Methods and systems for authentication of components in a...

Electrical computers and digital processing systems: support – Data processing protection using cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S176000, C726S024000, C380S044000

Reexamination Certificate

active

07380130

ABSTRACT:
Methods and systems are provided for authenticating component(s) in connection with the use of a trusted graphics system. Techniques are provided for authenticating a graphics card in connection with a system that cryptographically secures content routed through a graphics pipeline, such that an application or device can indicate to the trusted graphics platform that the application or device is a trusted user of the trusted graphics platform, and such that the graphics platform can communicate to the trusted application or device that the graphics platform may be trusted by the application or device.

REFERENCES:
patent: 5175830 (1992-12-01), Sherman et al.
patent: 5822435 (1998-10-01), Boebert et al.
patent: 5825879 (1998-10-01), Davis
patent: 5898779 (1999-04-01), Squilla et al.
patent: 6101276 (2000-08-01), Adiletta et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6330624 (2001-12-01), Cromer et al.
patent: 6704868 (2004-03-01), Challener et al.
patent: 6957340 (2005-10-01), Pang et al.
patent: 6965993 (2005-11-01), Baker
patent: 2002/0150248 (2002-10-01), Kovacevic
patent: 2002/0163522 (2002-11-01), Porter et al.
patent: 2003/0028807 (2003-02-01), Lawman et al.
patent: 2003/0079222 (2003-04-01), Boykin et al.
patent: 2003/0226031 (2003-12-01), Proudler et al.
patent: 2004/0003288 (2004-01-01), Wiseman et al.
patent: 2004/0202328 (2004-10-01), Hara
“The First Step Towards OOP: Encapuslation in C#” pp. 1-4. Publication date of Mar. 6, 2002 verified by the Internet Archive at http://web.archive.org. Original URL at http://www.csharphelp.com/archives/archive149.html.
Schneier, Bruce. Applied Cryptography, 2ndEdition. © 1996 Bruce Schneier. Published by John Wiley and Sons Inc. pp. 179-180.
Carravetta, P., “Interface for Video Monitor,”Revista Telegrafica Electronica, 1985, 73(860), 188-192.
Einon, G., “Display Adaptors (Buyer's Guide),”PC User, 1987,58, 96-97, 100, 104-105, and 108-109.
Fogg, L., “A Hercules Primer: Black Sheep Graphics,”Micro. Cornucopia, 1998, 39, 24-29.
Kitson, F.L., “A Tour of Computer Graphics Algorithms and Architectures,”Algorithms and Parallel VLSI Architectures. Lectures and Tutorials Presented at the International Workshop, Deprettere, F. et al. (eds.), Pont-a-Mousson, France, Jun. 10-16, 1990, vol. A, 461-475.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for authentication of components in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for authentication of components in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for authentication of components in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2814023

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.