Abstract:
A communications system (10) includes a physical layer hardware unit (220) and a processing unit (110). The physical layer hardware unit (220) is adapted to communicate data over a communications channel (40) in accordance with assigned transmission parameters. The physical layer hardware unit (220) is adapted to receive an incoming signal over the communications channel (40) and sample the incoming signal to generate a digital received signal. The processing unit (110) is adapted to execute a standard mode driver (240) in a standard mode of operation and a privileged mode driver (250) in a privileged mode of operation. The standard mode driver (240) includes program instructions adapted to extract control codes (280) from the digital received signal and configure the physical layer hardware unit (220) assigned transmission parameters based on the control codes (280). The privileged mode driver (250) includes prograni instructions adapted to independently extract secure control codes (310) from the digital received signal, determine an operational characteristic of the physical layer hardware unit (220), and signal a security violation in response to the operational characteristic being inconsistent with the secure control codes (310).
Abstract:
A communication system (10) includes a physical layer hardware unit (220) and a processing unit (100). The physical layer hardware unit (220) is adapted to communicate data over a communications channel (40) in accordance with assigned transmission parameters. The physical layer hardware unit (220) is adapted to receive an incoming signal over the communications channel (40) and sample the incoming signal to generate a digital received signal. The processing unit (100) is adapted to execute a software driver (240) including program instructions adapted to extract control codes from the digital received signal, generate an authentication code, and transfer the control codes and the authentication code to the physical layer hardware unit (220). The physical layer hardware unit (220) is adapted to signal a security violation in response to the control codes being inconsistent with the authentication code.
Abstract:
A communications system (10) includes physical layer hardware (180) and a processing unit (105). The physical layer hardware (180) is adapted to communicate data over a communications channel (40) in accordance with a plurality of control codes. The physical layer hardware (180) is adapted to demodulate an incoming analog signal to generate a digital receive signal and modulate a digital transmit signal to generate an analog transmit signal. The processing unit (105) is adapted to execute a privileged driver (190) for interfacing with the physical layer hardware (180). The privileged driver (190) includes program instructions for implementing a protocol layer (80) to decode the digital receive signal, encode the digital transmit signal, and configure the physical layer harware (180) for receipt of the digital receive signal and transmission of the digital transmit signal based on the plurality of control codes. A method for configuring a transceiver (50) includes demodulating an incoming analog signal to generate a digital receive signal based on a plurality of control codes; modulating a digital transmit signal to generate an analog transmit signal based on the control codes; and executing a privileged driver (190) for configuring the plurality of control codes.
Abstract:
A communications system includes a physical layer hardware unit (220) and a processing unit (100). The physical layer hardware unit (220) is adapted to receive user data over a first communications channel and control codes over a second communications channel. The physical layer hardware unit (220) is further adapted to transmit an upstream data signal over the first communications channel based on transmission assignments defined by the control codes. The processing unit (100) is adapted to execute a software driver (240) for interfacing with the physical layer hardware unit (220). The software driver (240) includes program instructions for implementing a protocol layer (80) to decrypt the user data and provide upstream data to the physical layer hardware unit (220) for generation of the upstream data signal. A method for configuring a transceiver (50) includes receiving user data over a first communications channel; receiving control codes over a second communications channel; and transmitting an upstream signal over the first communications channel based on transmission assignments defined by the control codes.
Abstract:
A multiprocessing system comprising a plurality of processors and a plurality of I/O devices. A central interrupt control unit functionally intercouples the plurality of processors and I/O devices. The central interrupt control unit is configured to receive interrupt signals from the I/O devices and is configured to distribute interrupt signals to the processors. One of the processors is configured as a master test processor to control a test mode for testing the central interrupt control unit. The master test processor is further configured to release the other processors and emulate a multiprocessing environment.
Abstract:
A method and apparatus for controlling access to segments of memory (108) having security data stored therein is provided. A security check unit (304) maintains information for a plurality of segments of memory (108) regarding whether each of these plurality of segments has secure data stored therein. A hint directory (302) maintains information regarding whether any of a plurality of these segments has secure data stored therein. The hint directory (302) is capable of bypassing the security check unit (304) when it receives an address (402) that falls within a plurality of the segments that have been indicated as being free from secure data. When the hint directory (302) determines that a received address (402) falls within one of a plurality of segments that contain secure data, then the address (402) is passed to the security check unit (304) for a closer examination.
Abstract:
An apparatus and a method for providing access security for a subject device (414A-D). The apparatus includes a security check unit (416, 418) configured to be coupled to a transmission medium (408, 412). The security check unit (416, 418) is configured to monitor signals on the transmission medium (408, 412) and to detect an attempt by a first device (414A-D) coupled to the transmission medium (408, 412) to access a second device (414A-D) coupled to the transmission medium (408, 412) based upon the signals. The security check unit (416, 418) is also configured to determine an identity of the first device (414A-D) based upon the signals and to control access to the second device (414A-D) by the first device (414A-D) dependent upon the identity of the first device (414A-D).
Abstract:
An apparatus and a method for providing access security for a subject device (414A-D). The apparatus includes a security check unit (416, 418) configured to be coupled to a transmission medium (408, 412). The security check unit (416, 418) is configured to monitor signals on the transmission medium (408, 412) and to detect an attempt by a first device (414A-D) coupled to the transmission medium (408, 412) to access a second device (414A-D) coupled to the transmission medium (408, 412) based upon the signals. The security check unit (416, 418) is also configured to determine an identity of the first device (414A-D) based upon the signals and to control access to the second device (414A-D) by the first device (414A-D) dependent upon the identity of the first device (414A-D).
Abstract:
A communications system (10) includes a physical layer hardware unit (220) and a processing unit (110). The physical layer hardware unit (220) is adapted to communicate data over a communications channel (40) in accordance with assigned transmission parameters. The physical layer hardware unit (220) is adapted to receive an incoming signal over the communications channel (40) and sample the incoming signal to generate a digital received signal. The processing unit (110) is adapted to execute a standard mode driver (240) in a standard mode of operation and a privileged mode driver (250) in a privileged mode of operation. The standard mode driver (240) includes program instructions adapted to extract encrypted data (260) from the digital received signal and pass the encrypted data (260) to the privileged mode driver (250). The privileged mode driver (250) includes program instructions adapted to decrypt the encrypted data (260) to generate decrypted data (270) including control codes (280) and transfer the control codes (280) to the physical layer hardware unit (220). The physical layer hardware unit (220) is adapted to configure its assigned transmission parameters based on the control codes (280). A method for configuring a transceiver (50) includes receiving encrypted data (260) over a communications channel in a standard processing mode of a processing unit (110); transitioning the processing unit (110) into a privileged processing mode; decrypting the encrypted data (260) in the privileged processing mode; extracting control codes (280) from the decrypted data (270) in the privileged processing mode; and transmitting an upstream signal over the communications channel (40) based on transmission assignments defined by the control codes (280).
Abstract:
A computer system (100) includes a peripheral device (215) and a processor complex (110) coupled to the peripheral device (215). The processor complex (110) is adapted to load a secure driver (240) including program instructions for interfacing with the peripheral device (215). A method for protecting a software driver (240) includes storing the secure driver (240) in a computer system (100). The secure driver (240) includes program instructions for interfacing with a peripheral device (215). The method further includes loading the secure driver (240) and interfacing with the peripheral device (215) using the secure driver (240). The peripheral device (215) may be a communications device, such as a software modem (50).