Capitalize consistently

Signed-off-by: Daniel Lublin <daniel@lublin.se>
This commit is contained in:
Daniel Lublin 2022-11-30 14:23:44 +01:00
parent 97c0a2152e
commit 726bbcd15c
No known key found for this signature in database
GPG Key ID: 75BD0FEB8D3E7830
2 changed files with 4 additions and 4 deletions

View File

@ -14,7 +14,7 @@ During the load operation, the device measures the application
it on the open hardware security processor. This measurement
is similar to [TCG DICE](https://trustedcomputinggroup.org/work-groups/dice-architectures/).
Each Tkey device contains a Unique Device Secret (UDS), which
Each TKey device contains a Unique Device Secret (UDS), which
together with the application measurement, and an optional
user-provided seed, is used to derive key material unique to each
application. This guarantees that if the integrity of the application
@ -26,12 +26,12 @@ load their own apps, while ensuring that each app loaded will have
its own cryptographic identity, and can also be used for authentication
towards different services.
The Tkey platform is based around a 32-bit RISC-V processor and has
The TKey platform is based around a 32-bit RISC-V processor and has
128 KB of RAM. The current firmware is designed to load an app that is
up to 100 KB in size, and gives it a stack of 28 KB. A smaller app may
move itself in memory to get larger continuous memory.
All of the Tkey software, firmware, FPGA Verilog source code, schematics
All of the TKey software, firmware, FPGA Verilog source code, schematics
and PCB design files are open source. Like all trustworthy security software
and hardware should be. This in itself makes it different, as other
security tokens utilize at least some closed source hardware for its

View File

@ -17,7 +17,7 @@ The KiCad board projects all follow this directory structure:
| /project/gerbers | PCB release files |
| /project/test | Scripts / gateware used for production tests |
### Tkey 1 (TK1)
### TKey 1 (TK1)
![](../../doc/images/mta1-usb-v1.jpg)