Patent application number | Description | Published |
20080320263 | METHOD, SYSTEM, AND APPARATUS FOR ENCRYPTING, INTEGRITY, AND ANTI-REPLAY PROTECTING DATA IN NON-VOLATILE MEMORY IN A FAULT TOLERANT MANNER - According to some embodiments, a method for providing encryption, integrity, and anti-replay protection of data in a fault tolerant manner is disclosed. A data blob and an anti-replay table blob are copied to a temporary storage region in a non-volatile memory. In an atomic operation, a status indicator is set and a monotonic counter is incremented after the data blob and the anti-replay table blob are copied to the temporary storage region. If a fault occurs while the status indicator is set, the data blob and the anti-replay table blob may be recovered from the temporary storage region. | 12-25-2008 |
20100329455 | Cryptographic key generation using a stored input value and a stored count value - Embodiments of an invention for cryptographic key generation using a stored input value and a stored count value have been described. In one embodiment, a processor includes non-volatile storage storing an input value and a count value, and logic to generate a cryptographic key based on the stored input value and the stored count value. | 12-30-2010 |
20110299680 | Methods and Apparatuses for Securing Playback Content - An apparatus for secured playback is presented. In one embodiment, the apparatus includes a controller that includes a key derivation module to manage authentication and key derivation. In one embodiment, the apparatus provides a video decryption key to a graphics engine if video data portions in a data stream are retrievable without having to decrypt the data stream. In one embodiment, the apparatus also includes a decryption module to decrypt a part of data in conjunction with an encryption key to generate video information and video data. The controller then writes an encrypted version of the video data to a video buffer of a graphics engine. | 12-08-2011 |
20120137137 | METHOD AND APPARATUS FOR KEY PROVISIONING OF HARDWARE DEVICES - Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform. | 05-31-2012 |
20120155633 | AUDIO CONTENT PROTECTION - In some embodiments an embedded processor is to participate in cryptographic key exchange with an audio software application, and a key exchange communication path is coupled between the audio software application and the embedded processor. Other embodiments are described and claimed. | 06-21-2012 |
20120159128 | Handling Media Streams In A Programmable Bit Processor - In one embodiment, the present invention is directed to a bit processor that includes an execution unit to, responsive to an instruction for access of data of a first bit width, access data of a second bit width, the second bit width having a different number of bits than the first bit width when some of the data accessed includes non-stream data. Other embodiments are described and claimed. | 06-21-2012 |
20120173877 | METHOD AND APPARATUS FOR BUILDING A HARDWARE ROOT OF TRUST AND PROVIDING PROTECTED CONTENT PROCESSING WITHIN AN OPEN COMPUTING PLATFORM - A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software. | 07-05-2012 |
20130283392 | METHOD AND APPARATUS FOR POLICY-BASED CONTENT SHARING IN A PEER TO PEER MANNER USING A HARDWARE BASED ROOT OF TRUST - Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license. | 10-24-2013 |
20140006760 | OUT-OF-BAND HOST OS BOOT SEQUENCE VERIFICATION | 01-02-2014 |
20140089659 | Method and apparatus for key provisioning of hardware devices - Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform. | 03-27-2014 |
20140089660 | ENHANCED PRIVACY ID BASED PLATFORM ATTESTATION - As opposed to utilizing a manufacturer provisioned EK Certificate for AIK processes, embodiments of the invention utilize EPID based data. EPID mitigates the privacy issues of common RSA PKI security implementations where every individual is uniquely identified by their private keys. Instead, EPID provides the capability of remote attestation but only identifies the client computing system as having a component (such as a chipset) from a particular technology generation. EPID is a group signature scheme, where one group's public key corresponds to multiple private keys, and private keys generate a group signature which is verified by the group public key. EPID provides the security property of being anonymous and unlinkable—given two signatures, one cannot determine whether the signatures are generated from one or two private keys. EPID also provides the security property of being unforgeable—without a private key, one cannot create a valid signature. | 03-27-2014 |
20140109170 | UNAUTHORIZED ACCESS AND/OR INSTRUCTION PREVENTION, DETECTION, AND/OR REMEDIATION, AT LEAST IN PART, BY STORAGE PROCESSOR - An embodiment may include a storage processor that may be comprised, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute at least one host operating system (OS). The storage processor may execute at least one operation in isolation from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may facilitate, at least in part: (1) prevention, at least in part, of unauthorized access to storage, (2) prevention, at least in part, of execution by the at least one host CPU of at least one unauthorized instruction, (3) detection, at least in part, of the at least one unauthorized instruction, and/or (4) remediation, at least in part, of at least one condition associated, at least in part, with the at least unauthorized instruction. | 04-17-2014 |
20140112471 | Method and Apparatus for Building a Hardware Root of Trust and Providing Protected Content Processing Within an Open Computing Platform - A system architecture provides a hardware-based root of trust solution for supporting distribution and playback of premium digital content. In an embodiment, hardware root of trust for digital content and services is a solution where the basis of trust for security purposes is rooted in hardware and firmware mechanisms in a client computing system, rather than in software. From this root of trust, the client computing system constructs an entire media processing pipeline that is protected for content authorization and playback. In embodiments of the present invention, the security of the client computing system for content processing is not dependent on the operating system (OS), basic input/output system (BIOS), media player application, or other host software. | 04-24-2014 |
20140157404 | VIRTUALIZING A HARDWARE MONOTONIC COUNTER - Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed. | 06-05-2014 |
Patent application number | Description | Published |
20090074080 | Estimating Complexity of Video Frames for Encoding - Complexity for a video frame after a special event is estimated and used for encoding the frame. The complexity for a key frame of a special event is estimated based on its intra activity and a complexity of a previously encoded key frame in the video stream prior to the special event. The complexity for a dependent frame after a special event is estimated based on a motion estimation cost for the dependent frame and a complexity of a previously encoded dependent frame prior to the special event. | 03-19-2009 |
20100091888 | Multi-Rate Encoder with GOP Alignment - A multi-rate encoder includes one or more encoder sets. Each encoder set includes multiple encoders receiving a same video source stream. The encoder sets are configured to transmit multiple encoded streams of the same video source stream at different bit-rates. The streams are aligned and transmitted from the multi-rate encoder. | 04-15-2010 |
20100329340 | METHOD AND APPARATUS FOR ELIMINATING ENCODING DELAY WHEN A TELECINE SOURCE MATERIAL IS DETECTED - A video encoder includes an inverse telecine detector for receiving video frames and generating a telecine detection signal identifying repeated frames and an encoder pipeline buffer for storing unrepeated video frames received from the inverse telecine detector. The video encoder also includes an encoder engine for encoding the unrepeated video frames received from the encoder pipeline buffer, a pre-encoded frame storage medium for storing pre-encoded frames, and a processor. The processor is configured to cause the encoder engine to replace selected frames that have been identified as repeating frames by the inverse telecine detector with a pre-encoded frame accessed from the pre-encoded frame storage medium. | 12-30-2010 |
20110119064 | AUDIO DATA BIT RATE DETECTOR - A detector for determining an audio data bit rate of a pre-compressed audio elementary stream (AES), in which the pre-compressed AES includes a plurality of preamble length fields is provided. The detector includes an analyzer module configured to determine one or more candidate audio data bit rates of the AES from the plurality of preamble length fields, a detector module configured to determine whether one or more of the candidate audio data bit rates are correct, and a selector module configured to select one of the one or more candidate audio data bit rates determined to be correct as the audio data bit rate of the pre-compressed AES. | 05-19-2011 |
20130064308 | CODING AND DECODING SYNCHRONIZED COMPRESSED VIDEO BITSTREAMS - Coding may include receiving a source video bitstream including source frames and determining information from the source frames. The determined information may include timing information and grouping information and may be utilized in encoding synchronizing processed frames for a synchronized compressed video bitstream. Decoding may include receiving a synchronized compressed video bitstream including the encoding synchronizing processed frames. The decoding may include preparing video chunk files having boundaries defined by the encoding synchronizing processed frames and decoding the prepared video chunk files. | 03-14-2013 |
20130083859 | METHOD TO MATCH INPUT AND OUTPUT TIMESTAMPS IN A VIDEO ENCODER AND ADVERTISEMENT INSERTER - A method, a video processing system, and an electronic device are disclosed. A video transcoder may decode a compressed video data frame creating a decoded video data frame. The video transcoder may embed a network presentation timestamp in the decoded video data frame. The video transcoder may re-encode the decoded video data frame creating a transcoded video data frame. A field programmable gate array may compare the network presentation timestamp with a transcoder presentation timestamp to determine a timestamp offset. | 04-04-2013 |
20140112384 | ALGORITHMS FOR DETERMINING BITRATE FOR A STATISTICAL MULTIPLEXING SYSTEM USING SCENE CHANGE - An improved statistical multiplexer (statmux) system for coding and multiplexing multiple channels of standard definition (SD) digital television data, or multiple panels of high definition (HD) digital television data is provided, the system considering when a scene change occurs. A need parameter (NP) is determined for each of the multiple encoders considering scene change that occur, and the NP is provided to a statmux controller to enable a bit rate to be determined for the encoder. The system considers the new scene data after a scene change as well as current scene data being evaluated to determine data complexity for the NP value. This ensures significantly different complexity data after the scene change does not cause an inadequate bit rate determination. | 04-24-2014 |
20140112385 | ALGORITHMS FOR DETERMINING BITRATE FOR A STATISTICAL MULTIPLEXING SYSTEM TO ENSURE STREAM ALIGNMENT FROM ENCODERS TO THE MULTIPLEXER - A statistical multiplexer (statmux) system for encoding and multiplexing multiple channels of digital television data is provided that limits dropped bits due to misalignment of bit rate allocations to the encoders. Without such a system, if for example an encoder is allotted 0 bits during a first time period and 20 kilobits during a second time period, if the encoder jumps ahead from the first period to the second time period allocation, the 20 kilobits could be output during the 0 bit output allocation time period. This can cause buffer overflow downstream if other encoders are outputting at their maximum rate. To limit such misalignment, a maximum percentage increase of an encoder's bitrate allocation is set from time period to time period based on a formula to prevent bits from being dropped when misalignment occurs. | 04-24-2014 |
20140112386 | ALGORITHMS FOR DETERMINING BITRATE FOR A STATISTICAL MULTIPLEXING SYSTEM TO ACCOUNT FOR SIGNAL COMPLEXITY INCLUDING FILM MODE AND GOP STRUCTURAL CHANGES - A statistical multiplexer (statmux) system for encoding multiple channels of digital television data is provided with improved algorithms for determining bitrate for encoding and decoding to account for signal complexity, including accounting for film mode and GOP structural changes. In film mode when the lower frame per second rate for film mode is identified, rather than faster rate SD or HD modes, instead of determining bit rate from viewing the next picture in the look ahead buffer (LAB), the system looks at a start time stamp for specific data in the LAB. Accounting for GOP structural changes includes identifying the number of pictures (N) between I type pictures in data provided to an encoder and the number of pictures (M) between P type pictures, rather than using a fixed number for N and M. | 04-24-2014 |