Abstract:
Innovations in the area of hardware-protected digital rights management ("DRM") systems are presented. For example, a hardware-protected DRM system includes a trusted layer and untrusted layer. In the untrusted layer, a control module receives source media data that includes encrypted media data. The control module processes metadata about the media data. The metadata, possibly exposed by a module in the trusted layer, is not opaque within the untrusted layer. In the trusted layer, using key data, a module decrypts encrypted media data, which can be the encrypted media data from the source media data or a transcrypted version thereof. A module in the trusted layer decodes the decrypted media data. A host decoder in the untrusted layer uses the metadata to manage at least some aspects of the decoding, rendering and display in the trusted layer, without exposure of decrypted media data or key data within the untrusted layer.
Abstract:
A method, device, and system for protecting and securely delivering media content includes configuring a memory controller of a system-on-a-chip (SOC) to establish a protected memory region, authenticating a firmware of a hardware peripheral using a security engine of the SOC, and storing the authenticated firmware in the protected memory region. The security engine may authenticate the firmware by authenticating a peripheral cryptographic key used to encrypt the firmware. Only authenticated hardware peripherals may access the protected memory region.
Abstract:
Systems and methods for controlling access to content are disclosed. Content can be consumed by a device. Access to the content is controlled by duration. A device is provided with a token that allows the user to consume content via a subscription basis.
Abstract:
A secure execution environment for execution of sensitive code and data including a secure asset management unit (SAMU) is described. The SAMU provides a secure execution environment to run sensitive code, for example, code associated with copy protection schemes established for content consumption. The SAMU architecture allows for hardware-based secure boot and memory protection and provides on-demand code execution for code provided by a host processor. The SAMU may boot from an encrypted and signed kernel code, and execute encrypted, signed code. The hardware-based security configuration facilitates preventing vertical or horizontal privilege violations.
Abstract:
A solution (A1-A12) is proposed for monitoring usage of bundles (240) in the OSGi environment. For this purpose, an event notification interface (410) of the OSGi environment is exploited. Particularly, each event (A2-A5) relating to a change of state of a bundle (such as its addition, removal, starting and stopping) is detected (A6-A9) by an auxiliary bundle (240a) - which previously subscribed (A1) to the event notification interface. The auxiliary bundle can then forward (A10) the detected events to a licensing agent, which identifies (A11-A12) the bundle by means of a software catalogue (420). In this way, the desired result is achieved without requiring any instrumentation of the bundles to be monitored.
Abstract:
A system for secure provision of key credential information is provided. The system comprises secure logic circuitry for being disposed in a host computer. The secure logic circuitry detects a message received from a remote computer connected to the host computer and indicative of a request for provision of the key credential information; generates a message for prompting a user for provision of the key credential information; receives the key credential information; and provides the key credential information to the remote computer absent processing using circuitry of the host computer. The system further comprises a secure user interface connected to the secure logic circuitry for receiving the key credential information from the user and providing the same to the secure logic circuitry.
Abstract:
Electronic items may be searched using search indices. Search indices may be generated for electronic items at a user device. In that case, a list of one or more electronic items stored in memory of the user device may be displayed, and a status of index generation for the electronic items stored in memory of the device may be presented.