Configurable encryption/decryption for multiple services support
First Claim
1. A method of allocating resources comprising:
- allocating a memory with a first set of decryption data corresponding to a first-level-of-encryption;
receiving from an originating source a first data stream having the first-level-of-encryption and first type of services of at least two different service types, wherein a number of the first type of services is dependent on the first-level-of-encryption;
re-allocating the memory with a second set of decryption data corresponding to a second-level-of-encryption, the second-level-of-encryption being different from the first-level-of-encryption of the first data stream;
receiving from the originating source a second data stream having the second-level-of-encryption and second type of services of at least two different service types that is different from the first number of services, wherein a number of the second type of services is dependent on the second-level-of-encryption; and
storing in the memory said first set of decryption data corresponding to a first level of encryption and second set of decryption data corresponding to said second level of encryption.
3 Assignments
0 Petitions
Accused Products
Abstract
A system to transmit a set of programs from a transmitter to a receiver is used to accommodate different levels of security used for each program. When a high level of security is necessary for transmitting or receiving a program the transmitter and/or receiver is operable to accommodate that level of security. Thus, both transmitters and receivers are operable to be reconfigured to encrypt or decrypt, respectively, at different levels. Accordingly, differing amounts of programs can be transmitted or received based on the resource requirements needed at any level of security. Consequently, a high level of encryption/decryption requires more resources and allows the processing of fewer services, while a lower level of encryption/decryption allows more services to be transmitted/received.
10 Citations
7 Claims
-
1. A method of allocating resources comprising:
-
allocating a memory with a first set of decryption data corresponding to a first-level-of-encryption; receiving from an originating source a first data stream having the first-level-of-encryption and first type of services of at least two different service types, wherein a number of the first type of services is dependent on the first-level-of-encryption; re-allocating the memory with a second set of decryption data corresponding to a second-level-of-encryption, the second-level-of-encryption being different from the first-level-of-encryption of the first data stream; receiving from the originating source a second data stream having the second-level-of-encryption and second type of services of at least two different service types that is different from the first number of services, wherein a number of the second type of services is dependent on the second-level-of-encryption; and storing in the memory said first set of decryption data corresponding to a first level of encryption and second set of decryption data corresponding to said second level of encryption. - View Dependent Claims (2, 3, 4)
-
-
5. A method of processing received data comprising:
-
storing a first set of decryption data associated with a first data stream wherein the first data stream includes first type of services; receiving the first data stream wherein the first data stream has a first-level-of-encryption, wherein a number of the first type of services is dependent on the first-level-of-encryption; decrypting the first data stream using the first set of decryption data; storing a second set of decryption data associated with a second data stream wherein the second data stream includes second type of services; receiving the second data stream wherein the second data stream has a second-level-of-encryption, wherein a number of the second type of services is dependent on the second-level-of-encryption; decrypting the second data stream using the second set of decryption data; and utilizing a common memory to decrypt the first data stream and the second data stream. - View Dependent Claims (6, 7)
-
Specification