Methods and systems for authenticationof components in a graphics system
First Claim
1. A method for providing authentication in connection with the use of a trusted graphics platform having a graphics card, comprising:
- requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card;
in response to said requesting, generating a session key by a cryptographic processor communicatively and securely coupled to the graphics card; and
transmitting said session key to the one of an application and device.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems are provided for authenticating component(s) in connection with the use of a trusted graphics system. Techniques are provided for authenticating a graphics card in connection with a system that cryptographically secures content routed through a graphics pipeline, such that an application or device can indicate to the trusted graphics platform that the application or device is a trusted user of the trusted graphics platform, and such that the graphics platform can communicate to the trusted application or device that the graphics platform may be trusted by the application or device.
-
Citations
71 Claims
-
1. A method for providing authentication in connection with the use of a trusted graphics platform having a graphics card, comprising:
-
requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card;
in response to said requesting, generating a session key by a cryptographic processor communicatively and securely coupled to the graphics card; and
transmitting said session key to the one of an application and device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computing device, comprising:
-
one of an application and device; and
a graphics card having at least one GPU and a cryptographic processor communicatively and securely coupled to said at least one GPU, wherein said one of an application and device requests that the graphics card verify that the graphics card is a secure graphics card and whereby in response to said requesting, the cryptographic processor generates a session key and transmits said session key to the one of an application and device. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for providing authentication in connection with the use of a trusted graphics platform having a graphics card, comprising:
-
requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card; and
in response to said requesting, sending a session key to the one of an application and device via a secure communication mechanism built into the trusted graphics platform for key transport, whereby the one of an application and device knows in advance that writes to the same address space by a secure graphics card are mapped to the graphics card key store. - View Dependent Claims (38)
-
-
39. A method for providing authentication in connection with the use of a trusted graphics platform having a graphics card, comprising:
-
requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card by sending bulk encrypted data to the trusted graphics platform via a protected path; and
in response to said requesting, utilizing a cryptographic processing device to decrypt the bulk encrypted data, thereby verifying that the graphics card is a secure graphics card; and
notifying said one of an application and device that the graphics card is a secure graphics card.
-
-
40. At least one computer readable medium having stored thereon a plurality of computer-executable instructions, said plurality of computer-executable instructions including:
-
means for requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card;
means for generating a session key by a cryptographic processor communicatively and securely coupled to the graphics card in response to requesting by said means for requesting; and
means for transmitting said session key to the one of an application and device. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55)
-
-
56. An operating system of a computing device, comprising:
-
means for requesting by one of an application and device of a graphics card to verify that the graphics card is a secure graphics card;
means for generating a session key by a cryptographic processor communicatively and securely coupled to the graphics card in response to requesting by said means for requesting; and
means for transmitting said session key to the one of an application and device. - View Dependent Claims (57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
Specification