METHOD AND APPARATUS FOR CONSTRUCTING AN ACCSS CONTROL MATRIX FOR A SET-TOP BOX SECURITY
4 Assignments
0 Petitions
Accused Products
Abstract
In multimedia systems requiring secure access, a method and apparatus for constructing an access control matrix for a set-top box security processor are provided. A security processor may comprise multiple security components and may support multiple user modes. For each user mode supported, at least one access rule table may be generated to indicate access rules to a security component in the security processor. An access control list comprises information regarding the access rules for a particular user mode to the security components in the security processor. An access control matrix may be generated based on the access control lists for the user modes supported by the security component. The access control matrix may be implemented and/or stored in the security processor for verifying access rights of a user mode. Results of operations associated with security components may be transferred to other processors communicatively coupled to the security processor.
62 Citations
44 Claims
-
1-22. -22. (canceled)
-
23. A method, comprising:
-
determining a plurality of user modes supported by a security processor, said security processor comprising a plurality of security components; determining a plurality of rights or privileges for said plurality of security components; generating a respective set of access rule tables for each combination of a particular one of said plurality of security components and a particular one of said plurality of user modes based on said determined plurality of rights or privileges; generating a respective access control list for each corresponding one of said plurality of security components based on said generated sets of access rule tables associated with said corresponding one of said plurality of security components; and transferring results of operations associated with one or more of said plurality of security components to at least one other processor that is communicatively coupled to said security processor. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 36, 41)
-
-
34. A system, comprising:
one or more circuits for use in a security processor that comprises a plurality of security components, said one or more circuits being operable to; determine a plurality of user modes supported by a security processor, said security processor comprising a plurality of security components; determine a plurality of rights or privileges for said plurality of security components; generate a respective set of access rule tables for each combination of a particular one of said plurality of security components and a particular one of said plurality of user modes based on said determined plurality of rights or privileges; generate a respective access control list for each corresponding one of said plurality of security components based on said generated sets of access rule tables associated with said corresponding one of said plurality of security components; and transfer results of operations associated with one or more of said plurality of security components to at least one other processor that is communicatively coupled to said security processor. - View Dependent Claims (35, 37, 38, 39, 40, 42, 43, 44)
Specification