Apparatus and method for securely managing the accessibility to content and applications
First Claim
1. A device, comprising:
- a secure element having a secure element memory; and
a secure device processor separate from the secure element and in communication therewith, the secure device processor having a secure device processor memory with executable instructions, wherein the secure device processor, responsive to executing the instructions, facilitates performance of operations comprising;
generating a first verification for access by the device to content that is sourced via a source server, wherein the first verification is based on non-secret information, wherein the content is accessed from the source server based on the first verification and a second verification, wherein the second verification is generated by the secure element based on secret information that is stored in the secure element memory without the secure element providing the secret information to the secure device processor, and wherein the secure device processor does not have access to the secret information;
generating consumption information by monitoring the access to the content;
providing the consumption information associated with the access to the content to the secure element, the consumption information indicating that the content has been presented by the device; and
preventing the device from further accessing the content according to access instructions from the secure element, wherein the access instructions are responsive to the consumption information.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates the subject disclosure may perform, for example, receive secret information and non-secret information from a secure download application function, provide a request for a first verification to a secure element where the first verification is associated with access to content and/or an application that is accessible via the secure download application function, receive the first verification which is generated by the secure element based on the secret information without providing the secret information to the secure device processor, receive the non-secret information from the secure element, and generate a second verification for the access based on the non-secret information, where the content and/or application is accessible from the secure download application function responsive to the first and second verifications. Other embodiments are disclosed.
-
Citations
20 Claims
-
1. A device, comprising:
-
a secure element having a secure element memory; and a secure device processor separate from the secure element and in communication therewith, the secure device processor having a secure device processor memory with executable instructions, wherein the secure device processor, responsive to executing the instructions, facilitates performance of operations comprising; generating a first verification for access by the device to content that is sourced via a source server, wherein the first verification is based on non-secret information, wherein the content is accessed from the source server based on the first verification and a second verification, wherein the second verification is generated by the secure element based on secret information that is stored in the secure element memory without the secure element providing the secret information to the secure device processor, and wherein the secure device processor does not have access to the secret information; generating consumption information by monitoring the access to the content; providing the consumption information associated with the access to the content to the secure element, the consumption information indicating that the content has been presented by the device; and preventing the device from further accessing the content according to access instructions from the secure element, wherein the access instructions are responsive to the consumption information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory machine-readable medium comprising executable instructions that, when executed by a processing system including a secure device processor, facilitate performance of operations comprising:
-
generating a first verification for access to content that is sourced via a source server, wherein the first verification is based on non-secret information, wherein the content is accessed from the source server based on the first verification and a second verification, wherein the second verification is generated by a secure element having a secure element memory, the secure element separate from the secure device processor and in communication therewith, the second verification based on secret information that is stored in the secure element memory without the secure element providing the secret information to the secure device processor, and wherein the secure device processor does not have access to the secret information; generating consumption information by monitoring the access to the content; providing the consumption information associated with the access to the content to the secure element; and preventing the secure device processor from further accessing the content according to access instructions from the secure element, wherein the access instructions are responsive to the consumption information. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
generating, by a processing system comprising a secure device processor, a first verification for access to content that is sourced via a source server, wherein the first verification is based on non-secret information, wherein the content is accessed from the source server based on the first verification and a second verification, wherein the second verification is generated by a secure element having a secure element memory, the secure element separate from the secure device processor and in communication therewith, the second verification based on secret information that is stored in the secure element memory without the secure element providing the secret information to the secure device processor; generating, by the processing system, consumption information by monitoring the access to the content; providing, by the processing system, the consumption information associated with the access to the content to the secure element, the consumption information indicating that the content has been presented by the device; and preventing, by the processing system, the secure device processor from further accessing the content according to access instructions from the secure element, wherein the access instructions are responsive to the consumption information. - View Dependent Claims (17, 18, 19, 20)
-
Specification