PC Secure Video Path
First Claim
1. A media method, comprising:
- using parallel media paths in a computing device to process content, the parallel media paths including a secure media path with a secure video processor configured for handling secured content, and an unsecured media path configured for handling unsecured content;
using a portable key module to supply different content decryption keys from the portable key module to the secure media path for different pieces of secured media content;
using a secure tunnel between the portable key module and the secure video processor to transfer the content decryption keys; and
generating an authentication request that includes an identification of the portable key module, and an identification of the secure video processor.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer'"'"'s network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
-
Citations
20 Claims
-
1. A media method, comprising:
-
using parallel media paths in a computing device to process content, the parallel media paths including a secure media path with a secure video processor configured for handling secured content, and an unsecured media path configured for handling unsecured content; using a portable key module to supply different content decryption keys from the portable key module to the secure media path for different pieces of secured media content; using a secure tunnel between the portable key module and the secure video processor to transfer the content decryption keys; and generating an authentication request that includes an identification of the portable key module, and an identification of the secure video processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computing device, comprising:
-
parallel media paths configured to process content, wherein a first one of the paths includes a secure video processor configured to handle encrypted video content, and wherein a second one of the paths includes an unsecured video processor configured to handle unencrypted video content; and a portable key module interface, wherein the secure video processor is further configured to use a secure tunnel to obtain a portable key module identification and content decryption keys from a portable key module via the portable key module interface; and a computing device processor configured to deliver an authentication request that includes the portable key module identification and an identification of the secure video processor from the portable key module interface to an external network interface. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A portable module, comprising:
-
an interface configured to be communicatively coupled to a computing device; and a module processor, configured to; generate an authentication request identifying the portable module and a video processor of the computing device, and to use communication resources of the computing device to transmit the authentication request to an external network; and receive different content decryption keys for different pieces of encrypted content, and supply the keys to the video processor of the computing device using a secure tunnel between the module processor and the video processor of the computing device. - View Dependent Claims (18, 19, 20)
-
Specification