摘要:
Synchronization (sync) marks on a digital-versatile disk (DVD) optical disk are initially detected and later used to adjust bit timing after jitter has occurred. Each DVD physical sector contains many sync marks in a predefined sequence. Each sync mark has a sync-code field that varies for the sync marks in a sector, and a fixed sync pattern that is constant for all sync marks. The first sync mark is detected at initialization by detecting a previous sequence of sync codes of sync marks that precede the first sync mark. The sequence is programmable so that one to seven sync marks are in the sequence searched for. Detection for sync marks with bit errors can still occur since a programmable number of bit errors are allowed in each sync code and in the fixed sync pattern. One of the sync codes can be missed in the sequence and detection still made, allowing tolerance of errors in the sync marks when longer sequences of sync codes are matched. Once initial sync is made, the bit timing is adjusted when too many pseudo-sync clocks are inserted for sync marks missed due to jitter. An early and a late window around the expected sync point are used to enable re-sync to a detected fixed sync pattern.
摘要:
An optical disk controller reads CD-ROM disks at high speeds that commonly produce errors. Errors in the headers that identify sectors are tolerated by the sector-search hardware. The disk-controller firmware writes a virtual target register the previous sector's header's minutes, seconds, frame (MSF), which is one less that the desired sector's MSF, or MSF-1. A physical target that precedes the virtual target is searched for. The physical target precedes the desired sector by N sectors, so that the physical target is MSF-N. When the physical target matches a header read from the disk, a good sector found flag is set. The physical target is then incremented for each new sector and compared to the virtual target. Once the physical target matches the virtual target, the following sector is buffered to the host. The raw header from the disk is stored and error corrections are made using the error correction byte following the sector's data. The corrected raw header is compared to the virtual target to determine if the correct sector was captured. The virtual target is also incremented so that all following sectors that are transferred to the host can also have their headers checked.
摘要:
The present invention provides a method and system for syndrome generation for data from an optical media. The method includes reading data bytes for a plurality of columns of a row of the data; reading a plurality of partial syndromes from a memory, each of the plurality of partial syndromes corresponding to one of the plurality of columns; updating each of the plurality of partial syndromes with the data byte of the corresponding column; and writing the plurality of updated partial syndromes into the memory. The present invention obtains data bytes for multiple columns at one time. Syndrome generation is then performed for each column, with the partial syndromes for each column stored in a memory. As the data bytes of subsequent rows of data for multiple columns are obtained, the partial syndromes for each column are read from the memory and loaded into a syndrome generation logic, thus updating the partial syndrome for each column. The updated syndromes are written back into the memory. This continues until the syndromes for all of the rows for the multiple columns have been generated. By storing partial syndromes in a memory, multiple sets of syndrome generation logic is not needed to simultaneously process multiple columns of data bytes, thus avoiding a space penalty for the controller. Since multiple columns are read at one time, fewer clock cycles are required to access the data bytes, saving time. Therefore, clock cycle penalties are decreased while also avoiding a space penalty for the controller.
摘要:
A demodulator for digital-versatile disk (DVD) optical disks converts 16-bit codewords stored on the disk into 8-bit symbols or user bytes that are sent to the host after error correction. Rather than use the modulation tables in the DVD specification in reverse, the entries in the modulation table are sorted and combined. The four states stored in the DVD modulation table are reduced to two states or conditions. All entries from states 1 and 4 are sorted into unique tables that have unique mappings of codewords to symbols. Since the unique mappings are not sequence or state dependent, no state information is stored in the unique tables. Entries from states 2 and 3 are sorted into duplicates tables that have duplicate mappings, where a codeword can map to two different symbols, depending on the state sequence. One of the two symbols is chosen based on bits in the following codeword, which is the next state. The next state is stored with each entry in the duplicates tables, while all current state information is deleted from all tables. The main modulation table is reduced from 1024 entries to 541 in the main unique and duplicates demodulation tables, while a substitute modulation table is reduced from 348 to 209 entries in the substitute unique and duplicates tables. Table size is reduced by 45%.
摘要:
In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key generation module is to generate a key using the first key portion from the programmable memory and a second key portion received via a memory interface. The module is to encrypt or decrypt data using the key.
摘要:
Devices, systems, methods, and other embodiments associated with processing commands according to authorization are described. In one embodiment, a chip includes a secure module configured to store secure firmware, and to execute the secure firmware. The secure firmware prevents the secure module from at least partially processing a command that originated from an untrusted source. The chip also includes an unsecure module configured to store unsecure firmware, and to execute the unsecure firmware. The unsecure firmware permits the unsecure module to process a command having originated from an untrusted source. The chip is configured where the unsecure firmware is separately updateable from the secure firmware.