Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

12/21/2009
03:08 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Discretix Announces Embedded Security Solutions For Media Phones

CryptoCell enables software updates, data storage, and debugging

LAS VEGAS CONVENTION CENTER, LAS VEGAS, NEVADA — (January 7, 2010) — Discretix, the leading global provider of embedded security solutions, today announced a comprehensive platform and content protection suite for media phones—a new category of communication products that combine advanced telephony with a diverse selection of multimedia-based services. Essential for open source platforms, Discretix' CryptoCell enables software updates, data storage and debugging to be performed securely, ensuring that the media phone is trusted to deliver advanced services to homes and businesses. Discretix' Multi-Scheme DRM—already used in millions of devices around the world—enables sophisticated business models for high-value content. Discretix has already achieved strong traction with Tier 1 chipset vendors involved in media phone development.

Media phones are widely regarded as the "fourth screen" in homes after the TV, PC, and mobile handset. Combining open source operating systems, advanced telephony, home networking and touchscreens, media phones can be used for inbound/outbound calling plus Web browsing, audio-video playback and photo viewing, as well as access to various onscreen services. Market research firm In-Stat predicts that consumer media phones will generate $4 to 8 billion in annual revenue worldwide by 2013.

"Discretix' Multi-Scheme DRM is already widely deployed on open source platforms, providing a secure framework for access to online information services and multimedia entertainment," said Edo Ganot, Executive Vice President, Business Development for Discretix. "As an embedded security solution, CryptoCell provides the root of trust necessary for secure content access technologies and authentic remote updates as well device operations that are reliable, secure and free from hackers."

Discretix' Multi-Scheme DRM (Digital Rights Management) is the most flexible solution of its kind. Reinforced by the underlying Discretix security subsystem, the solution provides a complete implementation of the major schemes in use today: OMA DRM v1.0, OMA DRM v2.x, Microsoft WM-DRM 10, CPRM. It can also be easily expanded to support new schemes as they become available.

As the world's most widely deployed embedded security technology for consumer electronics devices, Discretix CryptoCell delivers an outstanding level of security while overcoming the challenges

- more -

Securing the 4th Screen: Discretix Announces Embedded Security Solutions for Media Phones—Page 2

of performance, power consumption and silicon footprint. The silicon-based solution includes Secure Boot protection that verifies software image integrity at boot time as well as other anti-intrusion defenses; Secure Storage, for protection of data items in off-chip non-volatile memory; and Secure Debug, enabling only device makers to debug devices once a device is running and code is available in on-chip memory.

CryptoCell also provides essential security components for DRM, CAS, SimLock and software updates.

For more information about Discretix CryptoCell and Multi-Scheme DRM technologies, visit www.discretix.com.

About Discretix:

Discretix' security solutions are deployed in a wide range of consumer electronics devices enabling services and applications, while protecting the device and its contents. Discretix' products include embedded security co-processors and a broad range of security applications. The solutions are tightly integrated into the device, enhancing security without compromising the user experience. Discretix, a privately-owned company, serves the needs of some of the world's best-known semiconductor and device manufacturers and has been consistently ranked among the leaders of the embedded security market. For more information, please visit www.discretix.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
How to Identify Cobalt Strike on Your Network
Zohar Buber, Security Analyst,  11/18/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: A GONG is as good as a cyber attack.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5641
PUBLISHED: 2020-11-24
Cross-site request forgery (CSRF) vulnerability in GS108Ev3 firmware version 2.06.10 and earlier allows remote attackers to hijack the authentication of administrators and the product's settings may be changed without the user's intention or consent via unspecified vectors.
CVE-2020-5674
PUBLISHED: 2020-11-24
Untrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
CVE-2020-29002
PUBLISHED: 2020-11-24
includes/CologneBlueTemplate.php in the CologneBlue skin for MediaWiki through 1.35 allows XSS via a qbfind message supplied by an administrator.
CVE-2020-29003
PUBLISHED: 2020-11-24
The PollNY extension for MediaWiki through 1.35 allows XSS via an answer option for a poll question, entered during Special:CreatePoll or Special:UpdatePoll.
CVE-2020-26890
PUBLISHED: 2020-11-24
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the r...