摘要:
Provided is a method by which a cable modem reports a downstream packet resequencing status to a cable modem termination system, and more particularly, a method of effectively reporting detailed information on a packet resequencing status by further defining a packet resequencing-related event and event-related information in a message reporting the packet resequencing status. The method by which a cable modem reports a resequencing status of the resequenced packets includes the steps of: when a packet resequencing-related event occurs, generating a resequencing status message (CM-STATUS) including packet sequence numbers of packets causing the event; transmitting a band allocation request message for requesting a cable modem termination system to allocate an upstream band for transmission of the resequencing status message; and transmitting the resequencing status message to the cable modem termination system over the upstream band allocated by the band allocation request message. More detailed resequencing status information, such as the remaining capacity of the receive buffer and the resequenced packet map, for more packet resequencing-related events compared to the conventional downstream packet resequencing status reporting method, is transmitted to the CMTS, such that the CMTS copes more flexibly with situations that may occur upon packet resequencing.
摘要:
Provided are a transmission apparatus and a transmission method for a subscriber network in a cable network. A passive optical network (GPON) receiver receives data packets through a fiber line using a plurality of optical wavelengths from a head end. A micro cable modem termination system (CMTS) converts the data packets into a data over cable service interface specification (DOCSIS)-based DOCSIS frame and transmits the DOCSIS frame to at least one subscriber device through a coaxial line.
摘要:
Provided is a re-authentication apparatus in a Downloadable Conditional Access System (DCAS), the re-authentication apparatus includes: a receiving unit to receive a key request message from a Secure Micro (SM); a determination unit to determine whether to perform re-authentication depending on downloading of SM client image; an identification unit to identify an SM identifier using the key request message, when the re-authentication is performed as a result of the determination; an extraction unit to retrieve previous session information corresponding to the SM identifier and to extract keying information about the previous session information; and an encryption unit to control an encryption key about the SM client image to be reused, the SM client image being encrypted in a previous session based on the previous session information using the keying information.
摘要:
Provided is a digital cable system and method for protecting a secure micro (SM) client, and more particularly, a digital cable system and method for protecting an SM program that can improve the security of an SM program through authentication of a host and integrity verification of the SM program. A method of protecting an SM program includes: receiving host authentication information associated with a host from a trusted authority; verifying validity of the secure micro program based on the host authentication information; and sending, to an authentication proxy, a HostStateInformation message that includes host state information associated with validity verification information of the SM program.
摘要:
A method of controlling a download load of a Secure Micro (SM) client in a Downloadable Conditional Access System (DCAS) is provided. The method of controlling a download load of an SM client including: analyzing version information of SMs and version information of SM clients to control the download load generated in the DCAS, the version information of the SMs and the version information of the SM clients being provided from an Authentication Proxy (AP) server, and the SM clients being installed in the SMs; determining a download policy associated with a download time of a target SM client for the SMs based on a result of the analysis; and providing the AP server with the determined download policy.
摘要:
A method of verifying a validity of a Secure Micro (SM) is provided. The method of verifying a validity of an SM, the method including: storing and maintaining a validity verification message used to verify the validity of the SM, the validity verification message being generated by a Trusted Authority (TA) based on unique information of the SM, and the SM and the TA sharing the unique information of the SM; and verifying the validity of the SM using the validity verification message and the unique information shared by the SM, when an SM client is executed.
摘要:
Provided are a Downloadable Conditional Access System (DCAS), and a channel setting method and a message format for a 2-way communication between a terminal and an authentication server in the DCAS. The DCAS may include: a verification unit to verify an electronic signature and an integrity with respect to a message received from the authentication server; an extraction unit to extract network access information of the authentication server from the message in which the electronic signature and the integrity are verified; and a channel setting unit to set a communication channel with the authentication server based on the extracted network access information.
摘要:
A method of supporting a mobility of a Downloadable Conditional Access System (DCAS) host is provided. The method includes: by the second authentication proxy server: performing mutual authentication with a secure micro of the host to generate a session key; requesting an integrated personalization system to download a secure micro client to the host, wherein the secure micro client is encoded using the session key; and transmitting, to a DPS, mapping information between the second authentication proxy server and the secure micro of the host, wherein, in response to receiving the mapping information, the DPS instructs a CAS server to transmit an entitlement management message to the network of the second authentication proxy server without transmitting the entitlement management message to the network of the first authentication proxy server.
摘要:
Provided is a method of controlling the flow of downstream traffic in a cable network headend. The method includes the steps of: establishing a session with the modulator; transferring traffic to the modulator over the session; and receiving a buffer-status reporting message reporting the status of a receive buffer from the modulator while transferring the traffic. The method reports buffer-status information of an Edge-Quadrature Amplitude Modulator (E-QAM) to a traffic source, thereby enabling control of the transfer rate of traffic transferred from the traffic source to the E-QAM and preventing overflow/underflow of a receive buffer, packet loss and deterioration of channel use.
摘要:
A device for creating multi-view video contents includes a virtual view position and distribution unit that calculates a plurality of virtual views corresponding to the number of predetermined virtual views based on input information and distributes the calculated positions of the plurality of virtual views to a plurality of view synthesis processing units; a view synthesis processor that operates the plurality of view synthesis processing units in parallel, allows each of the view synthesis processing units to create at least one virtual view video corresponding to a position of at least one virtual view distributed from the virtual view position calculation and distribution unit, and performs partial multiplexing based on at least one created virtual view video; and a video integration unit that integrates a plurality of partially multiplexed videos output from the plurality of view synthesis processing units.