System and method for protecting video card output
A video card, video data technology, applied in transmission systems, digital transmission systems, protection of internal/peripheral computer components, etc.
Inactive Publication Date: 2007-11-21
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 1 Cited by
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
But while video memory contains digital information,
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreImage
Smart Image Click on the blue labels to locate them in the text.
Smart ImageViewing Examples
Examples
Experimental program
Comparison scheme
Effect test
Login to View More PUM
Login to View More Abstract
The various methods and systems described herein are directed to supplying a secure channel for software executing on a host computer. The methods and systems address and provide solutions for an attack model in which rogue software executing on the host computer attempts to inappropriately obtain or otherwise manipulate data. Some embodiments can provide pixel data that can be kept confidential (in that untrusted software applications cannot read the data off of the display screen). In addition, other embodiments can preserve the integrity of the pixel data by detecting whether the pixel data has been inappropriately manipulated. Various embodiments are based on a decryption engine that is located on a video card very late in the video processing chain such that programmatic access to decrypted pixel data is denied.
Description
technical field [0001] The present invention relates to a method and system for processing data with a video card. Background technique [0002] Often, content residing on a computer can be compromised by individuals wishing to steal or modify its content. As an example, consider the case of a content author, such as a movie company or a user who publishes content on the web. Often, these people publish video content that restricts how users can view it. The content is typically viewed or presented on a computer, such as a personal computer. Every year, certain unscrupulous individuals and organizations spend enormous amounts of time, energy and money trying to steal or improperly obtain such video content. Also, consider the case of e-commerce software, such as it enables individuals to process banking transactions. User review and operational data displayed on the display may be compromised by rogue software applications executing on the user's computer. That is, once...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More Application Information
Patent Timeline
Login to View More IPC IPC(8): G06F12/14G06F15/16G06F13/14G06F21/00G06F21/24H04L9/10
CPCG06F21/84G06F21/606
Inventor G·F·埃文斯P·英格兰
Owner MICROSOFT TECH LICENSING LLC
Features
- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
Why Patsnap Eureka
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
