to limit the potential damage from malicious applications and to enable a rich set of security services. In addition, Trusted Mobile Platform has defined a protocol that allows the security state of a device to be shared with other devices in the network, enabling device level trust to be extended into the larger network.
"The Trusted Mobile Platform provides a new foundation for mobile devices," said Takanori Utano, executive vice president and chief technology officer of NTT DoCoMo, Inc. "The goal of our joint research was to provide an open and secure architecture, for future wireless data services."
"Mobile security is more than just protecting against new viruses, worms and attacks, it's about protecting critical business assets and information," said Alistair Rennie, vice president, Sales and Marketing, IBM Pervasive Computing. "IBM is working to bring security specifications, such as the Trusted Mobile Platform, to standards bodies, with the hope security will become more embedded across a broad range of business systems."
The Trusted Mobile Platform specification incorporates the latest security technologies and controls. Through tamper-resistant modules and by enabling domain separation, a trusted platform will be able to protect data from potential viruses spreading from one application to the next. In addition, the authorization and management protocols provide companies with higher levels of security for wireless delivery of new software to employees.