Compresses video decompression system with encryption of compressed data stored in video buffer
First Claim
1. A secure computing system comprising:
- a data processor disposed on a single integrated circuit, said data processor including a read only memory storing a decryption key, and a chip identity read only register storing a unique chip identity number accessible by said data processor;
a memory bidirectionally coupled to said data processor and storing data;
said data processor being programmed to;
receive encrypted and compressed data, decrypt said encrypted and compressed data employing said decryption key stored in said read only memory, employ said memory as a first-in-first-out buffer including encrypting said decrypted data employing at least a part of said chip identity number as encryption key, storing said encrypted data in said memory, recalling said stored data from said memory, and decrypting said recalled data employing at least a part of said chip identity number as decryption key, decompress said decrypted data recalled from said memory, and output decompressed data.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure computing system prevents unauthorized use of compressed video data stored in a first-in-first-out memory buffer in a set top box. A single integrated circuit includes a data processor and a chip identity read only register storing a unique chip identity number fixed during manufacture. The data processor encrypts the compressed video data stream using the chip identity number as an encryption key. This encrypted data is stored in and recalled from a FIFO buffer. The data processor then decrypts the recalled data employing at least a part of the chip identity number as the decryption key. Using technique the compressed video data stream temporarily stored in compressed form in the FIFO buffer can only be employed by the particular data processor having the unique chip identity number.
-
Citations
10 Claims
-
1. A secure computing system comprising:
-
a data processor disposed on a single integrated circuit, said data processor including a read only memory storing a decryption key, and a chip identity read only register storing a unique chip identity number accessible by said data processor;
a memory bidirectionally coupled to said data processor and storing data;
said data processor being programmed to;
receive encrypted and compressed data, decrypt said encrypted and compressed data employing said decryption key stored in said read only memory, employ said memory as a first-in-first-out buffer including encrypting said decrypted data employing at least a part of said chip identity number as encryption key, storing said encrypted data in said memory, recalling said stored data from said memory, and decrypting said recalled data employing at least a part of said chip identity number as decryption key, decompress said decrypted data recalled from said memory, and output decompressed data. - View Dependent Claims (2, 3, 4, 5)
said chip identity read only register includes a plurality of bits, each bit capable of selective fixation by laser; and
said unique chip identity number being fixed in manufacture by laser probing corresponding bits of said chip identity read only register.
-
-
3. The secure computing system of claim 1, wherein:
-
said chip identity read only register includes a plurality of fuse links, each fuse link capable of selective activation; and
said unique chip identity number being fixed in manufacture by selective activation of a subset of said plurality of fuse links of said chip identity read only register.
-
-
4. The secure computing system of claim 1, wherein:
-
said chip identity read only register includes a plurality of antifuse links, each antifuse link capable of selective activation; and
said unique chip identity number being fixed in manufacture by selective activation of a subset of said plurality of antifuse links of said chip identity read only register.
-
-
5. The secure computing system of claim 1, wherein:
said encrypted and compressed data is a stream of video data.
-
6. A method of secure computing comprising the steps of:
-
disposing on a single integrated circuit a data processor, a read only memory storing a decryption key, and a chip identity read only register;
storing a unique chip identity number accessible by said data processor in said chip identity read only register;
receiving encrypted and compressed data;
employing said data processor to decrypt said encrypted and compressed data employing said encryption key stored in said read only memory;
employing a memory as a first-in-first-out buffer for said data processor including encrypting said decrypted data with said data processor employing at least a part of said chip identity number as an encryption key;
storing said encrypted data in a memory;
recalling said stored data from said memory;
decrypting said recalled data with said data processor employing at least a part of said chip identity number as a decryption key;
employing said data processor to decompress said decrypted data recalled from said memory; and
outputting said decompressed data from said data processor. - View Dependent Claims (7, 8, 9, 10)
said step of storing said unique read only chip identity number in said chip identity read only register includes constructing said chip identity read only register as a plurality of bits, each bit capable of selective fixation by laser, and laser probing selected bits of said chip identity read only register.
-
-
8. The method of secure computing of claim 6, wherein:
-
said step of storing said unique read only chip identity number in said chip identity read only register includes constructing said chip identity read only register as a plurality of fuse links, each fuse link capable of selective activation, and selective activation of a subset of said plurality of fuse links of a chip identity read only register.
-
-
9. The method of secure computing of claim 6, wherein:
-
said step of storing said unique read only chip identity number in said chip identity read only register includes constructing said chip identity read only register as a plurality of antifuse links, each antifuse link capable or selective activation, and selective activation of a subset of said plurality of antifuse links of a chip identity read only register.
-
-
10. The method of secure computing of claim 6, wherein:
said encrypted and compressed data is a stream of video data.
Specification