Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2008-05-27
2008-05-27
Vu, Kim (Department: 2135)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S176000, C726S024000, C380S044000
Reexamination Certificate
active
07380130
ABSTRACT:
Methods and systems are provided for authenticating component(s) in connection with the use of a trusted graphics system. Techniques are provided for authenticating a graphics card in connection with a system that cryptographically secures content routed through a graphics pipeline, such that an application or device can indicate to the trusted graphics platform that the application or device is a trusted user of the trusted graphics platform, and such that the graphics platform can communicate to the trusted application or device that the graphics platform may be trusted by the application or device.
REFERENCES:
patent: 5175830 (1992-12-01), Sherman et al.
patent: 5822435 (1998-10-01), Boebert et al.
patent: 5825879 (1998-10-01), Davis
patent: 5898779 (1999-04-01), Squilla et al.
patent: 6101276 (2000-08-01), Adiletta et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6330624 (2001-12-01), Cromer et al.
patent: 6704868 (2004-03-01), Challener et al.
patent: 6957340 (2005-10-01), Pang et al.
patent: 6965993 (2005-11-01), Baker
patent: 2002/0150248 (2002-10-01), Kovacevic
patent: 2002/0163522 (2002-11-01), Porter et al.
patent: 2003/0028807 (2003-02-01), Lawman et al.
patent: 2003/0079222 (2003-04-01), Boykin et al.
patent: 2003/0226031 (2003-12-01), Proudler et al.
patent: 2004/0003288 (2004-01-01), Wiseman et al.
patent: 2004/0202328 (2004-10-01), Hara
“The First Step Towards OOP: Encapuslation in C#” pp. 1-4. Publication date of Mar. 6, 2002 verified by the Internet Archive at http://web.archive.org. Original URL at http://www.csharphelp.com/archives/archive149.html.
Schneier, Bruce. Applied Cryptography, 2ndEdition. © 1996 Bruce Schneier. Published by John Wiley and Sons Inc. pp. 179-180.
Carravetta, P., “Interface for Video Monitor,”Revista Telegrafica Electronica, 1985, 73(860), 188-192.
Einon, G., “Display Adaptors (Buyer's Guide),”PC User, 1987,58, 96-97, 100, 104-105, and 108-109.
Fogg, L., “A Hercules Primer: Black Sheep Graphics,”Micro. Cornucopia, 1998, 39, 24-29.
Kitson, F.L., “A Tour of Computer Graphics Algorithms and Architectures,”Algorithms and Parallel VLSI Architectures. Lectures and Tutorials Presented at the International Workshop, Deprettere, F. et al. (eds.), Pont-a-Mousson, France, Jun. 10-16, 1990, vol. A, 461-475.
England Paul
Peinado Marcus
Wilt Nicholas P.
Gyorfi Tom
Microsoft Corporation
Vu Kim
Woodcock & Washburn LLP
LandOfFree
Methods and systems for authentication of components in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for authentication of components in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for authentication of components in a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2814023