2.3.4. Performance and Power
[ 8.1 /T-0-1] Consistent frame latency . Inconsistent frame latency or a delay to render
frames MUST NOT happen more often than 5 frames in a second, and SHOULD be below 1
frames in a second.
[ 8.2 /T-0-1] MUST ensure a sequential write performance of at least 5MB/s.
[ 8.2 /T-0-2] MUST ensure a random write performance of at least 0.5MB/s.
[ 8.2 /T-0-3] MUST ensure a sequential read performance of at least 15MB/s.
[ 8.2 /T-0-4] MUST ensure a random read performance of at least 3.5MB/s.
If Television device implementations include features to improve device power management that are
included in AOSP or extend the features that are included in AOSP, they:
[ 8.3 /T-1-1] MUST provide user affordance to enable and disable the battery saver feature.
If Television device implementations do not have a battery they:
[ 8.3 /T-1-2] MUST register the device as a batteryless device as described in Supporting
Batteryless Devices .
If Television device implementations have a battery they:
[ 8.3 /T-1-3] MUST provide user affordance to display all apps that are exempted from App
Standby and Doze power-saving modes.
Television device implementations:
[ 8.4 /T-0-1] MUST provide a per-component power profile that defines the current
consumption value for each hardware component and the approximate battery drain
caused by the components over time as documented in the Android Open Source Project
site.
[ 8.4 /T-0-2] MUST report all power consumption values in milliampere hours (mAh).
[ 8.4 /T-0-3] MUST report CPU power consumption per each process's UID. The Android
Open Source Project meets the requirement through the uid_cputime kernel module
implementation.
[ 8.4 /T] SHOULD be attributed to the hardware component itself if unable to attribute
hardware component power usage to an application.
[ 8.4 /T-0-4] MUST make this power usage available via the adbshelldumpsys
batterystats shell command to the app developer.
2.3.5. Security Model
Television device implementations:
[ 9.11 /T-0-1] MUST back up the keystore implementation with an isolated execution
environment.
[ 9.11 /T-0-2] MUST have implementations of RSA, AES, ECDSA and HMAC cryptographic
algorithms and MD5, SHA1, and SHA-2 family hash functions to properly support the
Android Keystore system's supported algorithms in an area that is securely isolated from
the code running on the kernel and above. Secure isolation MUST block all potential
mechanisms by which kernel or userspace code might access the internal state of the
isolated environment, including DMA. The upstream Android Open Source Project (AOSP)
meets this requirement by using the Trusty implementation, but another ARM TrustZone-
based solution or a third-party reviewed secure implementation of a proper hypervisor-
based isolation are alternative options.
[ 9.11 /T-0-3] MUST perform the lock screen authentication in the isolated execution
environment and only when successful, allow the authentication-bound keys to be used.
Lock screen credentials MUST be stored in a way that allows only the isolated execution
environment to perform lock screen authentication. The upstream Android Open Source
Project provides the Gatekeeper Hardware Abstraction Layer (HAL) and Trusty, which can
be used to satisfy this requirement.
[ 9.11 /T-0-4] MUST support key attestation where the attestation signing key is protected
by secure hardware and signing is performed in secure hardware. The attestation signing
keys MUST be shared across large enough number of devices to prevent the keys from