<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Bay Trail TXE for secure key wrapping in Embedded Intel Atom® Processors</title>
    <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269016#M3363</link>
    <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check &lt;A href="https://software.intel.com/en-us/blogs/2012/09/25/how-to-enable-an-intel-trusted-execution-technology-capable-server"&gt;https://software.intel.com/en-us/blogs/2012/09/25/how-to-enable-an-intel-trusted-execution-technology-capable-server&lt;/A&gt; How to Enable an Intel® Trusted Execution Technology Capable Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And make sure to enable TXT Technology in system configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will upload the Document Number: 515108 &lt;B&gt;Bay Trail T/I Platform, Manufacturing Recommendation for Intel® Trusted Execution Engine (Intel® TXE) Firmware, Guidelines and Recommendations &lt;/B&gt;to EDC Library, we will let you know as soon as the file is available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Mar 2015 18:05:53 GMT</pubDate>
    <dc:creator>Josue_C_Intel</dc:creator>
    <dc:date>2015-03-11T18:05:53Z</dc:date>
    <item>
      <title>Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269013#M3360</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking for a way to take advantage of the hardware root of trust provided by the TXE to securely store platform keys.  In the E3800 datasheet, under Section 22 titled "Intel Trusted Execution Engine (TXE)", "Chip Unique Key encryption key wrapping of other platform keys (Flash)" is listed as a supported feature by the firmware.  This is exactly what we need in our application.  However, we cannot find any documentation on how to enable this functionality.  I'm hoping that someone in this forum will be able to point me to the right direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had originally hoped to get this functionality via Intel PTT and TPM2.0.  However, in another thread, Josue helped me discover that the Bay Trail-I E3845 SoC does not actually support PTT over TXE.  So I'm back to asking this more fundamental question of just how to enable hardware key wrapping using TXE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Fred Young&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2015 20:42:03 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269013#M3360</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-09T20:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269014#M3361</link>
      <description>&lt;P&gt;Hi &lt;B&gt;Fred&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are working this case, we will let you know any update as soon as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2015 22:51:34 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269014#M3361</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-10T22:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269015#M3362</link>
      <description>&lt;P&gt;Hi Fred &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the current TXE firmware version installed on the system?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 16:10:26 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269015#M3362</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-11T16:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269016#M3363</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check &lt;A href="https://software.intel.com/en-us/blogs/2012/09/25/how-to-enable-an-intel-trusted-execution-technology-capable-server"&gt;https://software.intel.com/en-us/blogs/2012/09/25/how-to-enable-an-intel-trusted-execution-technology-capable-server&lt;/A&gt; How to Enable an Intel® Trusted Execution Technology Capable Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And make sure to enable TXT Technology in system configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will upload the Document Number: 515108 &lt;B&gt;Bay Trail T/I Platform, Manufacturing Recommendation for Intel® Trusted Execution Engine (Intel® TXE) Firmware, Guidelines and Recommendations &lt;/B&gt;to EDC Library, we will let you know as soon as the file is available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 18:05:53 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269016#M3363</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-11T18:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269017#M3364</link>
      <description>&lt;P&gt;Hi!  I see 515108 is already on the EDC. It can be found typing 515108 in the search box or here is the URL: &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-t-i-manufacturing-rec-txe-firmware.html?wapkw=515108"&gt;https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-t-i-manufacturing-rec-txe-firmware.html?wapkw=515108&lt;/A&gt; &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-t-i-manufacturing"&gt;https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-t-i-manufacturing&lt;/A&gt;… This document is classified as "Intel Confidential."&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2015 18:10:33 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269017#M3364</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-11T18:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269018#M3365</link>
      <description>&lt;P&gt;Hi Josue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the TXE firmware version; we've tried version 1.0.2.1067 from BAY_TRAIL_FSP_KIT_GOLD3.tgz and version 1.1.0.1089 from 543843_BYT_I_DUAL_BOOT_TXE_KIT_GOLD_RELEASE_1.1.0.1089.tar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fred Young&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 16:40:56 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269018#M3365</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-12T16:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269019#M3366</link>
      <description>&lt;P&gt;Hi Josue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think TXT applies to Bay Trail SoCs. Also, we already have document 515108_ByTti_TXEMfgRecomm_Rev1p2.pdf; that just tells us how to use the manufacturing tools but not about how to accomplish key wrapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Fred Young&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 18:23:31 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269019#M3366</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-16T18:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269020#M3367</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have found Document # 543572 Intel® TXE Slim FW and tools for Intel® Atom™ Processor, E3800 (Bay Trail-I) Product Family.  &lt;/P&gt;&lt;P&gt;From section 2.5 Intel® TXE Setting Checker Tool. &lt;I&gt;&lt;B&gt;This tool retrieves and displays information about some of the Intel® TXE settings, the Intel® TXE FW version, and the FW capability on the platform.&lt;/B&gt;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;From section 6 Intel® TXEInfo. &lt;B&gt;&lt;I&gt;This tool Intel TXEInfo provide a simple test to check whether the Intel® TXE FW is alive or not.&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will let you know as soon as the tool is available in EDC Library.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 22:25:06 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269020#M3367</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-16T22:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269021#M3368</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While we're waiting for 543572 to be uploaded you may find document # 527101 helpful .&lt;/P&gt;&lt;P&gt;&lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-m-d-i-soc-linux-txe-firmware-guide.html"&gt;https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-m-d-i-soc-linux-txe-firmware-guide.html&lt;/A&gt; Intel® Atom™ Processor E3800 Product Family/ Intel® Celeron® Processor N2920/J1900– Linux System Tools for Intel® Trusted Execution Engine Firmware&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-m-d-i-soc-linux-txe-firmware-guide.html"&gt;https://www-ssl.intel.com/content/www/us/en/secure/intelligent-systems/privileged/bay-trail/atom-e3800-m-d-i-soc-linux-txe-firmware-guide.html&lt;/A&gt; User Guide&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2015 23:20:00 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269021#M3368</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-16T23:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269022#M3369</link>
      <description>&lt;P&gt;Hi Josue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We understand that Bay Trail E3845 (Bay Trail I) has a number of Field programmable fuses that can be set by certain tools provided by Intel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Intel Trusted Execution Engine Bring-Up Guide, 515108_ByTti_TXEMfgRecomm_Rev1p2.pdf,  lists the "Fuse file IDs" that can be specified in the FPF configuration file, for example, OEM_KEY_HASH_1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We would like to know if there are unused fuses in Bay Trail that could be used to store other OEM-specific information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Fred Young&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2015 23:09:16 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269022#M3369</guid>
      <dc:creator>FYoun1</dc:creator>
      <dc:date>2015-03-18T23:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269023#M3370</link>
      <description>&lt;P&gt;Hi Fred&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Document &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-slim-fw-and-tools.html"&gt;https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-slim-fw-and-tools.html&lt;/A&gt; # 543572 Intel® TXE Slim FW and tools for Intel® Atom™ Processor, &lt;A href="https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-slim-fw-and-tools.html"&gt;https://www-ssl.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-txe-slim-fw-and-tools.html&lt;/A&gt; E3800 (Bay Trail-I) Product Family is now available in EDC Library.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We still working in your thread, please stay tuned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2015 17:32:51 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269023#M3370</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-20T17:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269024#M3371</link>
      <description>&lt;P&gt;FYI, FredYoung - we added a user guide   to the EDC, &lt;A href="http://www.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-m-d-t-soc-txe-firmware-guide.html"&gt;http://www.intel.com/content/www/us/en/secure/embedded/nda/products/bay-trail/atom-e3800-m-d-t-soc-txe-firmware-guide.html&lt;/A&gt; Bay Trail-M/D/T SoC - System Tools for Intel® Trusted Execution Engine Firmware.  It is classified as Intel Confidential.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2015 18:57:39 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269024#M3371</guid>
      <dc:creator>Natalie_Z_Intel</dc:creator>
      <dc:date>2015-03-20T18:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using Bay Trail TXE for secure key wrapping</title>
      <link>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269025#M3372</link>
      <description>&lt;P&gt;Hello Fred Young&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no reference to additional fuses that could be used to store other OEM-specific information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in section 2.1.7 FPF Programming &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;"This fuse is one time programmable inside Bay Trail SoC ... and should not be change after manufacturing and shipment."&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Josue.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2015 17:37:26 GMT</pubDate>
      <guid>https://community.intel.com/t5/Embedded-Intel-Atom-Processors/Using-Bay-Trail-TXE-for-secure-key-wrapping/m-p/269025#M3372</guid>
      <dc:creator>Josue_C_Intel</dc:creator>
      <dc:date>2015-03-23T17:37:26Z</dc:date>
    </item>
  </channel>
</rss>

