VIDEO PORT AUTHENTICATION FOR MULTI-LEVEL SECURITY DEVICES
20250159107 ยท 2025-05-15
Inventors
Cpc classification
H04N7/083
ELECTRICITY
International classification
Abstract
A video receiver receives a security level of a video source. The security level is stored in a blanking region of a video transmission. The video receiver compares the security level of the video transmission with a security level stored in the video receiver. The video transmission is processed as a function of the comparison of the security level of the video transmission with the security level of the video receiver.
Claims
1. A process in a multi-level security device comprising: receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver.
2. The process of claim 1, wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse.
3. The process of claim 2, wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration.
4. The process of claim 1, wherein the video receiver compares the security level of the video transmission with the video security level of the video receiver at a frame level of the video transmission.
5. The process of claim 1, wherein the processing comprises passing the video transmission through to the video receiver.
6. The process of claim 1, wherein the processing comprises blocking the video transmission.
7. The process of claim 1, wherein the security information represents a port type of one or more of the video source and the video receiver.
8. A non-transitory machine-readable medium comprising instructions that when executed by a processor execute a process comprising: receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver.
9. The non-transitory machine-readable medium of claim 8, wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse.
10. The non-transitory machine-readable medium of claim 9, wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration.
11. The non-transitory machine-readable medium of claim 8, wherein the video receiver compares the security level of the video transmission with the video level of the video receiver at a frame level of the video transmission.
12. The non-transitory machine-readable medium of claim 8, wherein the processing comprises passing the video transmission through to the video receiver.
13. The non-transitory machine-readable medium of claim 8, wherein the processing comprises blocking the video transmission.
14. The non-transitory machine-readable medium of claim 8, wherein the security information represents a port type of one or more of the video source and the video receiver.
15. A system comprising: a computer processor; and a memory coupled to the computer processor; wherein the computer processor and the memory are operable for: receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver.
16. The system of claim 15, wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse; and wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration.
17. The system of claim 15, wherein the video receiver compares the security level of the video transmission with the video level of the video receiver at a frame level of the video transmission.
18. The system of claim 15, wherein the processing comprises passing the video transmission through to the video receiver.
19. The system of claim 15, wherein the processing comprises blocking the video transmission.
20. The system of claim 15, wherein the security information represents a port type of one or more of the video source and the video receiver.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0004] In the drawings, which are not necessarily drawn to scale, like numerals may describe similar components in different views. Like numerals having different letter suffixes may represent different instances of similar components. Some embodiments are illustrated by way of example, and not limitation, in the figures of the accompanying drawings.
[0005]
[0006]
[0007]
[0008]
[0009]
DETAILED DESCRIPTION
[0010] Video standards, such as HDMI (High-Definition Media Interface), DVI (Digital Video Interface) and OpenLDI (Open LCD (Liquid Crystal Display) Display Interface) define an active video region of pixel information and also blanking regions of transmission control information such as vertical synchronization and horizontal synchronization strobes that define the video frame boundaries in terms of pixels in the vertical dimension by the pixels in the horizontal dimension. The video source controls the polarity, duration and location of the vertical (vsync) and horizontal (hsync) synchronization pulses.
[0011]
[0012]
[0013]
[0014]
[0015] Referring now specifically to
[0016] At 420, the security level of the video transmission is compared with a security level stored in the video receiver. As indicated at 422, the video receiver compares the security level of the video transmission with the video level of the video receiver at a frame level of the video transmission. Within a frame, the detection of the pulse location, ploarity and duration is executed within a one (1) pixel clock accuracy.
[0017] At 430, the video transmission is processed as a function of the comparison of the security level of the video transmission with the security level of the video receiver. As indicated at 432, the processing of the video transmission includes passing the video transmission through to the video receiver when the security level of the video transmitter matched the security level of the video receiver, or at 434, the processing includes blocking the video transmission when the security level of the video transmitter does not match the security level of the video receiver.
[0018]
[0019] Example computing platform 500 includes at least one processor 502 (e.g., a central processing unit (CPU), a graphics processing unit (GPU) or both, processor cores, compute nodes, etc.), a main memory 501 and a static memory 506, which communicate with each other via a link 508 (e.g., bus). The computing platform 500 may further include a video display unit 510, input devices 517 (e.g., a keyboard, camera, microphone), and a user interface (UI) navigation device 511 (e.g., mouse, touchscreen). The computing platform 500 may additionally include a storage device 516 (e.g., a drive unit), a signal generation device 518 (e.g., a speaker), a sensor 524, and a network interface device 520 coupled to a network 526.
[0020] The storage device 516 includes a non-transitory machine-readable medium 522 on which is stored one or more sets of data structures and instructions 523 (e.g., software) embodying or utilized by any one or more of the methodologies or functions described herein. The instructions 523 may also reside, completely or at least partially, within the main memory 501, static memory 506, and/or within the processor 502 during execution thereof by the computing platform 500, with the main memory 501, static memory 506, and the processor 502 also constituting machine-readable media.
[0021] While the machine-readable medium 522 is illustrated in an example embodiment to be a single medium, the term machine-readable medium may include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more instructions 523. The term machine-readable medium shall also be taken to include any tangible medium that is capable of storing, encoding or carrying instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure or that is capable of storing, encoding or carrying data structures utilized by or associated with such instructions. The term machine-readable medium shall accordingly be taken to include, but not be limited to, solid-state memories, and optical and magnetic media. Specific examples of machine-readable media include non-volatile memory, including but not limited to, by way of example, semiconductor memory devices (e.g., electrically programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM)) and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.
[0022] The above detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show, by way of illustration, specific embodiments that may be practiced. These embodiments are also referred to herein as examples. Such examples may include elements in addition to those shown or described. However, also contemplated are examples that include the elements shown or described. Moreover, also contemplated are examples using any combination or permutation of those elements shown or described (or one or more aspects thereof), either with respect to a particular example (or one or more aspects thereof), or with respect to other examples (or one or more aspects thereof) shown or described herein.
[0023] Publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) are supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.
[0024] In this document, the terms a or an are used, as is common in patent documents, to include one or more than one, independent of any other instances or usages of at least one or one or more. In this document, the term or is used to refer to a nonexclusive or, such that A or B includes A but not B, B but not A, and A and B, unless otherwise indicated. In the appended claims, the terms including and in which are used as the plain-English equivalents of the respective terms comprising and wherein. Also, in the following claims, the terms including and comprising are open-ended, that is, a system, device, article, or process that includes elements in addition to those listed after such a term in a claim are still deemed to fall within the scope of that claim. Moreover, in the following claims, the terms first, second, and third, etc. are used merely as labels, and are not intended to suggest a numerical order for their objects.
[0025] The above description is intended to be illustrative, and not restrictive. For example, the above-described examples (or one or more aspects thereof) may be used in combination with others. Other embodiments may be used, such as by one of ordinary skill in the art upon reviewing the above description. The Abstract is to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. Also, in the above Detailed Description, various features may be grouped together to streamline the disclosure. However, the claims may not set forth every feature disclosed herein as embodiments may feature a subset of said features. Further, embodiments may include fewer features than those disclosed in a particular example. Thus, the following claims are hereby incorporated into the Detailed Description, with a claim standing on its own as a separate embodiment. The scope of the embodiments disclosed herein is to be determined with reference to the appended claims, along with the full scope of equivalents to which such claims are entitled.
Examples
[0026] Example No. 1 is a process in a multi-level security device comprising receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver. [0027] Example No. 2 includes all the features of Example No. 1, and further optionally includes a process wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse. [0028] Example No. 3 includes all the features of Example Nos. 1-2, and further optionally includes a process wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration. [0029] Example No. 4 includes all the features of Example Nos. 1-3, and further optionally includes a process wherein the video receiver compares the security level of the video transmission with the video security level of the video receiver at a frame level of the video transmission. [0030] Example No. 5 includes all the features of Example Nos. 1-4, and further optionally includes a process wherein the processing comprises passing the video transmission through to the video receiver. [0031] Example No. 6 includes all the features of Example Nos. 1-5, and further optionally includes a process wherein the processing comprises blocking the video transmission. [0032] Example No. 7 includes all the features of Example Nos. 1-6, and further optionally includes a process wherein the security information represents a port type of one or more of the video source and the video receiver. [0033] Example No. 8 is a machine-readable medium comprising instructions that when executed by a processor execute a process comprising receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver. [0034] Example No. 9 includes all the features of Example No. 8, and further optionally includes a machine-readable medium wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse. [0035] Example No. 10 includes all the features of Example Nos. 8-9, and further optionally includes a machine-readable medium wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration. [0036] Example No. 11 includes all the features of Example Nos. 8-10, and further optionally includes a machine-readable medium wherein the video receiver compares the security level of the video transmission with the video level of the video receiver at a frame level of the video transmission. [0037] Example No. 12 includes all the features of Example Nos. 8-11, and further optionally includes a machine-readable medium wherein the processing comprises passing the video transmission through to the video receiver. [0038] Example No. 13 includes all the features of Example Nos. 8-12, and further optionally includes a machine-readable medium wherein the processing comprises blocking the video transmission. [0039] Example No. 14 includes all the features of Example Nos. 8-13, and further optionally includes a machine-readable medium wherein the security information represents a port type of one or more of the video source and the video receiver. [0040] Example No. 15 is a system comprising a computer processor; and a memory coupled to the computer processor; wherein the computer processor and the memory are operable for receiving a security level of a video source at a video receiver, the security level stored in a blanking region of a video transmission; comparing the security level of the video transmission with a security level stored in the video receiver; and processing the video transmission as a function of the comparison of the security level of the video transmission with the security level of the video receiver. [0041] Example No. 16 includes all the features of Example No. 15, and optionally includes a system wherein the security level comprises one or more of a horizontal synchronization pulse and a vertical synchronization pulse; and wherein the one or more of the horizontal synchronization pulse and the vertical synchronization pulse comprise a location, a polarity and a duration. [0042] Example No. 17 includes all the features of Example Nos. 15-16, and optionally includes a system wherein the video receiver compares the security level of the video transmission with the video level of the video receiver at a frame level of the video transmission. [0043] Example No. 18 includes all the features of Example Nos. 15-17, and optionally includes a system wherein the processing comprises passing the video transmission through to the video receiver. [0044] Example No. 19 includes all the features of Example Nos. 15-18, and optionally includes a system wherein the processing comprises blocking the video transmission. [0045] Example No. 20 includes all the features of Example Nos. 15-19, and optionally includes a system wherein the security information represents a port type of one or more of the video source and the video receiver.