IEEE P1735 Working Group Meeting of March 9, 2009

Meeting Info

Conference Bridge and Live-Meeting


  • Attending
    • Steven Dovich, Cadence
    • Ruchi Tyagi, Cadence
    • Nitin Khurana, Cadence
    • Michael Smith, Synopsys
    • Karlton Lau, Xilinx
    • Parminder Gill, Synopsys
    • Dave Clemans, Synopsys

  • Not Attending
    • Dave Graubart, Synopsys
    • Bin Dai, Xilinx
    • Nick Sgoupis, CAST
    • William A Hanna, Boeing
    • John Shields, Mentor
    • Premduth Vidyanandan, Xilinx
    • Meera Srinivasan, Synopsys
    • Syed Huq, Cisco
    • Jim Robinson, Synopsys
    • NSS Subramanian, Cadence
    • David Tran, Synopsys
    • Gary Delp, LSI


  1. Determine Quorum
  2. Patent slides
  3. Approve agenda
  4. Approval of Meeting minutes from 2/23/2009
  5. Action Items Status
  6. Liaison Reports
  7. Meeting Schedule
  8. Recommended Algorithms (AES-256)
  9. License Management
  10. Inter-operability testing
  11. Other Business
  12. Adjourn



We have 3/4 eligible entities, and have a working quorum.

Patent Policy

The Patent slides were offered for review.

No new claims were disclosed at the call for essential patent claims.

Agenda Approval

Motion by Michael, seconded by Karlton. Motion is approved.

Previous Minutes

Karlton moved and Michael seconded the approval of the February 23, 2009 minutes. The motion was approved.

Action Item Review

Steven reviewed the open action items.

Liaison Reports

Steven reminded the group about the open ballot period for P1800 and encouraged P1735 members who were also members of P1800 to review the protected envelope changes and get their feedback to their P1800 representatives.

Steven asked for feedback on IP protection issues from the recent DVCon conference. No conference attendees were on the call.

Recommended Algorithms

The Recommendations page has been updated to include AES-256, and approval of those changes is scheduled for the next meeting.

License Management

Michael wanted to clarify his comments from last meeting about the security of using symmetric keys for the socket based approach. He is not aware of any known attacks for AES that are relevant to this particular model. The socket based scheme is similar to the technique used by FlexLM to secure their client side communication with the server.

Michael is looking for some guidance on which direction we should commit to.

Inter-operability Testing

The group reviewed John's e-mail contribution and will discuss it further at the next meeting.

Other Business

%ACTION{ closed="2009-03-11" closer="Main.StevenDovich" created="2009-03-09" creator="Main.StevenDovich" due="" state="closed" uid="000056" who="Main.StevenDovich" }% Restore Live Meeting support for next meeting %ACTION{ closed="2009-03-09" closer="Main.StevenDovich" created="2009-03-09" creator="Main.StevenDovich" due="" state="closed" uid="000057" who="Main.StevenDovich" }% Post Inter-Operability overview to the web


Motion by Parminder, second by Karlton. Approved by acclamation at 10:34 pm CDT


These minutes were approved at the March 23, 2009 meeting.

-- StevenDovich - 23 Mar 2009

Topic revision: r3 - 2009-04-20 - 15:51:26 - StevenDovich
Copyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback