|By Business Wire||
|January 7, 2013 01:15 AM EST||
INSIDE Secure (NYSE Euronext: INSD), a leader in semiconductor and software solutions for securing transactions, content and digital identity, today announced that Korea-based Telechips is integrating a host of INSIDE Secure security solutions into its new family of set-top box processor chips. Telechips will add INSIDE Secure DRM Fusion™ Agent solutions for HDCP and DTCP-IP and the SafeZone™ secure platform into its new TCC89XX multimedia application processors to help ensure secure boot up and end-to-end content protection.
“The integration of INSIDE secure boot and HDCP/DTCP-IP protection solutions eliminates the need for add-on security software and greatly enhances the many built-in features and benefits of our newest family of set-top box processors, and enables Telechips to provide trustworthy security solutions for IP/OTT service providers,” said Jangkyu Lee, vice president of marketing and sales at Telechips. “INSIDE Secure was able to step up quickly and provide exactly what we needed to support in-home digital content protection for high-value and premium content through HDCP and DTCP-IP technologies.”
The INSIDE Secure HDCP and DTCP-IP solutions allow consumers to share high-definition and high-value content among multiple devices by protecting delivery of premium content between transmitter devices (consumer tablets, smartphones, game consoles, PCs, set-top boxes) and receiver devices (TVs, projectors, monitors). Compatible with the latest HDCP2.2 and DTCP-IP v 1.7 specifications, they allow semiconductor and appliance vendors to implement a complete content protection solution into silicon and consumer devices, where it protects all of the encryption keys and secure computations. The security modules of the HDCP and DTCP-IP protocols are available for integration on a Trusted Execution Environment-based platform or as a dedicated, highly secure and optimized hardware module.
“The need for content security assurance is growing in lock step with the global expansion of content delivery services, and forward-thinking chip makers like Telechips are building security into their silicon instead of treating it as an afterthought,” said Dr. Simon Blake-Wilson, executive vice president, Embedded Security Solutions Division, at INSIDE Secure. “This design win underscores our ability to deliver a bundled security solution, and we appreciate the trust placed in us by Telechips and a growing number of other semiconductor providers integrating our mobile and network security.”
The INSIDE DRM Fusion Agent supports HDCP, Microsoft PlayReady, Windows Media DRM, Open Mobile Alliance (OMA) and DECE UltraViolet standards. The DRM Fusion Agent is available as a downloadable application for both Android and Apple iOS-based smartphones and tablets. As an embedded solution, it is available on Android and many other embedded platforms for mobile phones, set-top boxes and other devices. The DRM Fusion Agent also supports in-home digital content protection through HDCP and DTCP-IP solutions. With DRM Fusion Agent, content is protected from content owners and distributors all the way to rendering devices such as TVs, monitors and projectors.
INSIDE Secure also offers an end-to-end media security solution through its DRM Fusion Server for carriers and network service providers. The INSIDE Secure DRM Fusion Server handles the entire DRM process from content protection, rights creation and rights and condition management to license generation and delivery.
Telechips is one of the leading fabless semiconductor companies in Korea. It designs and develops multimedia platforms for application markets including consumer electronics, automotive audio/AVN and mobile TV. Its products support comprehensive multimedia and communication technologies such as Android tablet/OTT and smart set-top boxes.
Telechips customers include market-leading companies such as Samsung, LG, Hyundai Motors, JVC Kenwood, Coby, Humax, Kaon Media and Dasan Networks
About INSIDE Secure
INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA), is a leading designer, developer and supplier of semiconductor and software solutions for securing transactions, contents and digital identity. INSIDE Secure mobile NFC, secure payment, embedded security and digital security solutions provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television, mobile handsets and wireless content and service providers. For more information, visit www.insidesecure.com.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Dec. 4, 2016 11:15 AM EST Reads: 874
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Dec. 4, 2016 11:15 AM EST Reads: 2,185
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Dec. 4, 2016 11:15 AM EST Reads: 5,723
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 10:45 AM EST Reads: 864
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Dec. 4, 2016 09:45 AM EST Reads: 537
Rapid innovation, changing business landscapes, and new IT demands force businesses to make changes quickly. In the eyes of many, containers are at the brink of becoming a pervasive technology in enterprise IT to accelerate application delivery. In this presentation, attendees learned about the: The transformation of IT to a DevOps, microservices, and container-based architecture What are containers and how DevOps practices can operate in a container-based environment A demonstration of how ...
Dec. 4, 2016 09:45 AM EST Reads: 863
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Dec. 4, 2016 09:30 AM EST Reads: 789
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 4, 2016 09:30 AM EST Reads: 598
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 4, 2016 09:00 AM EST Reads: 566
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:45 AM EST Reads: 801
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:30 AM EST Reads: 777
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Dec. 4, 2016 08:30 AM EST Reads: 997
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Dec. 4, 2016 08:15 AM EST Reads: 718
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Dec. 4, 2016 08:15 AM EST Reads: 775
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 4, 2016 08:00 AM EST Reads: 812