News Focus
News Focus
icon url

2bStealthy

09/12/04 11:35 AM

#52744 RE: 2bStealthy #52743

more on the new SVP video chip at...

http://www.svp-cp.org/press_room.html
icon url

Vader

09/12/04 11:39 AM

#52745 RE: 2bStealthy #52743

2b..IMVHO...No Way OT!!!eom
icon url

barge

09/12/04 12:11 PM

#52747 RE: 2bStealthy #52743

2b--SVP = WAVE. Check out the links below, and ask yourself again SVP is OT. I discussed SVP last week, and claimed it to be very relevant. One obvious reason is that one of the founding members happened to be an Multi-National company with whom WAVE just had an agreement with, namely, of course, STMicroelectroinics.


Only a few months before the WAVE/STM "Hardware Security" 1.2 Agreement, the SECURE VIDEO PROCESSOR ALLIANCE (SVP) was launched by STMicroelectonic and NDS.

The key feature underlying Security Architecture upon which SVP is based, is, of course, Hardware Security!

FROM THE SVP FAQ:

http://www.svp-cp.org/FAQ.html

Is SVP a hardware-only solution?

Yes. Designing the SVP as a hardware-based solution enhances security while making it easier to standardize
— and therefore easier to produce inexpensively in mass quantities. The SVP chip can be implemented in any digital device, including STBs, TVs, DVRs, PDAs and other portable devices — without requiring special customization for each type or model of device. Upgrading any existing video processing chip into an SVP is a simple process that typically increases the existing gate count by a small percentage, depending on the requirements of the chip.

The SVP is a modular integrated chip based on existing MPEG chips. All the critical security functions are handled within the chip, to ensure that clear compressed content is never vulnerable to theft.

Top

How was SVP designed?
The primary modules of the SVP technology that is added to a video processing chip are:

· Security modules – For setting up and authenticating secure channels and parsing licenses determine whether content rights are available.

· Decryption & Encryption modules – protect content within the home, content exchanged between SVPs is always locally encrypted for the target SVP."



THIS IS ALL ABOUT THE TRUSTED COMPUTING GROUP, AND THE TRUSTED COMPUTING GROUP HAS NO OTHER COMPETING TRUSTED HARDWARE STANDARDS GROUP ANYWHERE!!!

LET ME REPEAT----ANYWHERE!!!


For those who STILL don't GET IT, I have provided a Video Clip of the SVP process below.


http://biz.yahoo.com/bw/040907/75596_1.html