Claims
- 1. An apparatus comprising:
a first tool configured to generate one or more parameter signals in response to (i) one or more control signals and (ii) an input signal; and a second tool configured to generate one or more edited bitstreams in response to (i) one or more input bitstreams and (ii) said one or more parameter signals.
- 2. The apparatus according to claim 1, wherein said one or more control signals comprise one or more bitstream reports.
- 3. The apparatus according to claim 1, wherein said one or more parameter signals are automatically generated in response to (i) said one or more control signals and (ii) said input signal.
- 4. The apparatus according to claim 1, wherein said one or more edited bitstreams are corrupted versions of said one or more input bitstreams.
- 5. The apparatus according to claim 1, wherein said one or more edited bitstreams are compressed versions of said one or more input bitstreams.
- 6. The apparatus according to claim 1, wherein said one or more edited bitstreams are corrupted and compressed versions of said one or more input bitstreams.
- 7. A method of modifying one or more bitstreams comprising:
(A) entering a specification for a desired bitstream edit; and (B) executing the operation of the desired bitstream edit in response to a control signal to generate an edited bitstream.
- 8. The method according to claim 7, further comprising the step of:
(C) measuring the result of step (B).
- 9. The method according to claim 7, further comprising the step of:
(D) automating step (B).
- 10. The method according to claim 7, wherein the specification for the edit is for corruption having a number of specification options included where:
(A) one or more options for corruption are selected from the group consisting of:
(i) every x bytes, corrupt y bytes; (ii) the number of fields to corrupt; (iii) the number of fields to protect; (iv) the field to corrupt location affiliated with (a) the field to corrupt size, (b) the field to corrupt frequency, and (c) the field to corrupt occurrences; (v) a field to protect location affiliated with (a) the field to protect size, (b) the field to protect frequency, and (c) the field to protect occurrences; and (vi) a field to protect location affiliated with (a) the field to protect size, (b) the field to protect frequency, and (c) the field to protect occurrences.
- 11. The method according to claim 10, wherein other processes select the specification options and the values for the options.
- 12. The method according to claim 11, wherein said specification options for corruption include (i) any number of sets of fields to corrupt, and (ii) any number of sets of fields to protect.
- 13. The method according to claim 10, wherein the method is used multiple times on the same bitstream with the same specification to produce one or more different edited corrupt and/or compact bitstreams.
- 14. The method according to claim 10, wherein the method is used multiple times on the same bitstream with different specifications such that different corruption rates are supported for different field(s) of the bitstream.
- 15. The method according to claim 10, wherein the corruption can be random or deterministic of the specified fields to be corrupted.
- 16. The method according to claim 10, used in a system that automates the corruption of said one or more bitstreams, comprising the steps of:
(A) automating the specification to include automation for any combination of (i) corrupt fields in profile, (ii) corrupt fields not in profile, (iii) corrupt legal fields in checking report, (iv) corrupt illegal fields in checking report, (v) corrupt fields in coverage report, (vi) corrupt fields not in coverage report, (vii) corrupt fields not in profile and not in coverage report, (viii) corrupt fields not in profile and illegal fields in checking report, (ix) corrupt fields not in profile, illegal field in checking report and not in coverage report, (x) corrupt illegal fields in checking report and not in coverage report, (xi) corrupt all fields in profile, checking and coverage reports, (xii) corrupt start code field in profile at 16/1, rest of header syntax at 16/4 and all data payload at 64/32, (xiii) corrupt fields not in coverage report with start code field in profile at 10/1, rest of header syntax at 10/3 and all payload at 64/64, (xiv) corrupt fields in profile at 64/8, except for illegal fields in checking report which should be at 32/4; (B) receiving the available parameters on a bitstream from the profiling, checking, or coverage information; and (C) building sets of bitstream specifications based on automation specifications and available parameters.
- 17. The method according to claim 16, wherein a desired level of corruption in specific field in the profile can be specified.
- 18. The method according to claim 16, wherein said system is used to generate sets of corrupted bitstreams.
- 19. The method according to claim 16, wherein the profiling of the bitstream, representing field fragmentation, is used to automate the corrupt bitstream generation by specifying parameters.
- 20. The method according to claim 16, wherein the checking of the bitstream, representing what fields and bits are illegal, is used to automate the corrupt bitstream generation by specifying parameters.
- 21. The method according to claim 16, wherein the coverage of the bitstream, representing what field and bit permutations have not been used, is used to automate the corrupt bitstream generation by specifying parameters.
- 22. The method according to claim 16, wherein the profiling, checking and coverage information used for automation can represent multiple bitstreams.
- 23. The method according to claim 7, used in a system that automates compact bitstream generation for existing bitstreams comprising the steps:
(A) reviewing the profiles of the existing bitstreams; (B) developing a single profile based on the bitstream profile reviews that would represent a significant compaction; (C) generating a bitstream based on the single profile; (D) checking the generated bitstream to ensure compliance and coverage goals have been met, otherwise refining the profile; and (E) optionally ignoring the data size and value to reduce the size of the bitstream.
- 24. The method according to claim 7, used in a system that automates compact bitstream generation for verification of field(s), comprising the steps of:
specifying the field in the same manner as represented in the profile; reviewing the profiles of the existing bitstreams; copying a single profile from an existing profile and edited the existing profile to add the field coverage; generating a bitstream based on the single profile; and checking the generated bitstream to ensure compliance and coverage goals have been met, otherwise refining the profile.
- 25. The method according to claim 7, used in a system that automates compact bitstream generation for comprehensive coverage comprising the steps:
reviewing the profiles of the existing bitstreams; copying a single profile from an existing profile and editing the profile to add full coverage; generating a bitstream based on the single profile; and checking the generated bitstream to ensure compliance and coverage goals have been met, otherwise refining the profile.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application may relate to co-pending application Ser. No. 08/838,798, which is hereby incorporated by reference in its entirety.