PC secure video path
First Claim
Patent Images
1. A method comprising:
- establishing, by a computing device connected with a security module, a secure tunnel between the computing device and the security module;
receiving, by the computing device, a user selection of a content item;
after determining that the content item is secured, sending, by the computing device;
a request for the content item,an identifier of the computing device, andan identifier of the security module;
receiving, by the computing device, from the security module, and via the secure tunnel, one or more control words;
receiving, by the computing device, an encrypted stream comprising the content item;
decrypting, by the computing device and using the one or more control words, the encrypted stream comprising the content item;
prior to the decrypting the encrypted stream, routing, by the computing device, the encrypted stream to a secure video processor of the computing device;
after the decrypting the encrypted stream, routing, by the computing device, an unencrypted version of the encrypted stream from the secure video processor to an unsecure video processor of the computing device; and
causing, by the unsecure video processor, display of the content item.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer'"'"'s network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
23 Citations
20 Claims
-
1. A method comprising:
-
establishing, by a computing device connected with a security module, a secure tunnel between the computing device and the security module; receiving, by the computing device, a user selection of a content item; after determining that the content item is secured, sending, by the computing device; a request for the content item, an identifier of the computing device, and an identifier of the security module; receiving, by the computing device, from the security module, and via the secure tunnel, one or more control words; receiving, by the computing device, an encrypted stream comprising the content item; decrypting, by the computing device and using the one or more control words, the encrypted stream comprising the content item; prior to the decrypting the encrypted stream, routing, by the computing device, the encrypted stream to a secure video processor of the computing device; after the decrypting the encrypted stream, routing, by the computing device, an unencrypted version of the encrypted stream from the secure video processor to an unsecure video processor of the computing device; and causing, by the unsecure video processor, display of the content item. - View Dependent Claims (2, 3, 4, 5, 6, 12, 13, 14, 15, 16)
-
-
7. A method comprising:
-
establishing, by a computing device connected with a security module, a secure tunnel between the computing device and the security module; sending, by the computing device; a request for a content item, an identifier of the computing device, and an identifier of the security module; receiving, by the computing device, from the security module, and via the secure tunnel, a first control word and a second control word different from the first control word; receiving, by the computing device, an encrypted stream comprising the content item; decrypting, by the computing device and using the first control word, an audio portion of the encrypted stream; decrypting, by the computing device and using the second control word, a video portion of the encrypted stream; prior to decrypting the audio portion and the video portion of the encrypted stream, routing, by the computing device, the encrypted stream to a secure video processor of the computing device; after decrypting the audio portion and the video portion of the encrypted stream, routing, by the computing device, an unencrypted version of the encrypted stream from the secure video processor to an unsecure video processor of the computing device; and causing, by the unsecure video processor, display of the content item. - View Dependent Claims (8, 9, 10, 11, 17, 18, 19, 20)
-
Specification