{"id":1262,"date":"2021-09-29T23:57:27","date_gmt":"2021-09-29T23:57:27","guid":{"rendered":"http:\/\/raym21.sg-host.com\/imp\/?page_id=1262"},"modified":"2022-01-05T17:21:58","modified_gmt":"2022-01-05T17:21:58","slug":"implementing-security","status":"publish","type":"page","link":"https:\/\/handbook.dolby.com\/imp\/implementing-security\/","title":{"rendered":"Implementing Security"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.5.6&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;61d47f5c-0eaf-4629-b971-5d1bb4ad7db1&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;align-self: center;&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;default&#8221; background_layout=&#8221;dark&#8221; width=&#8221;80%&#8221; max_width=&#8221;80%&#8221; module_alignment=&#8221;left&#8221; text_orientation_tablet=&#8221;center&#8221; text_orientation_phone=&#8221;center&#8221; text_orientation_last_edited=&#8221;on|desktop&#8221; module_alignment_tablet=&#8221;center&#8221; module_alignment_phone=&#8221;center&#8221; module_alignment_last_edited=&#8221;on|phone&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1>Designing an IP Security Mechanism<\/h1>\n<p>Before any IC with Dolby technologies can be designed, certified and shipped to an OEM, Dolby and the Implementation Licensee must reach agreement on an IP security mechanism to protect Dolby intellectual property (IP).  This prevents an unauthorized party from accessing and using the Dolby IP. [\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.5.7&#8243; _module_preset=&#8221;default&#8221; custom_css_main_element=&#8221;align-self: center;&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;5vh|10%|0vh|10%|false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.5.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.13.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Dolby\u2019s guidelines respect the proprietary nature of each unique hardware and software implementation and provide a clear set of guidelines to enable the creation of a Dolby approved secure implementation.<\/h2>\n<p>&nbsp;<\/p>\n<ul>\n<li>Security guidelines will be provided once the Dolby technology is licensed.<\/li>\n<li>All ICs must also have a limited-use version (work with Dolby Implementation Engineers).<\/li>\n<li>Each Dolby technology may require a different security mechanism.<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Dolby Recommendations&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe0dd;||divi||400&#8243; _builder_version=&#8221;4.13.0&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Dolby provides security guidelines and recommendations but not security specifications.\n<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.10.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Implementation Licensee Security Solution&#8221; use_icon=&#8221;on&#8221; font_icon=&#8221;&#xe06c;||divi||400&#8243; _builder_version=&#8221;4.13.0&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The Implementation Licensee translates the Dolby recommendations into a security mechanism that works with their hardware and architecture.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Designing an IP Security Mechanism Before any IC with Dolby technologies can be designed, certified and shipped to an OEM, Dolby and the Implementation Licensee must reach agreement on an IP security mechanism to protect Dolby intellectual property (IP). This prevents an unauthorized party from accessing and using the Dolby IP. Dolby\u2019s guidelines respect the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/pages\/1262"}],"collection":[{"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/comments?post=1262"}],"version-history":[{"count":0,"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/pages\/1262\/revisions"}],"wp:attachment":[{"href":"https:\/\/handbook.dolby.com\/imp\/wp-json\/wp\/v2\/media?parent=1262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}