摘要:
A system containing both software and hardware to perform secure operations especially suited for Digital Right Management. The system has hardware to accelerate Elliptic Curve calculations, hash algorithms, and various encryption algorithms. The system runs on encrypted software, and the software is checked for integrity before it boots.
摘要:
Disclosed are a method for writing data into a first storage on a chip and a system thereof. The method includes storing an initial firmware into a second storage on the chip, programming the first storage according to a specific data by utilizing the initial firmware, and blocking further programming operations applied to at least part of the specific data after the specific data is successfully stored in the first storage. Therefore the invention can save the external pin connections of the chip to prevent computer hackers from accessing or changing the content of the storage.
摘要:
An embedded system and an interruption handling method are provided. A plurality of interruption requests are received, and corresponding service routines are triggered with priority control. In the embedded system, a memory device comprises a plurality of service routines stored at different entry addresses, each related to an interruption request. A processor receives an enable signal to initialize one of the service routines through a branch instruction. A control unit buffers the interruption requests to schedule executions of corresponding service routines. When a specific service routine is to be executed, the control unit provides the branch instruction pointing to entry address of the specific service routine and asserts the enable signal to the processor, such that the processor executes the branch instruction to initialize the specific service routine.
摘要:
An electronic system includes two or more peripheral devices or units each of which is electronically coupled to the host through a single port of a predetermined bus. By splitting commands from the host to at least one of the two or more peripheral units into subcommands or by repeating commands, the data bus will be released for another command to another device or unit, the overall system efficiency is thus improved.
摘要:
A method for obtaining a firmware image from a second encrypted data having an encrypted firmware image. The encrypted firmware image is generated from the firmware image sequentially encrypted utilizing a first encryption key and a second encryption key. The first encryption key is specified for securing the firmware image. The second encryption key is specified for securing a distribution of the firmware image. The method includes: providing a second decryption key specified for decrypting the second encrypted data; decrypting at least the encrypted firmware image utilizing the second decryption key to generate a first encrypted data; providing a first decryption key specified for decrypting the first encrypted data; and decrypting the first encrypted data utilizing the first decryption key to obtain the firmware image.
摘要:
An electronic system includes two or more peripheral devices or units each of which is electronically coupled to the host through a single port of a predetermined bus. By splitting commands from the host to at least one of the two or more peripheral units into subcommands or by repeating commands, the data bus will be released for another command to another device or unit, the overall system efficiency is thus improved.
摘要:
A data recording control method for an optical recording system is provided. The optical recording system includes a host and an optical recording device. The method first provides a set of preferences about a write strategy learning at the host. Then, at the optical recording device, the method performs the write strategy learning, according to the set of preferences, to generate an updated write strategy for recording data on an optical storage medium.