System and Method for Implementing Content and Network Security Inside a Chip
First Claim
Patent Images
1. A system comprising:
- a communication chip comprising;
a router configured to intercept untrusted data between the communication chip and a first processor; and
security instructions; and
a second processor configured to receive the untrusted data from the router, to process the untrusted data with the security instructions to produce trusted data, and to provide the trusted data to the router.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing content, streaming, and network security inside a chip or inside a computing device are disclosed. In exemplary embodiments, a system comprises a communication chip and a second processor. The communication chip comprises a router and security instructions. The router is configured to intercept untrusted data between a network, and a first router. The second processor is configured to receive the untrusted data from the router, process the untrusted data with the security instructions to produce trusted data, and provide the trusted data to the router.
-
Citations
37 Claims
-
1. A system comprising:
-
a communication chip comprising; a router configured to intercept untrusted data between the communication chip and a first processor; and security instructions; and a second processor configured to receive the untrusted data from the router, to process the untrusted data with the security instructions to produce trusted data, and to provide the trusted data to the router. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a computing device comprising; an internal bus; a first processor communicatively coupled to the internal bus; a memory module communicatively coupled to the internal bus; a storage module communicatively coupled to the internal bus; a communication module communicatively coupled to the internal bus; a router configured to intercept untrusted data between the first processor and the memory module, the storage module, or the communication module; and security instructions; and a second processor configured to receive the untrusted data from the router, to process the untrusted data with the security instructions to produce trusted data, and to provide the trusted data to the router. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a flash memory device comprising; flash memory media; a router configured to intercept untrusted data between a first processor and the flash memory media; and security instructions; and a second processor configured to receive the untrusted data from the router, to process the untrusted data with the security instructions to produce trusted data, and to provide the trusted data to the router. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A method comprising:
-
storing security instructions; loading the security instructions into a memory; executing the security instructions with a second processor; intercepting untrusted data between a network and a first processor with a router in a communication chip; routing the untrusted data from the router to the second processor; processing the untrusted data with the second processor executing the security instructions to produce trusted data; and providing the trusted data from the second processor to the router. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
-
29. A method comprising:
-
storing security instructions; loading the security instructions into a memory; executing the security instructions with a second processor; intercepting untrusted data between a first processor and flash memory media with a router contained in a flash memory device; routing the untrusted data from the router to the second processor; processing the untrusted data with the second processor executing the security instructions to produce trusted data; and providing the trusted data from the second processor to the router. - View Dependent Claims (30, 31, 32, 33, 34, 35)
-
-
36. Computer readable medium configured to store instructions in a communication chip, the instructions executable by a second processor to perform a method, the method comprising:
-
before reaching a destination, intercepting untrusted data between a network and a first processor within in a communication chip; routing the untrusted data to the second processor; processing the untrusted data with the second processor executing the security instructions to produce trusted data; and providing the trusted data from the second processor to the data'"'"'s destination.
-
-
37. Computer readable medium configured to store instructions in a flash memory device, the instructions executable by a second processor to perform a method, the method comprising:
-
before reaching a destination, intercepting untrusted data between a first processor and flash memory media within the flash memory device; routing the untrusted data to the second processor; processing the untrusted data with the second processor executing the security instructions to produce trusted data; and providing the trusted data from the second processor to the data'"'"'s destination.
-
Specification