The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "Secure Enclave"
m |
(Redirected page to Secure Enclave Processor) (Tag: New redirect) |
||
(7 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
+ | #REDIRECT [[Secure Enclave Processor]] |
||
− | The '''Secure Enclave''' is part of the [[A7]] and [[A8]] chips used for [[Touch ID]]. Within the Secure Enclave, the fingerprint data is stored in an encrypted form which - according to Apple - can only be decrypted by a key available by the Secure Enclave thus making fingerprint data walled off from the rest of A7 Chip and as well as the rest of iOS. The secure enclave itself is a flashable 4MB processor called the secure enclave processor (SEP) as documented in [http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PG01&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.html&r=1&f=G&l=50&s1=%2220130308838%22.PGNR.&OS=DN/20130308838&RS=DN/20130308838 Apple Patent Application 20130308838]. The technology used is essentially [http://www.arm.com/products/processors/technologies/trustzone/index.php ARM's TrustZone/SecurCore]. |
||
− | |||
− | The SEP is located in the devicetree under IODeviceTree:/arm-io/sep and manged by the AppleSEPManager driver as seen [http://winocm.com/images/ioregdump.txt here] |
||
− | |||
− | ==SEP OS== |
||
− | |||
− | The SEP has its own OS called SEP OS and there exists a tool called [[seputil]] which is used to communicate with it. |
||
− | |||
− | ==Further References== |
||
− | |||
− | [http://www.forbes.com/sites/quora/2013/09/18/what-is-apples-new-secure-enclave-and-why-is-it-important/ www.forbes.com] |
Latest revision as of 07:24, 7 March 2020
Redirect to: