PC Secure Video Path
First Claim
1. A media method, comprising:
- detecting, by a computing device, insertion of a security module and in response thereto establishing a secure tunnel between the security module and a secure video processor of the computing device;
generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device;
receiving an authentication in response to the key request message and supplying the authentication to the security module via the secure tunnel, wherein the authentication comprises a key response message comprising one or more keys associated with an authentication proxy;
sending, by the computing device and to the authentication proxy, a client sign-on request identifying the security module; and
using the security module and the secure video processor to process secured content for presentation to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer'"'"'s network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
-
Citations
1 Claim
-
1. A media method, comprising:
-
detecting, by a computing device, insertion of a security module and in response thereto establishing a secure tunnel between the security module and a secure video processor of the computing device; generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device; receiving an authentication in response to the key request message and supplying the authentication to the security module via the secure tunnel, wherein the authentication comprises a key response message comprising one or more keys associated with an authentication proxy; sending, by the computing device and to the authentication proxy, a client sign-on request identifying the security module; and using the security module and the secure video processor to process secured content for presentation to a user.
-
Specification