Configurable Encryption/Decryption for Multiple Services Support
3 Assignments
0 Petitions
Accused Products
Abstract
A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
9 Citations
26 Claims
-
1-13. -13. (canceled)
-
14. A method of allocating resources comprising:
-
allocating a memory with a first set of decryption data corresponding to a first-level-of-encryption; receiving from an originating source a first data stream having the first-level-of-encryption and a first number of services of at least two different service types; re-allocating the memory with a second set of decryption data corresponding to a second-level-of-encryption, the e second-level-of-encryption being different from said the first-level-of-encryption of the first data stream; and receiving from the originating source a second data stream having the second-level-of-encryption and a second number of services of at least two different service types that is different from the first number of services; and storing in memory said first set of decryption data corresponding to a first level of encryption and second set of decryption data corresponding to said second level of encryption. - View Dependent Claims (15, 16, 17)
-
-
18-23. -23. (canceled)
-
24. A method of processing received data comprising:
-
storing a first set of decryption data associated with a first data stream wherein the first data stream includes a first number of services; receiving the first data stream wherein the first data stream has a first-level-of-encryption; decrypting the first data stream using the first set of decryption data; storing a second set of decryption data associated with a second data stream wherein the second data stream includes a second number of services; receiving the second data stream wherein the second data stream has a second-level-of-encryption; decrypting the second data stream using the second set of decryption data; and utilizing a common memory to decrypt the first data stream and the second data stream. - View Dependent Claims (25, 26)
-
Specification