The ISV technology for OMAP 4 is aimed at leading smartphone developers, and associated development support will be available to target customers. This solution will be distributed to other possible markets such as consumer electronics, software-defined radio, and network security terminals.
“OMAP-enabled mobile devices put unprecedented computing power in the hands of users. This, in turn, requires the provisioning and management of secure virtualization platforms. In our search for solutions to complement the virtualization capabilities of TI’s OMAP 4 platform, we are looking for compact embedded hypervisors to preserve the performance of the processors powering mobile devices. We are achieving this goal while also leveraging TI’s M-Shield technology with INTEGRITY Secure Virtualization from Green Hills Software,” said Robert Tolbert, director of product management for TI’s OMAP Smartphone Business Line.
“By adding M-Shield’s security features, including TrustZone, cryptographic accelerators, and security storage code, along with multimedia, power management, and multi-core processing, OMAP 4 technology provides the ideal hardware platform to complement ISV’s secure, real-time, and high-performance operating environment,” said David Kleidermacher, Chief Technology Officer of Green Hills Software. “With OMAP 4, end users can rely on their mobile devices to deliver powerful next-generation features such as In-Person Proofing authentication, mobile monetization, sensitive information processing, and remote control of automotive functions.”
INTEGRITY Secure Virtualization for TrustZone Technology
INTEGRITY Secure Virtualization consists of certified INTEGRITY operating system technology coupled with features to optimally run and manage one or more guest operating systems on TrustZone-based systems-on-chips (SoCs). INTEGRITY Secure Virtualization also provides a communications interface that allows the normal zone to request services from the secure zone. This architecture allows security- and reliability-critical applications to run securely by ensuring the availability of memory and CPU timing resources, as well as access control to the embedded software, independent of what is happening in the normal zone.
The INTEGRITY RTOS uses its proven resource management and protection features, along with the ARM Memory Management Unit (MMU), to partition the secure area into “metazones.” This further reduces the certification time for specialized applications such as key management and wireless communications software, which must share the secure area with other critical components.
INTEGRITY Secure Virtualization offers several approaches to virtualization in ARM-based devices. INTEGRITY Secure Virtualization hosts an unmodified guest operating system (“full” virtualization) that leverages hardware features such as TrustZone, if present. ISVs also offer “paravirtualization” to optimize guest operating system performance in the absence of an accelerator processor or, in the case of hosting multiple guest operating systems on TrustZone-based SoCs, such as OMAP 4 application processors.
The largest software ecosystem
In addition to its security and reliability features, ISV comes with more than a decade of tools and an ecosystem of middleware to help chip makers develop and deploy their products faster. The INTEGRITY RTOS is supported by thousands of device drivers, network protocol stacks, file systems, Java virtual machines, and many other components—pre-integrated and ready to deploy.