×

Hardware-based output protection of multiple video streams

  • US 8,393,008 B2
  • Filed: 05/21/2008
  • Issued: 03/05/2013
  • Est. Priority Date: 05/21/2008
  • Status: Active Grant
First Claim
Patent Images

1. One or more computer-storage memory having computer-executable instructions embodied thereon that, when executed, perform a method for providing hardware-based output protection of multiple video streams, the method comprising:

  • receiving streaming media from one or more media-reading devices;

    identifying portions of the streaming media as secure data;

    detecting a mode of encryption applied to the secure data;

    dynamically allocating a first region of memory to provide one or more protected source segments, wherein the one or more protected source segments are associated with streaming media from the one or more media-reading devices, respectively;

    identifying a protected source segment of the one or more protected source segments using the mode of encryption applied to the secure data;

    temporarily writing the secure data to the identified protected source segment;

    detecting one or more presentation devices;

    dynamically allocating a second region of memory to provide one or more protected target segments, wherein the one or more protected target segments are associated with the one or more presentation devices, respectively;

    identifying a protected target segment of the one or more protected target segments that uses a standard of output protection associated with a particular type of the one or more presentation devices;

    determining whether the mode of encryption and the standard of the output protection correspond based on, in part, whether a license attached to the mode of encryption is satisfied by a level of security attached to the standard of output protection;

    when the mode of encryption and the standard of the output protection are determined to correspond, mapping the identified protected source segment to the identified protected target segment via a hardware mapping scheme, wherein the hardware mapping scheme enables mapping the one or more protected source segments to the one or more protected target segments, respectively, according to whether modes of encryption associated with the one or more protected source segments correspond with standards of output protection associated with the one or more protected target segments;

    pushing the secure data from the identified protected source segment to the identified protected target segment according to the hardware mapping scheme; and

    evicting the secure data from the identified protected target segment to one or more presentation devices that are of the particular type.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×