Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Language

  • Bahasa Indonesia
  • Deutsch
  • English
  • Español
  • Français
  • Português
  • Tiếng Việt
  • ไทย
  • 한국어
  • 日本語
  • 简体中文
  • 繁體中文
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Emerald Rapids
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Intel® x86 Architecture Distribution of Trusty* OS

Overview

Trusty* is a set of software components that support a trusted execution environment (TEE) on client devices. It originated from the Android* Open Source Project (AOSP) where a reference implementation is provided based on the Arm TrustZone*.

Trusty TEE Overview

Intel® x86 Architecture Distribution of Trusty* OS is the hardware virtualization-based Trusty solution for x86 systems from Intel. It has a fully compatible design and maximum reuse of Trusty.

The complete environment includes:

  • The Trusty operating system that runs on a processor intended to provide a TEE
  • Services and APIs including a little kernel (LK)
  • Drivers for the Android kernel (a Linux* kernel)
  • Libraries for Android software and trusted applications
  • Intel® Kernel Guard Technology (Intel® KGT) hypervisor to create two virtual machines (VM) for Android and the Trusty operating system

Intel KGT on GitHub*

Trusty and the LK provide support for virtual address space and privilege isolation. They work in an event-driven model by the request from the Android world.

 

 

Solution: Two Virtual Machines

  • Trusted applications are isolated with Intel® Virtualization Technology (Intel® VT) for IA-32, Intel® 64 and Intel® Architecture (Intel® VT-x)
  • Intel provides a hardware abstraction layer, x86 adaptation layer, and virtual machine monitor (VMM)

Original equipment manufacturers (OEMs) can develop their own Android client applications and corresponding Trusty applications and services.

Architecture
Download on GitHub

  

Connect to the Team

Ask questions or share your thoughts.

Contact Us

 

open at intel logo

Explore the world of Intel’s open platform projects, contributions, community initiatives, and more at open.intel.com.

Explore

 

  • Overview
  • Connect
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Recycling
  • Your Privacy Choices California Consumer Privacy Act (CCPA) Opt-Out Icon
  • Notice at Collection

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration, and other factors. Learn more at intel.com/performanceindex. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding causing or contributing to adverse impacts on human rights. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to adverse impacts on human rights.

Intel Footer Logo