Protection of DVB Systems by Trusted Computing
نویسندگان
چکیده
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trusted platform module (TPM) into the set-top-box or residential home gateway. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO), or other
منابع مشابه
Trusted Computing in DVB Architectures
We describe a concept to employ Trusted Computing technology to secure Conditional Access Systems (CAS) for DVB. Central is the embedding of a trust anchor, e.g. a trusted platform module (TPM) into the set-top box or Conditional Access Module. Various deployment scenarios exhibit possibilities of charging co-operation with mobile network operators (MNO) via trusted mobile devices, or with othe...
متن کاملTrusted-Computing Technologies for the Protection of Critical Information Systems
† This paper is an extended version of the paper by the same title that appeared in the proceedings of the CISIS’08 conference. Abstract: Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing ...
متن کاملImproved Channel Estimation for DVB-T2 Systems by Utilizing Side Information on OFDM Sparse Channel Estimation
The second generation of digital video broadcasting (DVB-T2) standard utilizes orthogonal frequency division multiplexing (OFDM) system to reduce and to compensate the channel effects by utilizing its estimation. Since wireless channels are inherently sparse, it is possible to utilize sparse representation (SR) methods to estimate the channel. In addition to sparsity feature of the channel, the...
متن کاملModeling TCG-Based Secure Systems with Colored Petri Nets
With the rapid progresses in trusted computing related research and application, many trusted computing based security mechanisms have been proposed to defend against threats in open, dynamic and distributed environments. These mechanisms are supposed to serve as the security foundations in the underlying systems. However, the correctness of these security mechanisms still require further exami...
متن کاملCombining DRM with Trusted Computing for Effective Information Access Management
In this paper we used Digital Rights Management (DRM) associated with Trusted Computing to enforce a contentspecific fine-grained access control policy defined by content owner. This policy is associated with content, and when content is copied its access control policy is copied and bound to the target copy. This paper presents a generic approach for content protection utilising both DRM and T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/cs/0702086 شماره
صفحات -
تاریخ انتشار 2007