Created date

Noviembre 10, 2016

Content type (localized)

Blog

Share

Security is not a feature but rather a process. Security consists of many components and layers. These include robustness attributes of chipsets, device identity and certificates, secure protocols, etc. But one fundamental component is often neglected: secure download of trusted applications and the ability to upgrade them quickly and on demand.

Created date

Octubre 11, 2016

Content type (localized)

Blog

Share

When I presented at the TEE Conference two years ago, I was optimistic over the prospect of harnessing the TEE to protect UHD content in particular, speculating on the challenges and how they would be met. 

Created date

Septiembre 30, 2014

Content type (localized)

Blog

Share

Ensuring revenue security can be quite a complex undertaking for global pay-TV operators. However, leveraging a variety of hardware security methods – including the use of a Trusted Execution Environment (TEE) – can support the fundamental requirements of any security strategy: durability and renewability.