会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and apparatus for constructing an access control matrix for a set-top box security processor
    • 一种用于构建机顶盒安全处理器的访问控制矩阵的方法和装置
    • US07844996B2
    • 2010-11-30
    • US11136027
    • 2005-05-23
    • Xuemin ChenIue-Shuenn ChenShee-Yen TanHongbo ZhuQiang Ye
    • Xuemin ChenIue-Shuenn ChenShee-Yen TanHongbo ZhuQiang Ye
    • G06F7/04
    • G06F21/71G06F2221/2141H04N21/43607H04N21/4623
    • In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode.
    • 在需要安全访问的多媒体系统中,提供了一种用于构建用于机顶盒安全处理器的访问控制矩阵的方法和装置。 安全处理器可以包括多个安全组件,并且可以支持多个用户模式。 对于支持的每个用户模式,可以生成至少一个访问规则表以指示对安全处理器中的安全组件的访问规则。 访问控制列表包括关于针对安全处理器中的安全组件的特定用户模式的访问规则的信息。 可以基于由安全组件支持的用户模式的访问控制列表来生成访问控制矩阵。 访问控制矩阵可以被实现和/或存储在安全处理器中,以验证用户模式的访问权限。
    • 4. 发明申请
    • Method and System For Multi-Level Security Initialization and Configuration
    • 多级安全初始化和配置的方法和系统
    • US20070294745A1
    • 2007-12-20
    • US11682544
    • 2007-03-06
    • Shee-Yen TanXuemin ChenIue-Shuenn ChenQiang Ye
    • Shee-Yen TanXuemin ChenIue-Shuenn ChenQiang Ye
    • H04L9/32
    • G06F21/85G06F21/74H04N21/4623H04N21/4751
    • Aspects of a method and system for multi-level security initialization and configuration are provided. A security system may comprise a security processor, a host processor, and at least one security component, such as a descrambler. The security processor may enable a security component based on information stored within a non-volatile memory integrated within the security processor. The host processor may enable generation of at least one configuration command communicated to the security processor for configuring the enabled security component. The configuration command may correspond to a security control operational mode for the security component that may indicate, for example, activation or deactivation of the security component. The security processor may authenticate a digital signature in the configuration command. Initialization and configuration may be performed during a system boot sequence of the security system.
    • 提供了一种用于多级安全初始化和配置的方法和系统。 安全系统可以包括安全处理器,主机处理器和至少一个安全组件,例如解扰器。 安全处理器可以基于存储在集成在安全处理器内的非易失性存储器内的信息来启用安全组件。 主机处理器可以实现传送到安全处理器的至少一个配置命令的生成,用于配置启用的安全组件。 配置命令可以对应于可以指示例如安全组件的激活或去激活的安全组件的安全控制操作模式。 安全处理器可以在配置命令中认证数字签名。 可以在安全系统的系统引导顺序期间执行初始化和配置。
    • 7. 发明申请
    • METHOD AND SYSTEM FOR TWO-STAGE SECURITY CODE REPROGRAMMING
    • 用于两级安全代码转换的方法和系统
    • US20080086628A1
    • 2008-04-10
    • US11746769
    • 2007-05-10
    • Stephane RodgersAndrew DellowXuemin ChenIue-Shuenn Chen
    • Stephane RodgersAndrew DellowXuemin ChenIue-Shuenn Chen
    • G06F9/00
    • H04N21/818G06F21/572H04N21/4432H04N21/4586
    • A stored predefined unmodifiable bootable code set may be verified during code reprogramming of a device, and executed as a first stage of code reprogramming of the device. The predefined unmodifiable bootable code set may be stored in a locked memory such as a locked flash memory and may comprise code that enables minimal communication functionality of the device. The predefined unmodifiable bootable code set may be verified using a security algorithm, for example, a SHA-based algorithm. Information necessary for the security algorithm may be stored in a memory, for example, a one-time programmable read-only memory (OTP ROM). The stored information necessary for the security algorithm may comprise a SHA digest, a signature, and/or a key. A second stage code set may be verified and executed during the code reprogramming of the device subsequent to the verification of the stored predefined unmodifiable bootable code set.
    • 可以在设备的代码重新编程期间验证存储的预定义的不可修改的可引导代码集,并且作为设备的代码重新编程的第一级被执行。 预定义的不可修改的可引导代码集可以存储在诸如锁定的闪存的锁定存储器中,并且可以包括能够实现设备的最小通信功能的代码。 可以使用安全算法(例如,基于SHA的算法)来验证预定义的不可修改的可引导代码集。 安全算法所需的信息可以存储在存储器中,例如,一次性可编程只读存储器(OTP ROM)。 安全算法所需的存储信息可以包括SHA摘要,签名和/或密钥。 可以在验证存储的预定义的不可修改的可引导代码集之后的设备的代码重新编程期间验证和执行第二阶段代码集。
    • 10. 发明授权
    • Method and system for improved fault tolerance in distributed customization controls using non-volatile memory
    • 使用非易失性存储器的分布式定制控制中改进容错的方法和系统
    • US09497022B2
    • 2016-11-15
    • US11558360
    • 2006-11-09
    • Iue-Shuenn ChenXuemin Chen
    • Iue-Shuenn ChenXuemin Chen
    • H04L29/06H04L9/00
    • H04L9/004H04L2209/12
    • Certain aspects of a method and system for improved fault tolerance in distributed customization controls using non-volatile memory are disclosed. Aspects of one method may include mapping an input control signal to a plurality of input logic circuits within a security processor. A plurality of independent processing paths may be defined between each of the plurality of input logic circuits and an output logic circuit. Each of the plurality of independent processing paths may comprise one or more logic circuits. The input control signal may be routed via at least a portion of the plurality of independent processing paths. The portion of the plurality of independent processing paths may be combined in the output logic circuit to generate the input control signal.
    • 公开了使用非易失性存储器的分布式定制控制中用于改进容错的方法和系统的某些方面。 一种方法的方面可以包括将输入控制信号映射到安全处理器内的多个输入逻辑电路。 可以在多个输入逻辑电路中的每一个和输出逻辑电路之间定义多个独立的处理路径。 多个独立处理路径中的每一个可以包括一个或多个逻辑电路。 输入控制信号可以经由多个独立处理路径的至少一部分路由。 多个独立处理路径的部分可以组合在输出逻辑电路中以产生输入控制信号。