System and method for sign mask encryption and decryption
First Claim
Patent Images
1. A method comprising:
- computing a key shared by a plurality of software modules employed within an image display device;
encrypting a sign mask with the shared key, the sign mask being used for scrambling at least one bit stream, the bit stream being a video stored in a compressed format;
transmitting the scrambled bit stream along with the encrypted sign mask between logic; and
decrypting the encrypted sign mask to descramble the scrambled bit stream.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, one embodiment of the invention involves a method to protect the integrity of the sign mask. The method involves computing a key shared by a plurality of software modules employed within an image display device and encrypting a sign mask with the shared key. The sign mask is used for scrambling a bit stream prior to its transmission along with the encrypted sign mask. The encrypted sign mask is decrypted at the destination in order to descramble the scrambled bit stream.
99 Citations
22 Claims
-
1. A method comprising:
-
computing a key shared by a plurality of software modules employed within an image display device; encrypting a sign mask with the shared key, the sign mask being used for scrambling at least one bit stream, the bit stream being a video stored in a compressed format; transmitting the scrambled bit stream along with the encrypted sign mask between logic; and decrypting the encrypted sign mask to descramble the scrambled bit stream. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An image display device comprising:
-
a software driver; and a software module in communication with the software driver, the software module to encrypt a sign mask with a shared key known by the software driver and to transmit a scrambled bit stream along with the encrypted sign mask to the software driver. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An image display device comprising:
-
a first logic; and a second logic in communication with the first logic, the second logic to encrypt a sign mask with a shared key known by the first logic and to transmit a scrambled bit stream along with the encrypted sign mask to the first logic, both the first and second logic to update the shared key after a fixed time interval has elapsed.
-
-
17. A software embodied in a machine-readable medium and executable by a processor, comprising:
-
a first software module to encrypt a sign mask with a shared key known by an intended receiver of the sign mask; a second software module to output a scrambled bit stream along with the encrypted sign mask; a third software module associated with the intended receiver to decrypt the sign mask with the shared key; and a fourth software module associated with the intended receiver to recover a raw bit stream from the scrambled bit stream using the decrypted sign mask, the third and fourth software modules partially form a software driver employed within an image display device. - View Dependent Claims (18)
-
-
19. A system comprising:
-
a port; a content playing device to provide; a graphics chipset; and a software module in communication with the graphics chipset and configured to receive the bit stream of data from the port, the software module to encrypt a sign mask with a shared key known by the graphics chipset and to transmit a scrambled bit stream along with the encrypted sign mask to the graphics chipset. - View Dependent Claims (20, 21, 22)
-
Specification