Unlock instant, AI-driven research and patent intelligence for your innovation.

A device client video stream hardware protection method

A hardware protection and client-side technology, applied to electrical components, usage of multiple keys/algorithms, user identity/authority verification, etc., can solve problems such as equipment performance burden, resource waste, increase reserved safe memory, etc., and achieve openness And the effect of good scalability and guaranteed security

Active Publication Date: 2021-01-08
FUZHOU ROCKCHIP SEMICON
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] However, since the framework APIs designed by each DRM standard are different, there is a large amount of development in the development of device clients for OEM manufacturers to adapt to so many DRM standard frameworks.
Moreover, due to the similarity of DRM framework design ideas, some resources will be wasted. OEM manufacturers develop a device client video stream hardware security protection for each DRM framework. Increase the waste of reserved secure memory and reserved secure storage, which are very valuable to SOC
Therefore, if the adaptation degree of OEM manufacturers to different DRM standards can be improved, and security verification and video stream security protection can be supported, the main contradiction of current video stream protection can be resolved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device client video stream hardware protection method
  • A device client video stream hardware protection method
  • A device client video stream hardware protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] see figure 1 and figure 2 As shown, the device client video stream hardware protection method of the present invention is to isolate a secure world and a non-secure world on the device hardware system, and a hardware protection middleware is also provided between the secure world and the non-secure world;

[0037]The secure world only runs trusted applications, and all sensitive data that needs to be protected is only stored in the secure world. When sensitive data is exported from the secure world to the non-secure world, it can only be encrypted and then stored; the Secure World is provided by ARM TrustZone, the secure processor being ARM TrustZone's ARM processor. ARM TrustZone provides a secure execution environment (Trusted Execution Environment (TEE)) where only trusted applications run, preventing attacks in the form of hackers / viruses / malware. And based on this technology, the security system is improved according to the TEEAPI standard, so that the processin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hardware protection method for a video stream of a device client, which separates a safe world and a non-safe world on a device hardware system. Hardware protection middlewareis arranged between the safe world and the non-safe world. The secure world only runs trusted applications, and all sensitive data that need to be protected are stored only in the secure world. Whenthe sensitive data are exported from the secure world to the insecure world, they can only be encrypted and then saved. The hardware protection middleware comprises a CA layer, which is responsible for providing abundant interfaces to enable the DRM client framework to realize secure basic functions, so that the client can freely construct business processes and adapt to various DRM standards; anda TA layer, used to transfer secure data between the secure world and the non-secure world, in the secure world to apply for secure memory, in the non-secure world is not accessible.

Description

technical field [0001] The invention relates to a video stream security protection method for hardware of a device client. Background technique [0002] With the rapid growth of mobile Internet video applications, at the same time, the issue of copyright protection has become more and more prominent. With the increasing emphasis on the protection of intellectual property rights of digital content, the latest devices such as smart phones and tablet computers provide consumers with a wealth of video playback applications, content manufacturers or operators attach great importance to the copyright protection of video content, especially The popularity of payment models. [0003] The main feature of digital TV is the full digital processing of program production, transmission, reception and storage, which can bring rich and colorful digital content and high-quality audio and video effects to users. However, due to the full use of digital production, transmission means and digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/4408H04N21/4405H04N21/254H04N21/4627H04N21/835H04N21/443H04N21/4402H04L9/14H04L9/32
CPCH04L9/14H04L9/3239H04L9/3247H04N21/2541H04N21/4402H04N21/4405H04N21/4408H04N21/443H04N21/4627H04N21/835
Inventor 林銮云
Owner FUZHOU ROCKCHIP SEMICON