Delivering pay-TV class content security on a smart TV platform capable of supporting open applications is now a reality on the MeeGo operating system, according to a new white paper published by Amino Communications
Amino has used the MeeGo OS to support the world’s first hybrid/OTT service deployment by a tier one operator, and believes its real world OTT experience and innovation has given unique insights into the development of new security frameworks to protect content from piracy and malicious attack.
Until now, many industry experts have believed that this type of configuration can only be supported by using advanced and complex security measures. However, in the white paper entitled “MeeGo Security Concepts”, Amino has identified ways in which the security measures designed for mobile phone security within the MeeGo operating system can be adapted for the smart TV environment quickly and effectively without the additional costs associated with traditional content security measures.
The white paper presents a methodology which isolates the application inside MeeGo without requiring full virtualisation or sandboxing – the standard “heavyweight” means of securing content.
Amino’s Head of Strategy and Business Development, OTT, Kevin Lingley said: “People want to create app stores – as a way of improving the “stickiness” of TV-based services. We have designed a security framework within MeeGo that makes this a reality with the opportunity to bundle more services and create new kinds of entertainment experiences.
“Traditionally, people have delivered apps embedded into the core operating system with the security framework requiring re-certification of the platform with the addition of each new app. With MeeGo and its security framework, we have demonstrated that there is no need to recertify the platform.”
“With this ground breaking innovation, app stores can be created in the pay-TV environment safely, quickly and cost-effectively.”
By providing an integrated and unified security framework, MeeGo can also enable integrity and confidentiality – to implement CA systems in isolation from the application – limiting the risk of fragmentation in various implementations.