Security Icon

Security

CryptoMedia Player Agent

Designed as a secure software foundation for premium digital content players, the CryptoMedia Player Agent delivers an easy-to-integrate solution for the secure acquisition and playback of 4K Ultra High Definition (UHD) High Dynamic Range (HDR ) content

How CryptoMedia Player Agent works

Part of the complete CryptoMedia platform that includes the Key Derivation Core and Key Issuance Center, the CryptoMedia Player Agent as an easy-to-integrate, secure software solution for embedded media players in consumer electronics, including Connected TVs, STBs, BluRay players, and mobile devices. The Player Agent meets all relevant requirements for secure implementation in Android or Linux operating systems. It combines both secure and insecure elements, performing non-security-critical functions, and security-critical functions in a Trusted Execution Environment (TEE) or secure processor.

The Player Agent is designed to enable highest digital content ownership experience and is available standalone or integrated with the CryptoMedia Key Derivation Core.

CryptoMedia Player Agent diagram

Solution Offerings

• Pre-compiled, device-specific Agent libraries
• Reference application source code
• Full documentation
• Optional porting and integration support

Smarter than a Smart Card cover

Smarter than a Smart Card

Set-top boxes (STBs) were initially secured by Conditional Access System (CAS) smart cards. However, this approach is no longer effective. Smart cards cannot prevent unauthorized access to premium 4K and UHD content, as they are not designed to protect the interface between the card and box, or the STB SoC itself. This is one of the reasons why cardless CAS set-top boxes, equipped with a hardware-based root-of-trust, are increasing in popularity amongst major operators. A hardware root-of-trust, provided by platforms such as Rambus’ CryptoMedia, offers operators robust security protection with an integrated security core that acts to effectively decrease potential attack vectors.
Download White Paper

Related Markets & Applications