Trusted Execution Environment Provisioning (TEEP) Architecture

The information below is for an old version of the document
Document Type None Internet-Draft (teep WG)
Last updated 2018-07-04
Stream IETF
Intended RFC status (None)
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None) (wg milestones: Mar 2018 - Adopt an Architectur..., Dec 2019 - Begin WGLC for Archi..., Apr 2020 - Progress Architectur... )
Document shepherd No shepherd assigned
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


A Trusted Execution Environment (TEE) was designed to provide a hardware-isolation mechanism to separate a regular operating system from security- sensitive applications. This architecture document motivates the design and standardization of a protocol for managing the lifecyle of trusted applications running inside a TEE.


Mingliang Pei (
Hannes Tschofenig (
Andrew Atyeo (
Dapeng Liu (

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)