Method and system for memory attack protection to achieve a secure interface
    11.
    发明授权
    Method and system for memory attack protection to achieve a secure interface 有权
    用于内存攻击保护的方法和系统,实现安全的接口

    公开(公告)号:US08156345B2

    公开(公告)日:2012-04-10

    申请号:US13252484

    申请日:2011-10-04

    Abstract: A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device and the host device over that coupling. An integrated memory within the slave device may be configured into a plurality of memory portions or regions based on the received commands. The memory regions may be utilized during operations associated with authentication of subsequent commands from the host device. A first memory region may enable storage of encrypted host commands and data. A second region may enable storage of decrypted host commands and data. A third region may enable storage of internal variables and/or intermediate results from operations performed by the slave device. Another region may comprise internal registers that enable storage of information only accessible to the slave device. Access to some of the memory regions may be controlled and/or restricted by the slave device.

    Abstract translation: 从设备可以经由通过该耦合在从设备和主机设备之间配置的安全接口从通信地耦合到从设备的主机设备接收命令。 可以根据所接收的命令将从设备内的集成存储器配置成多个存储器部分或区域。 可以在与来自主机设备的后续命令的认证相关联的操作期间利用存储器区域。 第一存储器区域可以实现加密的主机命令和数据的存储。 第二区域可以实现解密的主机命令和数据的存储。 第三区域可以实现从设备执行的操作的内部变量和/或中间结果的存储。 另一区域可以包括内部寄存器,其能够存储只能由从设备访问的信息。 对一些存储器区域的访问可以被从设备控制和/或限制。

    Method and System For Command Authentication To Achieve a Secure Interface
    12.
    发明申请
    Method and System For Command Authentication To Achieve a Secure Interface 有权
    用于命令认证的方法和系统以实现安全接口

    公开(公告)号:US20080046733A1

    公开(公告)日:2008-02-21

    申请号:US11558662

    申请日:2006-11-10

    Abstract: Aspects of a method and system for command authentication to achieve a secure interface are provided. Command authentication between a host and a slave device in a multimedia system may be achieved by on-the-fly pairing or by an automatic one-time-programming via a security processor. In an on-the-fly pairing scheme, the host may generate a host key based on a host root key and host control words while the slave may generate slave key based the host key, a slave root key and slave control words. The slave key may be stored and later retrieved by the slave device to obtain the host key for authenticating host commands. The host may be disabled from generating and/or passing the host key to the slave. In an automatic one-time-programming scheme, the security processor may burn a random number onto a one-time-programmable memory in the host and slave devices for command authentication.

    Abstract translation: 提供了用于实现安全接口的命令认证的方法和系统的方面。 多媒体系统中的主机和从设备之间的命令认证可以通过即时配对或通过安全处理器的自动一次编程来实现。 在实时配对方案中,主机可以基于主机根密钥和主机控制字生成主机密钥,而从机​​可以基于主机密钥,从根密钥和从属控制字生成从机密钥。 从属密钥可以被从设备存储和稍后检索以获得用于认证主机命令的主机密钥。 可能禁用主机生成和/或将主机密钥传递到从设备。 在自动一次编程方案中,安全处理器可以将随机数刻录到主机和从设备中的一次性可编程存储器中用于命令认证。

    System and method for memory data protection with secure pad memory
    13.
    发明申请
    System and method for memory data protection with secure pad memory 失效
    使用安全垫存储器进行存储器数据保护的系统和方法

    公开(公告)号:US20070233982A1

    公开(公告)日:2007-10-04

    申请号:US11393164

    申请日:2006-03-28

    CPC classification number: G06F12/1408 G06F21/78 G06F21/85

    Abstract: A system and a method for protecting the security of data stored externally to a data processing engine of a data processor using at least one secure pad memory that is mapped to internal memory of the data processing engine and to the external memory. The memory data protection system and method performs an arithmetic operation, such as a bitwise exclusive OR (“XOR”) operation, on data being read from the data processing engine or written to the external memory using data stored in secure pads of the secure pad memory, which data may be random numbers generated by a random number generator.

    Abstract translation: 一种用于使用映射到数据处理引擎的内部存储器和外部存储器的至少一个安全衬垫存储器来保护外部存储在数据处理引擎的数据的安全性的系统和方法。 存储器数据保护系统和方法对从数据处理引擎读取的数据或使用存储在安全垫的安全焊盘中的数据写入外部存储器来执行例如按位异或(“异或”)运算的算术运算 存储器,哪些数据可以是由随机数生成器生成的随机数。

    UNIFIED VIDEO DELIVERY SYSTEM FOR SUPPORTING IP VIDEO STEAMING SERVICE
    15.
    发明申请
    UNIFIED VIDEO DELIVERY SYSTEM FOR SUPPORTING IP VIDEO STEAMING SERVICE 有权
    用于支持IP视频浏览服务的统一视频传送系统

    公开(公告)号:US20120216038A1

    公开(公告)日:2012-08-23

    申请号:US13170764

    申请日:2011-06-28

    Abstract: A home gateway may be used to handle at least a portion of processing of content obtained for consumption by client devices serviced via the home gateway. The home gateway may receive a single copy of content having a first format, and may convert the received content to one or more other formats suitable for presentation by at least one of the client devices based on knowledge of the client devices. The home gateway may maintain secure and/or protected access of the content handled via the home gateway. During protected access the home gateway may partition the content into a plurality of encrypted segments that are forwarded separately to the client devices. The client devices may utilize a corresponding plurality of encryption keys for decrypting the encrypted segments. The encryption keys may be obtained from an external key server. The home gateway may also generate the encryption keys.

    Abstract translation: 家庭网关可以用于处理通过家庭网关服务的客户端设备获得的用于消费的内容的处理的至少一部分。 家庭网关可以接收具有第一格式的内容的单个副本,并且可以基于客户端设备的知识将接收的内容转换成适合于至少一个客户端设备呈现的一个或多个其他格式。 家庭网关可以保持通过家庭网关处理的内容的安全和/或受保护的访问。 在受保护的访问期间,家庭网关可以将内容分割成分别转发到客户端设备的多个加密段。 客户端设备可以利用相应的多个加密密钥来解密加密的段。 可以从外部密钥服务器获得加密密钥。 家庭网关也可以生成加密密钥。

    METHOD AND SYSTEM FOR MEMORY ATTACK PROTECTION TO ACHIEVE A SECURE INTERFACE
    16.
    发明申请
    METHOD AND SYSTEM FOR MEMORY ATTACK PROTECTION TO ACHIEVE A SECURE INTERFACE 有权
    用于存储器触发保护以实现安全接口的方法和系统

    公开(公告)号:US20120030391A1

    公开(公告)日:2012-02-02

    申请号:US13252484

    申请日:2011-10-04

    Abstract: A slave device may receive commands from a host device communicatively coupled to the slave device, via a secure interface configured between the slave device and the host device over that coupling. An integrated memory within the slave device may be configured into a plurality of memory portions or regions based on the received commands. The memory regions may be utilized during operations associated with authentication of subsequent commands from the host device. A first memory region may enable storage of encrypted host commands and data. A second region may enable storage of decrypted host commands and data. A third region may enable storage of internal variables and/or intermediate results from operations performed by the slave device. Another region may comprise internal registers that enable storage of information only accessible to the slave device. Access to some of the memory regions may be controlled and/or restricted by the slave device

    Abstract translation: 从设备可以经由通过该耦合在从设备和主机设备之间配置的安全接口从通信地耦合到从设备的主机设备接收命令。 可以根据所接收的命令将从设备内的集成存储器配置成多个存储器部分或区域。 可以在与来自主机设备的后续命令的认证相关联的操作期间利用存储器区域。 第一存储器区域可以实现加密的主机命令和数据的存储。 第二区域可以实现解密的主机命令和数据的存储。 第三区域可以实现从设备执行的操作的内部变量和/或中间结果的存储。 另一区域可以包括内部寄存器,其能够存储只能由从设备访问的信息。 对一些存储器区域的访问可以被从设备控制和/或限制

    Method and System For Memory Attack Protection To Achieve a Secure Interface
    17.
    发明申请
    Method and System For Memory Attack Protection To Achieve a Secure Interface 有权
    用于内存攻击保护的方法和系统以实现安全接口

    公开(公告)号:US20070266438A1

    公开(公告)日:2007-11-15

    申请号:US11558630

    申请日:2006-11-10

    Abstract: Aspects of a method and system for memory attack protection to achieve a secure interface are provided. An integrated memory within a slave device may be configured into a plurality of memory portions or regions by commands from a host device. The memory regions may be utilized during operations associated with authentication of subsequent commands from the host device. A first memory region may enable storage of encrypted host commands and data. A second region may enable storage of decrypted host commands and data. A third region may enable storage of internal variables and/or intermediate results from operations performed by the slave device. Another region may comprise internal registers that enable storage of information only accessible to the slave device. Access to some of the memory regions may be controlled by a bus controller and/or a memory interface integrated within the slave device.

    Abstract translation: 提供了一种用于内存攻击保护以实现安全接口的方法和系统。 从设备中的集成存储器可以通过来自主机设备的命令被配置成多个存储器部分或区域。 可以在与来自主机设备的后续命令的认证相关联的操作期间利用存储器区域。 第一存储器区域可以实现加密的主机命令和数据的存储。 第二区域可以实现解密的主机命令和数据的存储。 第三区域可以实现从设备执行的操作的内部变量和/或中间结果的存储。 另一区域可以包括内部寄存器,其能够存储只能由从设备访问的信息。 访问某些存储区域可以由集成在从设备中的总线控制器和/或存储器接口来控制。

    Method and system for securely loading code in a security processor
    19.
    发明授权
    Method and system for securely loading code in a security processor 有权
    用于在安全处理器中安全加载代码的方法和系统

    公开(公告)号:US08683212B2

    公开(公告)日:2014-03-25

    申请号:US11753338

    申请日:2007-05-24

    CPC classification number: G06F21/6209 G06F21/77

    Abstract: Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys, by a security processor integrated within a chip. The encrypted security data set may be decrypted via the on-chip security processor and the decrypted code set may be validated on-chip using an on-chip locked value. The on-chip locked value may be stored in a one-time programmable read-only memory (OTP ROM) and may include security information generated by applying one or more security algorithms, for example SHA-based algorithms, to the security data set. The encryption of the security data set may utilize various security algorithms, for example AES-based algorithms. The on-chip locked value may be created and locked after a virgin boot of a device that includes the security processor. The security data set may be authenticated during the virgin boot of the device.

    Abstract translation: 在安全处理器中安全地加载代码可以包括通过集成在芯片内的安全处理器来自主地获取可以包括安全代码和/或根密钥的加密安全数据集。 加密的安全数据集可以经由片上安全处理器解密,并且解码的代码集可以使用片上锁定值在片上进行验证。 片上锁定值可以存储在一次性可编程只读存储器(OTP ROM)中,并且可以包括通过将一个或多个安全算法(例如基于SHA的算法)应用于安全数据集而生成的安全信息。 安全数据集的加密可以利用各种安全算法,例如基于AES的算法。 在包含安全处理器的设备的初始引导之后,可以创建和锁定片上锁定值。 安全数据集可以在设备的初始启动期间被认证。

    Method and system for two-stage security code reprogramming
    20.
    发明授权
    Method and system for two-stage security code reprogramming 有权
    二阶段安全码重编程方法与系统

    公开(公告)号:US08572399B2

    公开(公告)日:2013-10-29

    申请号:US11746769

    申请日:2007-05-10

    CPC classification number: H04N21/818 G06F21/572 H04N21/4432 H04N21/4586

    Abstract: A stored predefined unmodifiable bootable code set may be verified during code reprogramming of a device, and executed as a first stage of code reprogramming of the device. The predefined unmodifiable bootable code set may be stored in a locked memory such as a locked flash memory and may comprise code that enables minimal communication functionality of the device. The predefined unmodifiable bootable code set may be verified using a security algorithm, for example, a SHA-based algorithm. Information necessary for the security algorithm may be stored in a memory, for example, a one-time programmable read-only memory (OTP ROM). The stored information necessary for the security algorithm may comprise a SHA digest, a signature, and/or a key. A second stage code set may be verified and executed during the code reprogramming of the device subsequent to the verification of the stored predefined unmodifiable bootable code set.

    Abstract translation: 可以在设备的代码重新编程期间验证存储的预定义的不可修改的可引导代码集,并且作为设备的代码重新编程的第一级被执行。 预定义的不可修改的可引导代码集可以存储在诸如锁定的闪存的锁定存储器中,并且可以包括能够实现设备的最小通信功能的代码。 可以使用安全算法(例如,基于SHA的算法)来验证预定义的不可修改的可引导代码集。 安全算法所需的信息可以存储在存储器中,例如,一次性可编程只读存储器(OTP ROM)。 安全算法所需的存储信息可以包括SHA摘要,签名和/或密钥。 可以在验证存储的预定义的不可修改的可引导代码集之后的设备的代码重新编程期间验证和执行第二阶段代码集。

Patent Agency Ranking