Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Module

a security module and module technology, applied in the field of security modules, can solve the problems of limited access of applications to computer hardware, and achieve the effect of restricting access to computer hardware and high resolution buffer

Inactive Publication Date: 2007-09-27
IBM CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009] In one aspect of the invention, a method for restricting access to computer hardware is provided. The method includes presenting a cryptographic key to an authentication module, which is accessed through a trusted firmware layer, and validation of the key. Access of an application to the computer hardware is limited in response to the key validation. The step of validating the key may include presenting th

Problems solved by technology

Access of an application to the computer hardware is limited in response to the key validation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Module
  • Security Module
  • Security Module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

Overview

[0016] The manufacturers of home entertainment sets leverage the cost of the set for the cost of accessories. The game sets are comprised of CPUs with enhanced graphics and timing, and only authorized software has access to the enhanced hardware of the game set CPU. There is a need to enable non-competitors of the game set manufacturers to be able to access the enhanced hardware of the game set through an authorization system.

Technical Background

[0017] Each game set has a CPU and associated hardware to enable an authorized game to properly function and to provide virtual effects that appear in real time. Some of the hardware that enables the real time effects include a graphics accelerator, a floating point accelerator and a high resolution frame buffer. In addition, each game set includes a trusted firmware layer that cannot be replaced with an unauthorized piece of firmware. Firmware is software that is stored in hardware, such that the software is retained even after p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for restricting access of an application to computer hardware. The apparatus includes both an authentication module and a validation module. The authentication module is within the trusted firmware layer. The purpose of the authentication module is to verify a cryptographic key presented by an application. The validation module is responsive to the authentication module and limits access of the application to the computer hardware. The authentication modules may be implemented in software through a firmware call, or through a hardware register of the computer.

Description

CROSS REFERENCE TO RELATED APPLICATION(S) [0001] The present application is a continuation of U.S. patent application Ser. No. 10 / 334,483, now pending, and is hereby incorporated by reference.BACKGROUND OF THE INVENTION [0002] 1. Technical Field [0003] This invention relates to an apparatus and method for enabling access to restricted hardware of a computer system. More specifically, a key is processed to control the restricted access. [0004] 2. Description of the Prior Art [0005] Game sets for use in conjunction with a television set are an ever increasing form of home entertainment. The game sets are computers that commonly include an accessory to enable a player to communicate with the game set. The game sets have evolved over recent years to provide a more realistic playing experience which requires much real time computation in order to accomplish the desired real time playing experience. Accordingly, the CPU of the game set includes a computer with enhanced computing abilities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32A63F13/10G06F21/00H04N7/16
CPCA63F13/10G06F2221/0797G06F21/123G06F21/445G06F21/6281G06F21/70G06F21/71G06F21/78G06F21/79G06F21/82G06F2221/2103G06F2221/2109G06F2221/2149H04N7/163H04N21/442H04N21/4431A63F2300/201A63F2300/209A63F13/45G06F21/109A63F13/73
Inventor MCKENNEY, PAUL E.KRIEGER, ORRAN Y.BETZLER, BOAS
Owner IBM CORP