The HDCP 2.2 Authentication Process - an Introduction
When digital content is transmitted, it is susceptible to unauthorized copying and interceptions. Hence protecting content has become an important factor in the transmission of audiovisual content. In 2003, Intel developed an encryption technique called the High-bandwidth Digital Content Protection (HDCP) protocol to protect audio and video data between a transmitter (transmitting the audio visual content such as a Blu-ray player) and a receiver such as a Monitor. If a transmitting device is transmitting the content HDCP protected then the receiver must also support HDCP in order to receive the content correctly.
HDCP protocol is now managed by Digital Content Protection (DCP), LLC, an Intel subidiary, which licenses technologies for the protection of commercial digital content. For every HDCP protected digital content must follow the HDCP protocol and also must have a license issued by DCP, LLC.
To read the full article, click here
Related Semiconductor IP
- HDCP 2.x Transmitter IIP
- HDCP 2.x Receiver IIP
- HDCP 1.x Transmitter IIP
- HDCP 1.x Receiver IIP
- HDCP Verification IP
Related Blogs
- HDCP 2.2 Authentication: RSA Cryptography
- HDCP 2.2: Authentication and Key Exchange (AKE)
- An introduction to ARM Development Studio 5 (DS-5)
- MIPI Unipro Transport Layer (L4) - An Introduction