Abstract:
Many media playback devices have a secure environment, with media decrypter and decoder components, and an insecure environment, with intermediate media processing components that are not suitable for secure implementation. In the secure environment, secure components decrypt encrypted media and store the clear-form media in secure memory that can only be accessed by secure components. Secure components also generate a media-data “proxy”, which corresponds structurally to the clear-form media, but which does not include actual clear-form media data. The media-data proxy is provided to insecure intermediate components, which manipulate the proxy to perform operations such as de-multiplexing, loss mitigation, and coded frame assembly. The manipulated proxy is returned to the secure environment, where secure components identify structural changes that were made to the proxy and make corresponding structural changes to the clear-form media before decoding the manipulated clear-form media.