@techreport{ietf-teep-protocol-26, number = {draft-ietf-teep-protocol-26}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-teep-protocol/26/}, author = {Hannes Tschofenig and Mingliang Pei and Dave Wheeler and Dave Thaler and Akira Tsukamoto}, title = {{Trusted Execution Environment Provisioning (TEEP) Protocol}}, pagetotal = 89, year = 2026, month = feb, day = 26, abstract = {This document specifies the Trusted Execution Environment Provisioning (TEEP) Protocol, which enables secure lifecycle management of Trusted Components in devices with a Trusted Execution Environment (TEE). The protocol defines message exchanges between a Trusted Application Manager (TAM) and a TEEP Agent to query device state, convey attestation evidence, and install, update, or delete Trusted Components. Messages are encoded in CBOR and secured using COSE.}, }