Cryptography – Video cryptography
Reexamination Certificate
2007-04-10
2007-04-10
Moise, Emmanuel L. (Department: 2137)
Cryptography
Video cryptography
C713S153000
Reexamination Certificate
active
10124922
ABSTRACT:
Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Moreover, a mechanism for tamper detection is provided so that there is awareness when data has been altered in some fashion, thereby maintaining integrity. In various embodiments, the contents of overlay surfaces and/or command buffers are encrypted, and/or the GPU is able to operate on encrypted content while preventing its availability to untrusted parties, devices or software.
REFERENCES:
patent: 5175830 (1992-12-01), Sherman et al.
patent: 5825879 (1998-10-01), Davis
patent: 5898779 (1999-04-01), Squilla et al.
patent: 6101276 (2000-08-01), Adiletta et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6330624 (2001-12-01), Cromer et al.
patent: 6454653 (2002-09-01), Kawazu
patent: 6704868 (2004-03-01), Challener et al.
patent: 6957340 (2005-10-01), Pang et al.
patent: 6965993 (2005-11-01), Baker
patent: 2002/0126846 (2002-09-01), Multerer et al.
patent: 2002/0136408 (2002-09-01), Garcia
patent: 2002/0150248 (2002-10-01), Kovacevic
patent: 2002/0163522 (2002-11-01), Porter et al.
patent: 2003/0079222 (2003-04-01), Boykin et al.
patent: 2004/0202328 (2004-10-01), Hara
patent: 0 410 777 (1991-01-01), None
patent: 1 133 190 (2001-09-01), None
Carravetta, P., “Interface for Video Monitor,”Revista Telegrafica Electronica,1985, 73(860), 188-182.
Einon, G., “Display Adaptors (Buyer's Guide),”PC User,1987,58, 96-97, 100, 104-105, and 108-109.
Fogg, L., “A Hercules Primer: Black Sheep Graphics,”Micro. Cornucopia,1998, 39, 24-29.
Kitson, F.L., “A Tour of Computer Graphics Algorithms and Architectures,”Algorithms and Parallel VLSI Architectures.Lectures and Tutorials Presented at the International Workshop, Deprettere, F. et al. (eds.), Pont-a-Mousson, France, Jun. 10-16, 1990, vol. A, 461-475.
Nair, Ajith N.; “Interactive Television Settop Terminal Architectures”;Digest of Papers of Compcon(Computer Society Conference)1996 Technologies for the Information Superhighway, Santa Clara, California,Feb. 25-28, 1996; IEEE Comp. Soc. Press; vol. Conf. 41; 1996; pp. 233-238.
Yialelis, N., et al., “A security framework supporting domain-based access control in distribution systems,”IEEE,1996, 26-39.
England Paul
Peinado Marcus
Wilt Nicholas P.
Abyaneh Ali
Microsoft Corporation
Moise Emmanuel L.
Woodcock & Washburn LLP
LandOfFree
Methods and systems for cryptographically protecting secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for cryptographically protecting secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for cryptographically protecting secure... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3731625