System and method for flexible mapping of AV vs record channels in a programmable transport demultiplexer/PVR engine
    31.
    发明申请
    System and method for flexible mapping of AV vs record channels in a programmable transport demultiplexer/PVR engine 审中-公开
    用于在可编程传输解复用器/ PVR引擎中AV与记录通道的灵活映射的系统和方法

    公开(公告)号:US20070248318A1

    公开(公告)日:2007-10-25

    申请号:US11394877

    申请日:2006-03-31

    Abstract: A method and system are provided for flexible mapping of AV vs. Record channels in a programmable transport demultiplexer/PVR engine. The method may involve processing a portion of an incoming packet, which may result in a partially processed packet. The preprocessing may comprise extracting information from the packet to configure parameters associated with the packet and storing the configured parameters in memory. The configured parameters may be based on the type of the packet, AV v. Record, and used to configure the channels used to transport the packets to decoders and Record engines, respectively. The number of channels used for AV data and the number of channels used for Record data may vary depending on the needs of the system.

    Abstract translation: 提供了一种方法和系统,用于在可编程传输解复用器/ PVR引擎中对AV与记录信道的灵活映射。 该方法可以涉及处理输入分组的一部分,其可能导致部分处理的分组。 预处理可以包括从分组提取信息以配置与分组相关联的参数并将配置的参数存储在存储器中。 配置的参数可以基于分组的类型AV v。Record,并分别用于配置用于将数据包传输到解码器和Record引擎的通道。 用于AV数据的通道数量和用于记录数据的通道数量可能会因系统的需要而有所不同。

    Method and apparatus for demultiplexing, merging, and duplicating packetized elementary stream/program stream/elementary stream data
    32.
    发明申请
    Method and apparatus for demultiplexing, merging, and duplicating packetized elementary stream/program stream/elementary stream data 有权
    用于解复用,合并和复制分组化的基本流/节目流/基本流数据的方法和装置

    公开(公告)号:US20060268942A1

    公开(公告)日:2006-11-30

    申请号:US11394421

    申请日:2006-03-31

    CPC classification number: H04N21/4345 H04N21/434 H04N21/4622

    Abstract: Presented herein are method(s) and apparatus for demultiplexing, merging, and duplicating packetized elementary stream/program stream/elementary stream data. In one embodiment, there is presented a method for processing data. The method comprises receiving a bitstream wherein said bitstream comprises a plurality of streams; mapping the plurality of streams to a plurality of identifiers; packetizing the plurality of streams, thereby resulting in a plurality of packets, and wherein each packet further comprises: a portion of only one of the plurality of streams; and a particular one of the identifiers, wherein the particular one of the identifiers is mapped to the only one of the plurality of streams.

    Abstract translation: 这里提出了用于解复用,合并和复制分组化的基本流/节目流/基本流数据的方法和装置。 在一个实施例中,提供了一种用于处理数据的方法。 该方法包括接收比特流,其中所述比特流包括多个流; 将所述多个流映射到多个标识符; 打包多个流,由此导致多个分组,并且其中每个分组还包括:多个流中仅一个的一部分; 以及特定的一个标识符,其中该特定一个标识符被映射到该多个流中的唯一一个。

    Method and system for architecture of a fast programmable transport demultiplexer using double buffered approach

    公开(公告)号:US20060268927A1

    公开(公告)日:2006-11-30

    申请号:US11348563

    申请日:2006-02-07

    Inventor: Stephane Rodgers

    CPC classification number: H04L69/08 H04N21/42615 H04N21/434 H04N21/44004

    Abstract: A method and system are provided for architecture of a very fast programmable transport demultiplexer using a double-buffered approach. The method may involve utilizing a hardware assist block to process incoming packets, retrieve information about the packets, and write the retrieved information to a memory block. A firmware block may then utilize the information in memory to perform further processing on the packet data. The firmware and hardware assist blocks may work simultaneously so as to speed up the processing of the packet, which can comprise record data and/or audio/video data. The system may comprise the hardware assist block, the firmware assist block, and a memory block.

    Method and system for preventing revocation denial of service attacks

    公开(公告)号:US09338009B2

    公开(公告)日:2016-05-10

    申请号:US11743533

    申请日:2007-05-02

    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.

    Enforcing software updates in an electronic device
    36.
    发明授权
    Enforcing software updates in an electronic device 有权
    在电子设备中执行软件更新

    公开(公告)号:US08954722B2

    公开(公告)日:2015-02-10

    申请号:US13073876

    申请日:2011-03-28

    Abstract: A Set Top Box (STB) or client computer includes a communication interface operable to receive digital messages and digital content, memory operable, and processing circuitry coupled to the communication interface and to the memory. The STB is operable to receive a digital message, extract a key portion from the digital message, extract a rights portion from the digital message, determine a code version based upon the rights portion, read a stored code version from the memory, and compare the code version to the stored code version to validate the software instructions. Upon an unfavorable comparison of the code version to the stored code version, initiates an error action that may include sending a message to a service provider device for software instruction reloading, rebooting, and/or disable decryption of the digital content. Extracting the rights portion from the digital message may include decrypting the key portion to produce a decrypted result and decrypting the rights portion using the decrypted result to produce the decrypted rights portion.

    Abstract translation: 机顶盒(STB)或客户端计算机包括可操作以接收数字消息和数字内容的通信接口,可操作的存储器,以及耦合到通信接口和存储器的处理电路。 STB可操作以接收数字消息,从数字消息中提取密钥部分,从数字消息中提取权限部分,基于权限部分确定代码版本,从存储器读取存储的代码版本,并将 代码版本到存储的代码版本,以验证软件说明。 在代码版本与存储的代码版本的不利比较之间,发起可能包括向服务提供商设备发送消息以进行软件指令重新加载,重新启动和/或禁用数字内容的解密的错误动作。 从数字消息中提取权限部分可以包括解密密钥部分以产生解密结果,并且使用解密结果解密权限部分以产生解密权限部分。

    Method and system for securely loading code in a security processor
    37.
    发明授权
    Method and system for securely loading code in a security processor 有权
    用于在安全处理器中安全加载代码的方法和系统

    公开(公告)号:US08683212B2

    公开(公告)日:2014-03-25

    申请号:US11753338

    申请日:2007-05-24

    CPC classification number: G06F21/6209 G06F21/77

    Abstract: Securely loading code in a security processor may include autonomous fetching an encrypted security data set, which may comprise security code and/or root keys, by a security processor integrated within a chip. The encrypted security data set may be decrypted via the on-chip security processor and the decrypted code set may be validated on-chip using an on-chip locked value. The on-chip locked value may be stored in a one-time programmable read-only memory (OTP ROM) and may include security information generated by applying one or more security algorithms, for example SHA-based algorithms, to the security data set. The encryption of the security data set may utilize various security algorithms, for example AES-based algorithms. The on-chip locked value may be created and locked after a virgin boot of a device that includes the security processor. The security data set may be authenticated during the virgin boot of the device.

    Abstract translation: 在安全处理器中安全地加载代码可以包括通过集成在芯片内的安全处理器来自主地获取可以包括安全代码和/或根密钥的加密安全数据集。 加密的安全数据集可以经由片上安全处理器解密,并且解码的代码集可以使用片上锁定值在片上进行验证。 片上锁定值可以存储在一次性可编程只读存储器(OTP ROM)中,并且可以包括通过将一个或多个安全算法(例如基于SHA的算法)应用于安全数据集而生成的安全信息。 安全数据集的加密可以利用各种安全算法,例如基于AES的算法。 在包含安全处理器的设备的初始引导之后,可以创建和锁定片上锁定值。 安全数据集可以在设备的初始启动期间被认证。

    Method and system for two-stage security code reprogramming
    38.
    发明授权
    Method and system for two-stage security code reprogramming 有权
    二阶段安全码重编程方法与系统

    公开(公告)号:US08572399B2

    公开(公告)日:2013-10-29

    申请号:US11746769

    申请日:2007-05-10

    CPC classification number: H04N21/818 G06F21/572 H04N21/4432 H04N21/4586

    Abstract: A stored predefined unmodifiable bootable code set may be verified during code reprogramming of a device, and executed as a first stage of code reprogramming of the device. The predefined unmodifiable bootable code set may be stored in a locked memory such as a locked flash memory and may comprise code that enables minimal communication functionality of the device. The predefined unmodifiable bootable code set may be verified using a security algorithm, for example, a SHA-based algorithm. Information necessary for the security algorithm may be stored in a memory, for example, a one-time programmable read-only memory (OTP ROM). The stored information necessary for the security algorithm may comprise a SHA digest, a signature, and/or a key. A second stage code set may be verified and executed during the code reprogramming of the device subsequent to the verification of the stored predefined unmodifiable bootable code set.

    Abstract translation: 可以在设备的代码重新编程期间验证存储的预定义的不可修改的可引导代码集,并且作为设备的代码重新编程的第一级被执行。 预定义的不可修改的可引导代码集可以存储在诸如锁定的闪存的锁定存储器中,并且可以包括能够实现设备的最小通信功能的代码。 可以使用安全算法(例如,基于SHA的算法)来验证预定义的不可修改的可引导代码集。 安全算法所需的信息可以存储在存储器中,例如,一次性可编程只读存储器(OTP ROM)。 安全算法所需的存储信息可以包括SHA摘要,签名和/或密钥。 可以在验证存储的预定义的不可修改的可引导代码集之后的设备的代码重新编程期间验证和执行第二阶段代码集。

    Method and system for memory attack protection to achieve a secure interface
    39.
    发明授权
    Method and system for memory attack protection to achieve a secure interface 有权
    用于内存攻击保护的方法和系统,实现安全的接口

    公开(公告)号:US08032761B2

    公开(公告)日:2011-10-04

    申请号:US11558630

    申请日:2006-11-10

    Abstract: Aspects of a method and system for memory attack protection to achieve a secure interface are provided. An integrated memory within a slave device may be configured into a plurality of memory portions or regions by commands from a host device. The memory regions may be utilized during operations associated with authentication of subsequent commands from the host device. A first memory region may enable storage of encrypted host commands and data. A second region may enable storage of decrypted host commands and data. A third region may enable storage of internal variables and/or intermediate results from operations performed by the slave device. Another region may comprise internal registers that enable storage of information only accessible to the slave device. Access to some of the memory regions may be controlled by a bus controller and/or a memory interface integrated within the slave device.

    Abstract translation: 提供了一种用于内存攻击保护以实现安全接口的方法和系统。 从设备中的集成存储器可以通过来自主机设备的命令被配置成多个存储器部分或区域。 可以在与来自主机设备的后续命令的认证相关联的操作期间利用存储器区域。 第一存储器区域可以实现加密的主机命令和数据的存储。 第二区域可以实现解密的主机命令和数据的存储。 第三区域可以实现从设备执行的操作的内部变量和/或中间结果的存储。 另一区域可以包括内部寄存器,其能够存储只能由从设备访问的信息。 访问某些存储区域可以由集成在从设备中的总线控制器和/或存储器接口来控制。

    METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM
    40.
    发明申请
    METHOD AND SYSTEM FOR NAND FLASH SUPPORT IN AN AUTONOMOUSLY LOADED SECURE REPROGRAMMABLE SYSTEM 有权
    在自动加载的安全可重构系统中的NAND闪存支持的方法和系统

    公开(公告)号:US20110197054A1

    公开(公告)日:2011-08-11

    申请号:US13034176

    申请日:2011-02-24

    CPC classification number: G06F21/575 G06F21/572

    Abstract: A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.

    Abstract translation: 引导代码可以被分段以允许以可以通过安全子系统自主地取出和组合引导代码来实现安全系统引导的方式来分离和独立地存储代码段。 出于安全考虑,代码获取可能需要完成,而主CPU不会在芯片上运行。 由于引导代码可能存储在需要特殊软件应用程序的存储器件中以解决数据和/或代码的不连续存储,例如需要诸如坏块管理的应用的NAND闪存,存储在 保证可用的区域可以分开和独立地加载剩余段。 可以验证每个代码段,其中代码段的验证可以包括使用基于硬件的签名。

Patent Agency Ranking