Methods and systems for cryptographically protecting secure...

Cryptography – Video cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S153000

Reexamination Certificate

active

10124922

ABSTRACT:
Methods and systems are provided for cryptographically protecting secure content in connection with a graphics subsystem of a computing device. Techniques are implemented to encrypt the contents of video memory so that unauthorized software cannot gain meaningful access to it, thereby maintaining confidentiality. Moreover, a mechanism for tamper detection is provided so that there is awareness when data has been altered in some fashion, thereby maintaining integrity. In various embodiments, the contents of overlay surfaces and/or command buffers are encrypted, and/or the GPU is able to operate on encrypted content while preventing its availability to untrusted parties, devices or software.

REFERENCES:
patent: 5175830 (1992-12-01), Sherman et al.
patent: 5825879 (1998-10-01), Davis
patent: 5898779 (1999-04-01), Squilla et al.
patent: 6101276 (2000-08-01), Adiletta et al.
patent: 6138119 (2000-10-01), Hall et al.
patent: 6167136 (2000-12-01), Chou
patent: 6289455 (2001-09-01), Kocher et al.
patent: 6330624 (2001-12-01), Cromer et al.
patent: 6454653 (2002-09-01), Kawazu
patent: 6704868 (2004-03-01), Challener et al.
patent: 6957340 (2005-10-01), Pang et al.
patent: 6965993 (2005-11-01), Baker
patent: 2002/0126846 (2002-09-01), Multerer et al.
patent: 2002/0136408 (2002-09-01), Garcia
patent: 2002/0150248 (2002-10-01), Kovacevic
patent: 2002/0163522 (2002-11-01), Porter et al.
patent: 2003/0079222 (2003-04-01), Boykin et al.
patent: 2004/0202328 (2004-10-01), Hara
patent: 0 410 777 (1991-01-01), None
patent: 1 133 190 (2001-09-01), None
Carravetta, P., “Interface for Video Monitor,”Revista Telegrafica Electronica,1985, 73(860), 188-182.
Einon, G., “Display Adaptors (Buyer's Guide),”PC User,1987,58, 96-97, 100, 104-105, and 108-109.
Fogg, L., “A Hercules Primer: Black Sheep Graphics,”Micro. Cornucopia,1998, 39, 24-29.
Kitson, F.L., “A Tour of Computer Graphics Algorithms and Architectures,”Algorithms and Parallel VLSI Architectures.Lectures and Tutorials Presented at the International Workshop, Deprettere, F. et al. (eds.), Pont-a-Mousson, France, Jun. 10-16, 1990, vol. A, 461-475.
Nair, Ajith N.; “Interactive Television Settop Terminal Architectures”;Digest of Papers of Compcon(Computer Society Conference)1996 Technologies for the Information Superhighway, Santa Clara, California,Feb. 25-28, 1996; IEEE Comp. Soc. Press; vol. Conf. 41; 1996; pp. 233-238.
Yialelis, N., et al., “A security framework supporting domain-based access control in distribution systems,”IEEE,1996, 26-39.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and systems for cryptographically protecting secure... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and systems for cryptographically protecting secure..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for cryptographically protecting secure... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3731625

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.