Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

Eimear Gallery, Allan Tomlinson, Rob Delicata

Research output: Working paper


This paper addresses the problem of configuring mobile devices to receive broadcast services protected by legacy conditional access systems. The protocols apply the concepts of trusted computing to allow a mobile host to demonstrate that it is secure, before any application or associated keys are securely downloaded. Thus the protocols are applicable anywhere a secure download is required. A general analysis of the security of the protocols is presented, followed by the results of formal verification.
Original languageUndefined/Unknown
Publication statusUnpublished - 1 Jun 2005

Cite this