Hardware Enforced Output Security Settings
A hardware and security technology, applied in computer security devices, electrical components, transmission systems, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029] 1 is a block diagram illustrating a computing system configured to receive, process, and output content according to aspects of the disclosure. like Figure 1A As shown in , computing device 100A may receive content, such as video input 152 , may process the received content, and may output the processed content, such as video output 154 . Computing device 100A may receive protected content as well as unprotected content. In some examples, protected content may be content that can only be accessed by authorized users and / or components of computing device 100A, and thus should be protected from unauthorized users and / or components of computing device 100A. The component cannot access the described content.
[0030] Computing device 100A may process protected content in content protected area 150 and may process unprotected content in free content area 170, including processing protected and unprotected content in parallel. The content protected area 150 may include pro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


