UNISOC

UNISOC Joins Android Ready SE Alliance

UNISOC says it considers digital security protection from the initial design of the chip

Last updated:

UNISOC has joined Google’s new Android Ready SE Alliance, a collaboration between Google and Secure Element (SE) vendors, to offer a growing list of open-source, validated, and ready-to-use SE Applets for new and emerging use cases such as digital keys, identity credentials, E-money solutions.

The alliance was created to make discrete tamper resistant hardware backed security the lowest common denominator for the Android ecosystem, which makes emerging applications on smart terminals more secure and convenient.

UNISOC has a range of complete security solutions from chip to software. Joining the Android Ready SE Alliance can give full play to the advantages of UNISOC’s integrated software and hardware security solutions to further improve digital security protection for smart terminals.

“UNISOC aspires to deliver secure solutions to the Android ecosystem. With the rapid development of mobile Internet, the tamper-resistant secure element is becoming indispensable requirement in Android devices.” said Xiaofei Xia, Marketing SVP, UNISOC.

The development of digital technologies such as mobile Internet, big data, cloud computing, and smart terminals has accelerated the advent of the digital world and made the protection of digital security more complex and changeable.

UNISOC says it considers digital security protection from the initial design of the chip, integrates different security specifications and requirements according to different usage scenarios, supports international mainstream algorithms and secret keys for enhanced protection, and is in line with the industry.

OEMs that are part of the Android Ready SE Alliance must meet the following requirements:

  1. Pick the appropriate, validated hardware part from their SE vendor
  2. Enable SE to be initialized from the bootloader and provision the root-of-trust (RoT) parameters through the SPI interface or cryptographic binding
  3. Work with Google to provision Attestation Keys/Certificates in the SE factory
  4. Use the GA version of the StrongBox for the SE applet, adapted to your SE
  5. Integrate HAL code
  6. Enable an SE upgrade mechanism
  7. Run CTS/VTS tests for StrongBox to verify that the integration is done correctly

My Cart Close (×)

Your cart is empty
Browse Shop

Rapid Mobile

Rapid Mobile uses cookies, tokens, and other third party scripts to recognise visitors of our sites and services, remember your settings and privacy choices, and - depending on your settings and privacy choices - enable us and some key partners to collect information about you so that we can improve our services and deliver relevant ads.

 

By continuing to use our site or clicking I Accept, you agree that Rapid Mobile and our key partners may collect data and use cookies for personalised ads and other purposes, as described more fully in our privacy policy.

 

You can change your settings at any time by clicking Manage Settings or by visiting our Privacy Centre for more detailed information.

 

Privacy Settings saved!
Cookie Services

We need your consent so that we and our trusted partners can store and access cookies, unique identifiers, personal data and information about your browsing behaviour on your device. This enables us to serve relevant content and advertising to you, and to improve the service that we provide to our readers. This only applies to rapidmobile.biz.Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer.

These cookies allow us to count visits and traffic sources, so we can measure and improve the performance of our site.

We track anonymized user information to improve our website.
  • _ga
  • _gid
  • _gat

Save my preferences