industry news
Subscribe Now

Elliptic Unveils Innovative tVault™ Security Architecture For Trusted Execution Environments

February 7, 2012 – Ottawa, Canada: Elliptic Technologies, a leading supplier of security semiconductor IP and software has introduced the tVault™ Security Architecture – a flagship technology that enables end-to-end security in connected devices.  tVault provides robust security inside Trusted Execution Environments (TEEs) and enforces the protection of sensitive information to ensure that it is stored, processed and accessed only by authorized applications. 

Individuals and enterprises are using a continually expanding array of intelligent connected devices.  From smartphones and tablets, to smart HDTVs, home theatre components and in-car infotainment systems, these devices are rapidly evolving to become essential communication and computing platforms and “lifestyle” devices in the era of the connected consumer.  This new rich ecosystem allows for numerous services and applications to run on these devices and offers users unparalleled opportunities to access content and to perform daily tasks.  With the rise in the multitude of connected devices and the value of the data stored on them, security has become a very critical component requiring priority attention.

“Robust security and content protection for connected devices are key elements for meeting the consumer’s desire for ubiquitous connectivity, streaming and sharing of content among multiple devices, from anywhere at any time,” said Vijay Dube, President and CEO of Elliptic Technologies.  “Security solutions from Elliptic based on our innovative tVault architecture have already garnered strong interest from Tier 1 chipset and device vendors.”

tVault enables highly secure environments that allow for a wide range of applications including Digital Rights Management (DRM) and content protection,  Over-The-Top (OTT) TV, mobile TV and electronic financial transactions to be deployed in high performance computing platforms.   tVault consists of firmware, standard APIs, hardware support and acceleration that runs efficiently in limited resource environments.   tVault integrates seamlessly within frameworks such as ARM TrustZone™ , where the critical security components are embedded in a trusted and secure OS environment.  The non-critical components are executed by the rich OS, such as Android.  tVault enables SoC vendors, OEMs, ODMs and network operators to rapidly bring products to market with robust, standards-compliant security.

Two of Elliptic’s most popular tVault solutions – tVault HDCP 2.1 and tVault DTCP-IP – are dedicated to content protection and are essential security technologies that allow consumers to enjoy high definition premium content anywhere and anytime, while safeguarding the rights of media producers to protect their investment in programming production.

Elliptic will demonstrate its tVault content protection solution at the Mobile World Congress 2012 in Barcelona, (Feb 27 – Mar 1) at booth #2A112 in Hall 2.0.  The demonstration will feature streaming video with tVault HDCP 2.1 on a fully featured 4G Android handset from one of the world’s leading manufacturers. 

About Elliptic Technologies

Elliptic Technologies is a leading provider of embedded security Intellectual Property including hardware cores and software to SoC manufacturers, OEMs, network operators and content providers. Elliptic’s highly integrated IP solutions help to secure products in markets such as mobile, networking infrastructure, home entertainment, smart grid and automotive.

Elliptic’s security IP cores enable designers to efficiently balance power, performance and silicon area. Elliptic is leading the world in DRM and content protection solutions for consumer electronics and home entertainment, including its DTCP-IP and HDCP SDKs built for Trusted Execution Environments. The company’s Platform Security solutions allow customers to implement secure, trusted platforms and networks, including secure boot, secure networking and product anti-cloning and anti-counterfeiting.

Elliptic’s security solutions are designed into some of the world’s most popular products shipping in millions of units. The company,founded in 2001, maintains headquarters in Ottawa, Canada, and has a worldwide customer base and sales channels. For more information please visit www.elliptictech.com.

Leave a Reply

featured blogs
Apr 18, 2024
Are you ready for a revolution in robotic technology (as opposed to a robotic revolution, of course)?...
Apr 18, 2024
See how Cisco accelerates library characterization and chip design with our cloud EDA tools, scaling access to SoC validation solutions and compute services.The post Cisco Accelerates Project Schedule by 66% Using Synopsys Cloud appeared first on Chip Design....
Apr 18, 2024
Analog Behavioral Modeling involves creating models that mimic a desired external circuit behavior at a block level rather than simply reproducing individual transistor characteristics. One of the significant benefits of using models is that they reduce the simulation time. V...

featured video

MaxLinear Integrates Analog & Digital Design in One Chip with Cadence 3D Solvers

Sponsored by Cadence Design Systems

MaxLinear has the unique capability of integrating analog and digital design on the same chip. Because of this, the team developed some interesting technology in the communication space. In the optical infrastructure domain, they created the first fully integrated 5nm CMOS PAM4 DSP. All their products solve critical communication and high-frequency analysis challenges.

Learn more about how MaxLinear is using Cadence’s Clarity 3D Solver and EMX Planar 3D Solver in their design process.

featured chalk talk

Non-Magnetic Interconnects
Sponsored by Mouser Electronics and Samtec
Magnets and magnetic fields can cause big problems in medical, scientific, industrial, space, and quantum computing applications but using a non-magnetic connector can help solve these issues. In this episode of Chalk Talk, Amelia Dalton and John Riley from Samtec discuss the construction of non-magnetic connectors and how you could use non-magnetic connectors in your next design.
May 3, 2023
39,708 views