Patent application number | Description | Published |
20090172331 | Securing content for playback - A graphics engine may include a decryption device, a renderer, and a sprite or overlay engine, all connected to a display. A memory may have a protected and non-protected portions in one embodiment. An application may store encrypted content on the non-protected portion of said memory. The decryption device may access the encrypted material, decrypt the material, and provide it to the renderer engine of a graphics engine. The graphics engine may then process the decrypted material using the protected portion of the memory. Only graphics devices can access the protected portion of the memory in at least one mode, preventing access by outside sources. In addition, the protected memory may be stolen memory that is not identified to the operating system, making that stolen memory inaccessible to applications running on the operating system. | 07-02-2009 |
20100071073 | TECHNIQUES FOR SHUFFLING VIDEO INFORMATION - An apparatus, system, method, and article for shuffling video information are described. The apparatus may include a media processing node to receive video information. The media processing node may include a shuffling module to shuffle the video information according to a shuffle order and a trusted entity programmed based on the shuffle order to provide access to the video information. The video information may be provided in an unshuffled manner when accessed through the trusted entity. Other embodiments are described and claimed. | 03-18-2010 |
20130145424 | SECURE PROVISION OF A DIGITAL CONTENT PROTECTION SCHEME - Methods, apparatuses and storage medium associated with securely provisioning a digital content protection scheme are disclosed. In various embodiments, a method may include forming a trust relationship between a media application within an application execution environment of a device and a security controller of the device. The application execution environment may include an operating system, and the operating system may control resources within the application execution environment. Additionally, the security controller may be outside the application execution environment, enabling components of the security controller to be secured from components of the operating system. Further, the method may include the security controller in enabling a digital content protection scheme for the media application to provide digital content to a digital content protection enabled transmitter within the application execution environment for provision to a digital content protection enabled receiver. Other embodiments may be disclosed or claimed. | 06-06-2013 |
20140013422 | Continuous Multi-factor Authentication - A method and computing device for continuous multi-factor authentication are included in which a plurality of valid authentication credentials may be detected. Also, an authorized user may be detected within a viewing area. Additionally, an unauthorized object may be detected in the viewing area. Furthermore, a display device may be prevented from displaying content. | 01-09-2014 |
20140015816 | DRIVING MULTIPLE DISPLAYS USING A SINGLE DISPLAY ENGINE - Systems, devices and methods are described including using a display engine to render first image content at a first rate, where the first image content is to be displayed by a first display at a second rate, where the first rate is larger than the second rate. The display engine may also be used to render second image content at the first rate, where the second image content is to be displayed by the second display at the second rate. | 01-16-2014 |
20140023351 | SELECTIVE POST-PROCESSING OF DECODED VIDEO FRAMES BASED ON FOCUS POINT DETERMINATION - In general, in one aspect, a graphics driver receives information related to where eyes of a user watching a video are focused, determine if the user is focusing their attention on a particular location of the video, and generates post processing instructions for pixel macro blocks of decoded video frames. The instructions are based on whether it is determined that the user is focused. The graphics driver is further to determine a focus area associated with the particular location the user is focusing their attention on, determine a peripheral area around the focus area, generate a first set of post processing instructions for pixel macro blocks within the focus area, generate a second set of post processing instructions for pixel macro blocks within the peripheral area, and generate a third set of post processing instructions for pixel macro blocks not within either area. | 01-23-2014 |
20140047470 | Securing Content from Malicious Instructions - A method and system is provided for securing content from malicious shaders. The method includes determining the content the shader is to execute. A signature of the shader is verified in response to the shader attempting to execute on protected content. In response to the shader being verified, it is verified that the shader has not been modified. The shader is executed in response to not being modified. | 02-13-2014 |
20140146896 | VIDEO PIPELINE WITH DIRECT LINKAGE BETWEEN DECODING AND POST PROCESSING - In general, in one aspect, a decode order for a group of picture (GOP) frame structure for a video stream is modified to include regenerated P frames. The modified decode order includes a regenerated P frame of a P frame decoded prior to a sequence of B frames after last B frame in the sequence of B frames and before next I or P frame. The frames are decoded in modified decode order by a decode engine. The decoded frames are post processed in a display order (only includes regenerated P frames and does not include initial P frames defined in the decode order) by a post processing engine. The post processing engine may ignore the initial P frames or the decode engine may not forward the initial P frames to the post processing engine. The post processed frames may be prepared for presentation by a display engine. | 05-29-2014 |
20140157410 | Secure Environment for Graphics Processing Units - In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments. | 06-05-2014 |
20140185802 | REAL TIME COMPOSITION OF A COMPOSITE WINDOW FROM CONTENT MAINTAINING UNIQUE SECURITY DOMAINS - In general, in one aspect, a multi-content composition pipeline encrypts protected video streams that may be utilized as part of a composite window using different encryption keys so that each encrypted video stream has a unique security domain. The protected video streams may be received as encrypted and compressed video streams that are decrypted and decoded (decompressed) and then the decompressed video streams may be encrypted. The encryption keys used to encrypt the decompressed video stream may be related to the encryption keys used to decrypt the corresponding encrypted compressed video stream. The encrypted decompressed video streams are stored in memory until they are needed for generating the composite window at which point they are read from memory and decrypted. The composite window is generated from the decrypted uncompressed video streams and possibly other content in real time and thus is not stored in memory prior to transmission to a display. | 07-03-2014 |
20140205085 | PREVENTING PATTERN RECOGNITION IN ELECTRONIC CODE BOOK ENCRYPTION - In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted. | 07-24-2014 |
20140270280 | AUDIO LOCALIZATION TECHNIQUES FOR VISUAL EFFECTS - Techniques for improved audio localization for visual effects are described. In one embodiment, for example, an apparatus may comprise a processor circuit and an audio management module, and the audio management module may be operable by the processor circuit to determine a position of a user interface element in a presentation area, determine an audio effect corresponding to the user interface element, determine audio location information for the audio effect based on the position of the user interface element, the audio location information defining an apparent position for the audio effect, and generate audio playback information for the audio effect based on the audio location information. Other embodiments are described and claimed. | 09-18-2014 |
20150086012 | SECURE VIDEO OUPUT PATH - Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory and preventing an unauthorized access to the architecturally protected memory; wherein the processing logic is further configured to provide a secure video output path by generating an output surface bitmap encrypted with a first encryption key and storing an encrypted first encryption key in an external memory, wherein the encrypted first encryption key is produced by encrypting the first encryption key with a second encryption key. | 03-26-2015 |