Display unit storing and using a cryptography key
First Claim
Patent Images
1. A method of using and storing a cryptography key in a display unit, comprising:
- retrieving a first encrypted key from anon-volatile memory incorporated in the display unit;
generating a first decrypted key by decrypting the first encrypted key according to a first encryption protocol;
receiving a plurality of pixel data elements encoded in a display signal in an encrypted form that represents an image;
decrypting said encrypted plurality of pixel data elements using the first decrypted key;
generating said plurality of pixel data elements based upon said decrypted plurality of pixel data elements;
displaying said image on a display screen based on said decrypted plurality of pixel data elements;
destroying the first encrypted key;
receiving a second encrypted key from non-volatile memory that is different from the first encrypted key;
generating a second encrypted key by decrypting the second encrypted key according to a second encryption protocol that is different from the first encryption protocol;
decrypting a second encrypted plurality of pixel data elements using the second decrypted key;
generating a second plurality of pixel data elements based upon said second decrypted plurality of pixel data elements;
displaying said second decrypted plurality of pixel data elements.
1 Assignment
0 Petitions
Accused Products
Abstract
Keys (e.g., decryption key, authentication key) are stored in a non-volatile memory of a display unit. The keys are retrieved in encrypted form into an integrated circuit. The integrated circuit decrypts the keys and uses the keys. As the keys are available in decrypted form only within the integrated circuit and potentially only during use, the keys may not be available to unauthorized third parties.
-
Citations
19 Claims
-
1. A method of using and storing a cryptography key in a display unit, comprising:
-
retrieving a first encrypted key from anon-volatile memory incorporated in the display unit; generating a first decrypted key by decrypting the first encrypted key according to a first encryption protocol; receiving a plurality of pixel data elements encoded in a display signal in an encrypted form that represents an image; decrypting said encrypted plurality of pixel data elements using the first decrypted key; generating said plurality of pixel data elements based upon said decrypted plurality of pixel data elements; displaying said image on a display screen based on said decrypted plurality of pixel data elements; destroying the first encrypted key; receiving a second encrypted key from non-volatile memory that is different from the first encrypted key; generating a second encrypted key by decrypting the second encrypted key according to a second encryption protocol that is different from the first encryption protocol; decrypting a second encrypted plurality of pixel data elements using the second decrypted key; generating a second plurality of pixel data elements based upon said second decrypted plurality of pixel data elements; displaying said second decrypted plurality of pixel data elements. - View Dependent Claims (2, 4, 5, 6, 7, 8, 9)
-
-
3. A computer program product stored on computer readable medium executable by a processor for using and storing a cryptography key in a display unit, comprising:
-
computer code for retrieving a first encrypted key from a non-volatile memory incorporated in the display unit; computer code for generating a first decrypted key by decrypting the first encrypted key according to a first encryption protocol; computer code for receiving a plurality of pixel data elements encoded in a display signal in an encrypted form that represent an image; computer code for decrypting said encrypted plurality of pixel data elements using the first decrypted key; computer code for generating said plurality of pixel data elements based upon said decrypted plurality of pixel data elements; computer code for displaying said image on a display screen based on said decrypted plurality of pixel data elements; computer code for destroying the first encrypted key; computer code for receiving a second encrypted key from non-volatile memory that is different from the first encrypted key; computer code for generating a second encrypted key by decrypting the second encrypted key according to a second encryption protocol that is different from the first encryption protocol; computer code for decrypting a second encrypted plurality of pixel data elements using the second decrypted key; computer code for generating a second plurality of pixel data elements based upon said second decrypted plurality of pixel data elements; computer code for displaying said second decrypted plurality of pixel data elements; and a computer-readable medium for storing the computer code. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification