Specifications

49Maxim Integrated
HDCP Gigabit Multimedia Serial
Link Serializer/Deserializer
MAX9263/MAX9264
Detection and Action Upon
New Device Connection
When a new device is connected to the system, the
device must be authenticated and the device’s KSV
checked against the revocation list. The downstream
FCs can set the NEW_DEV_CONN bit of the upstream
receiver and invoke an interrupt to notify upstream FCs.
Notification of Start of Authentication and
Enable of Encryption to Downstream Links
HDCP repeaters do not immediately begin authentication
upon startup or detection of a new device, but instead
wait for an authentication request from the upstream
transmitter/repeaters.
Use the following procedure to notify downstream links of
the start of a new authentication request:
1) Host FC begins authentication with the HDCP repeat-
er’s input receiver.
2) When AKSV is written to HDCP repeater’s input
receiver, its AUTH_STARTED bit is automatically set
and its GPIO1 goes high (if GPIO1_FUNCTION is set
to high).
3) HDCP repeater’s FC waits for a low to high transition
on HDCP repeater input receiver’s AUTH_STARTED
bit and/or GPIO1 (if configured) and starts authentica-
tion downstream.
4) HDCP repeater’s FC resets AUTH_STARTED bit.
Set GPIO0_FUNCTION to high to have GPIO0 follow the
ENCRYPTION_ENABLE bit of the receiver. The repeater
FC can use this function to be notified when encryption
is enabled/disabled by an upstream FC.
Table 16. HDCP Authenticaion and Normal Operation (One Repeater, Two µCs)—First
and Second Parts of the HDCP Authentication Protocol (continued)
NO. µC_B µC_R
SERIALIZER
(TX_B1, TX_R1,
TX_R2)
DESERIALIZER
(RX_R1, RX_D1,
RX_D2)
TX_B1 CDS = 0
TX_R1 CDS = 0
TX_R2 CDS = 0
RX_R1 CDS = 1
RX_D1 CDS = 0
RX_D2 CDS = 0
14
Reads the KSV list and BINFO from
RX_R1 and writes them to TX_B1. If
any of the MAX_DEVS_EXCEEDED
or MAX_CASCADE_EXCEEDED
bits is 1, then authentication fails.
Note: BINFO must be written after
the KSV list.
TX_B1: Triggered
by FC_B’s write of
BINFO, calculates
hash-value V on the
KSV list, BINFO, and
the secret-value M0.
15
Reads V from TX_B1 and V’ from
RX_R1. If they match, continues
with authentication; otherwise,
retries up to two more times.
16
Searches for each KSV in the KSV
list and BKSV of RX_R1 in the Key
Revocation list.
17
If keys are not revoked, the second
part of the authentication protocol is
completed.
18
Starts transmission of A/V content
that needs protection.
All: Perform HDCP
encryption on high-
value A/V data.
All: Perform HDCP
decryption on high-
value A/V data.