Method and apparatus for securing computer video and audio subsystems
First Claim
Patent Images
1. A computing device comprising:
- a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and
a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, andwherein the video output further includes video data produced by an associated video input device, andwherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, andwherein the analytics comprise a biometric authentication application that is adapted to determine whether a user of the computing device is authorized to use the computing device based on analysis of the video data, andwherein the secure subsystem is adapted to prevent use of the computing device by the user if the biometric authentication application determines that the user is not authorized to use the computing device, andwherein the secure subsystem is adapted to prevent use of the computing device by the unauthorized user by shutting down the computing device, andwherein the secure subsystem is adapted to shut down the computing device after the user determined by the biometric authentication application to be unauthorized has been present in the video data for a threshold amount of time.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, embodiments of the invention include methods and apparatuses for securing otherwise unsecured computer audio and video subsystems. Embodiments of the invention perform watermarking of video and/or audio data streams output by a computer system. Additional security features that are included in embodiments of the invention include fingerprinting, snooping, capturing streams for local or remote analytics or archiving, and mixing of secure system content with local audio and video content.
-
Citations
15 Claims
-
1. A computing device comprising:
-
a host processor subsystem including a CPU and a video subsystem for producing a video output for playback and display on an associated video output device, wherein the video output includes first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and a secure subsystem that receives the video output from the host processor subsystem and controls an actual playback and display of the video output on the associated video output device, wherein the control includes selectively passing the first stream from the host processor to the video output device unchanged, and performing processing on content of the second stream before passing the second stream to the video output device, and wherein the video output further includes video data produced by an associated video input device, and wherein the secure subsystem performs analytics on the video data produced by the associated video input device and output from the host processing subsystem, and wherein the analytics comprise a biometric authentication application that is adapted to determine whether a user of the computing device is authorized to use the computing device based on analysis of the video data, and wherein the secure subsystem is adapted to prevent use of the computing device by the user if the biometric authentication application determines that the user is not authorized to use the computing device, and wherein the secure subsystem is adapted to prevent use of the computing device by the unauthorized user by shutting down the computing device, and wherein the secure subsystem is adapted to shut down the computing device after the user determined by the biometric authentication application to be unauthorized has been present in the video data for a threshold amount of time. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
producing, by a host processor subsystem including a CPU and an audio and video subsystem, audio and video outputs for playback and display on associated audio and video output devices, wherein the audio and video outputs include first and second different streams produced by an operating system and application software running on the CPU of the host processor subsystem; and controlling, by a secure audio and video subsystem that receives the audio and video outputs from the host processor subsystem, an actual playback and display of the audio and video outputs on the associated audio and video output devices, wherein controlling includes passing the first stream from the host processor to one or both of the audio and video output devices unchanged, and performing processing on the content of the second stream before passing the second stream to one or both of the audio and video output devices, and wherein the audio and video outputs further include one or both of audio and video data produced by associated audio and video input devices, respectively, and wherein the associated audio and video input devices include one or more of a microphone, a still camera, a video camera, and an audio Line In, and wherein performing processing includes performing analytics on one or more of the audio and video outputs from the host processing subsystem, and wherein the analytics comprise a biometric authentication application, and wherein performing processing further includes performing video overlay of one or more video streams not produced by the host processor subsystem in the actual display and playback. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification