PC Secure Video Path
First Claim
1. A media method, comprising:
- detecting, by a computing device, insertion of a security module and establishing a secure tunnel between the security module and a secure video processor of the computing device;
generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of a secure video processor of the computing device;
receiving an authentication in response to the key request message and supplying the response to the security module via the secure tunnel; and
using the security module and secure video processor to process secured content for presentation to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer'"'"'s network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
13 Citations
20 Claims
-
1. A media method, comprising:
-
detecting, by a computing device, insertion of a security module and establishing a secure tunnel between the security module and a secure video processor of the computing device; generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of a secure video processor of the computing device; receiving an authentication in response to the key request message and supplying the response to the security module via the secure tunnel; and using the security module and secure video processor to process secured content for presentation to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
in response to insertion of a security module into a computing device, the security module establishing a secure tunnel between the security module and a secure video processor of the computing device; requesting, by the security module, that the computing device transmit a key request message comprising an identification of the security module and an identification of a secure video processor of the computing device; receiving, by the security module, a response to the key request message; extracting a control word key from the response; and transmitting the control word key from the security module to the secure video processor via the secure tunnel. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A media method, comprising:
-
generating, by a computing device, an identification of a secure video processor of the computing device and a key request message comprising an identification of a separable security module; supplying authentication data responsive to the key request message to the separable security module via a secure tunnel; and using the security module and secure video processor to process secured content for presentation to a user.
-
Specification