PC secure video path
First Claim
Patent Images
1. A media method, comprising:
- detecting, by a computing device, insertion of a security module and in response thereto establishing a secure tunnel between the security module and a secure video processor of the computing device;
generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device;
receiving an authentication in response to the key request message and supplying the authentication to the security module via the secure tunnel, wherein the authentication comprises a key response message comprising one or more keys associated with an authentication proxy;
sending, by the computing device and to the authentication proxy, a client sign-on request identifying the security module; and
using the security module and the secure video processor to process secured content for presentation to a user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content. The security module may establish a secure encrypted link with a secure video processor of the personal computer, and may use the personal computer'"'"'s network interface to request authority to receive secured content. The security module may provide content keys to the secure video processor to access secured content received over an external network.
-
Citations
20 Claims
-
1. A media method, comprising:
-
detecting, by a computing device, insertion of a security module and in response thereto establishing a secure tunnel between the security module and a secure video processor of the computing device; generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device; receiving an authentication in response to the key request message and supplying the authentication to the security module via the secure tunnel, wherein the authentication comprises a key response message comprising one or more keys associated with an authentication proxy; sending, by the computing device and to the authentication proxy, a client sign-on request identifying the security module; and using the security module and the secure video processor to process secured content for presentation to a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
detecting, by a computing device, insertion of a security module and establishing a secure tunnel between the security module and a secure video processor of the computing device; generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device; receiving a response in response to the key request message and supplying the response to the security module via the secure tunnel; using the security module and secure video processor to process secured content for presentation to a user; receiving a user request for access to the secured content; and in response to the user request, transmitting a content request message by the computing device; receiving a response to the content request message and forwarding the response to the content request message to the security module; receiving, from the security module in response to the response to the content request message, a content key; and using the content key to decrypt the secured content. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
detecting, by a computing device, insertion of a security module and in response thereto establishing a secure tunnel between the security module and a secure video processor of the computing device; generating, by the computing device and on behalf of the security module, a key request message comprising an identification of the security module and an identification of the secure video processor of the computing device; receiving a response in response to the key request message and supplying the response to the security module via the secure tunnel, wherein the response comprises one or more keys; sending, by the computing device and to an authentication proxy, a client sign-on request encrypted using the one or more keys; transmitting, by the computing device and to a content source, a content request message identifying the security module; receiving, by the computing device and from the content source, secured content; and using the security module and the secure video processor to process the secured content for presentation to a user. - View Dependent Claims (17, 18, 19, 20)
-
Specification