摘要:
A system and method is provided for generating and using multiple synchronized local program timestamps in a media processing system. The system includes an input processor, one or more local timestamp insertion modules, one or more parsers, and an input buffer. Each local program timestamp module includes a clock reference recovery module, a local program clock synchronized to the system time clock of a program source, and a timestamp generator. The system also includes one or more processing modules such as record modules, transmission modules, and display modules. When a data packet is received by the media processing system, the local timestamp insertion module appends a timestamp to the data packet. The timestamp is based on the synchronized local program clock for the program associated with the data packet. The processing modules utilize the synchronized local timestamps and their associated local program clock in a variety of applications.
摘要:
Methods and systems for random data access for security applications are disclosed and may comprise generating on a chip, a random process index. A data process may be randomly selected on the chip utilizing the generated random process index. A time interval may be randomly allocated on the chip. After the time interval, the randomly selected data process may initiate processing of data. The processing of the data may comprise accessing the data and/or acquiring the data. The data may be verified by the selected data process prior to the processing of the data. The data may be verified utilizing a digital signature verification algorithm, for example.
摘要:
A first primary packet to create a second primary packet for a particular PID. Different CRC checksum may be generated for the first and the second primary packet. The first primary packet may be replicated in order to create a first secondary packet and the second primary packet may be replicated to create a second secondary packet. The CRC checksum for the primary packets may be stored within their corresponding secondary packets. In response to receipt of a new stream with replicated packets, the first or said second primary packet may be selected and the first or second secondary packet may be selected for a particular PID based on the generated CRC checksum. The selections may co-relate the selected first and/or second primary packet with a legacy system or the selected first and/or second secondary packet with a new system.
摘要:
An aspect of the of the invention may include the transfer of a block of data from a first memory location to a second memory location in a DRAM. During the transfer of the block of data from the first memory location, if an encryption mode is selected, the data may be buffered, encrypted, and then stored in the second memory location. If a decryption mode is selected, the transferred data may be buffered, decrypted and then stored in the second memory location. If a bypass mode is selected, the data may be buffered and then stored in the second memory location. In this regard, the encryption/decryption operations may be bypassed.
摘要:
Aspects of the invention include assigning a priority to a primary packet for a particular channel and replicating the primary packet to create a secondary packet for the particular channel. A primary packet may be selected in order to co-relate the primary packet to a legacy system. Similarly, a secondary packet may be selected in order to co-relate the secondary packet to a new system. The priority assigned to the primary packet may uniquely distinguish the primary packet from a priority of the other packets for the particular channel. The primary packet and the secondary packet may have the same priority and the same continuity counter.
摘要:
Certain embodiments of the invention provide a method and system for memory to bus interface data encryption and decryption. A method for memory to bus interface data encryption and decryption may include encrypting data by a encryption/decryption engine or processor and transferring the encrypted data across a first bus interface to a data processing and/or storage device coupled to the first bus interface. The encryption engine may receive encrypted data from a device coupled to the first bus interface and decrypt the received encrypted data. In this regard, unencrypted data never traverses across the first bus interface, and is thereby not accessible to devices coupled to the first bus interface. An encryption function and a decryption function associated with the encryption/decryption engine may be integrated within a bus adapter, for example, an IDE bus adapter.
摘要:
Aspects of the present invention may include replicating a first primary packet to create a second primary packet for a particular channel. A unique identifier may be assigned to the first primary packet and a different unique identifier may be assigned to the second primary packet. The first primary packet may be replicated in order to create a first secondary packet and the second primary packet may be replicated to create a second secondary packet. In response to the receipt of the new stream with replicated packets, the first or said second primary packet may be selected and the first or second secondary packet may be selected for a particular PID based on the assigned unique identifier. The selections may be done to co-relate the selected first and/or second primary packet with a legacy system or the selected first and/or second secondary packet with a new system.
摘要:
A system and method for processing information may include broadcasting information, which indicates program content for each of a plurality of channels communicated via a plurality of transport streams, to a plurality of processors. The plurality of processors identify which of the program content is associated with a particular one of the plurality of channels in each of the plurality of transport streams. The broadcasted information may be stored in a table in memory. The broadcasted information may include a packet identifier (PID) and/or a processor identifier associated with the PID that identifies at least one of the plurality of processors, such as parsers. The information may be stored in a table in memory prior to the broadcasting. The table may be indexed according to the plurality of channels.
摘要:
Methods and systems for allowing customer or third party testing of secure programmable code are disclosed and may include verifying code loaded in a set-top box utilizing a test hash or a production hash prior to execution of the code, where the test hash and production hash may be stored in a memory, such as an OTP, within the set-top box, and may allow migration from corresponding test code to production code, which may be verified utilizing the test hash and production hash, respectively. The test and production hashes may be customer specific. The migration from test code to production code may be authenticated using at least a set-top box specific password. The test hash may be stored in a first portion of a one-time programmable memory and the production hash in a remaining portion, with the first portion being less than or equal to the remaining portion.
摘要:
In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.