1.Does the AM623 secure boot function to meet EN303645 requirement-Hardware root trust zone?
2. My company has signed an NDA with TI. Can you provide the relevant secure boot (eFuse) rel BSP SDK support and factory tools.
This thread has been locked.
If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.
1.Does the AM623 secure boot function to meet EN303645 requirement-Hardware root trust zone?
2. My company has signed an NDA with TI. Can you provide the relevant secure boot (eFuse) rel BSP SDK support and factory tools.
Hello,
We have AM62x security resouce download portal.
Please request access to the portal via the link
www.ti.com/.../swlicexportcontrol.tsp
Best,
-Hong
Hello Jesse,
Security compliance process is a complex one, and it depends on your overall system (HW/SW) design.
It is impossible for me to comment on "Yes/No" for your system to comply to "ETSI EN 303 645".
Best,
-Hong
Security compliance process is a complex one, and it depends on your overall system (HW/SW) design.
It is impossible for me to comment on "Yes/No" for your system to comply to "ETSI EN 303 645".
There is a technical article on E2E talked about secure boot.
Secure Boot on embedded Sitara processors (Rev. A) (ti.com.cn)
Base on this article, we expect AM62x family also support secure boot feature.
According to EN 303645, we have to ensure the SW integrity.
Is it possible to achieve this with TI secure boot?
Hi Hong,
From the security resource download portal, we got "AM64x Security Resources".
We have 2 questions about it:
1. Are the security resources for AM62x and AM64x the same?
2. We're using the AM62x SDK 8.06 and need to use the "OPT Keywriter package."
This package includes SR1.0 and SR2.0 versions. Which version should we use?
Best regards,
Andy