Page 1 of 1

OTrP from the inside

Posted: Thu Feb 13, 2025 4:14 am
by relemedf5w023
2. Create a new market niche related to the provision of a service for issuing certificates to provide various applications with access to device resources. As a result, several issuers of authorization certificates should appear, which will compete with each other.

3. The protocol should be open, which will allow third-party developers to create their own client or server-type solutions. This will create a new market for application developments.

The purpose of OTrP is to add a new level of senegal whatsapp data on top of the PKI public key service. Given that trusted applications require a Trusted Execution Environment (TEE), the creation of a new protocol allows for an increased level of security for the systems being used, making their operation more reliable by physically separating the processing of regular system messages on connected devices from support for application traffic that has higher security requirements.

In real life, there is a wide variety of connected devices. Each of them will require its own Trusted Service Manager (TSM). It will be responsible for working with public keys, creating a domain zone for secure calculations, supporting the operation of resource authentication mechanisms and application loading.

The OTrP coverage area is between the TSM service and the TEE device. It uses various security mechanisms that service point-to-point connections: JSON Web Encryption (JWE), JSON Web Signature (JWS), JSON Web Key (JWK). All of these mechanisms are recommended by one of the main Internet standardization institutions, the IETF Engineering Board.

In order for a connected device to be able to create a secure TEE environment with OTrP support, it must be provided with a pair of unique keys - public and private. These keys act as a basic element of trust. Using them, service providers will be able to allow this device to launch trusted applications (TA).