Security Module
a security module and module technology, applied in the field of security modules, can solve the problems of limited access of applications to computer hardware, and achieve the effect of restricting access to computer hardware and high resolution buffer
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
Overview
[0016] The manufacturers of home entertainment sets leverage the cost of the set for the cost of accessories. The game sets are comprised of CPUs with enhanced graphics and timing, and only authorized software has access to the enhanced hardware of the game set CPU. There is a need to enable non-competitors of the game set manufacturers to be able to access the enhanced hardware of the game set through an authorization system.
Technical Background
[0017] Each game set has a CPU and associated hardware to enable an authorized game to properly function and to provide virtual effects that appear in real time. Some of the hardware that enables the real time effects include a graphics accelerator, a floating point accelerator and a high resolution frame buffer. In addition, each game set includes a trusted firmware layer that cannot be replaced with an unauthorized piece of firmware. Firmware is software that is stored in hardware, such that the software is retained even after p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


