Unlock instant, AI-driven research and patent intelligence for your innovation.

Hardware Enforced Output Security Settings

A hardware and security technology, applied in computer security devices, electrical components, transmission systems, etc.

Inactive Publication Date: 2017-12-15
QUALCOMM INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The techniques described herein may include end-to-end content protection techniques that address attacks while media, such as video, is traveling inside a computing device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware Enforced Output Security Settings
  • Hardware Enforced Output Security Settings
  • Hardware Enforced Output Security Settings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] 1 is a block diagram illustrating a computing system configured to receive, process, and output content according to aspects of the disclosure. like Figure 1A As shown in , computing device 100A may receive content, such as video input 152 , may process the received content, and may output the processed content, such as video output 154 . Computing device 100A may receive protected content as well as unprotected content. In some examples, protected content may be content that can only be accessed by authorized users and / or components of computing device 100A, and thus should be protected from unauthorized users and / or components of computing device 100A. The component cannot access the described content.

[0030] Computing device 100A may process protected content in content protected area 150 and may process unprotected content in free content area 170, including processing protected and unprotected content in parallel. The content protected area 150 may include pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Aspects of the invention are generally directed to copy protection techniques. Areas in memory can be protected to establish secure storage areas in the memory that cannot be accessed by unauthorized clients. A request to decode video content stored in the secure storage area may be received. If the video content to be decoded is stored in the secure storage area, the first MMU associated with the hardware decoder may enforce that the video content is to be decoded into one of the secure storage areas or Rules for multiple output buffers. A request to display the decoded video content stored in the secure storage area may be received. A second MMU associated with a hardware display processor may enforce rules establishing a secure link between the hardware display processor and an output device if the decoded video content is stored in the secure storage area.

Description

[0001] This application claims the benefit of US Provisional Application No. 61 / 645,577, filed May 10, 2012, the entire contents of which are hereby incorporated by reference. technical field [0002] The present invention relates to content processing, and more particularly to processing of copy protected content. Background technique [0003] Copy protection solutions can be used to restrict access to copy protected content. For example, a copy protection solution can restrict unauthorized playback or duplication of copy protected content. Rogue users may bypass copy protection solutions, making it easy to copy and replay copy protected content. Contents of the invention [0004] In general, this disclosure describes methods for enforcing copy protection and preventing unauthorized access to copy-protected content using hardware. Current software copy protection solutions work on open source operating systems (eg, operating system) can be easily bypassed. Even when ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/426H04N21/438H04N21/44H04N21/4405H04N21/443H04N21/835
CPCH04N21/4263H04N21/42653H04N21/42692H04N21/43853H04N21/44004H04N21/4405H04N21/4431H04N21/4435H04N21/835H04N21/42623G06F21/00G06F21/62H04L63/02
Inventor 苏迪普·拉维·科蒂林加尔加里·阿瑟·钱贝拉史蒂文·约翰·哈尔特
Owner QUALCOMM INC