Systems and methods for governing content rendering, protection, and management applications
0 Assignments
0 Petitions
Accused Products
Abstract
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.
-
Citations
33 Claims
-
1-18. -18. (canceled)
-
19. A method of controlling access to electronic content by an application program running on a host computer system, the method including:
-
generating a request to access a piece of electronic content, the request being generated by the application program and comprising, at least in part, a call to a conformance library running on the host computer system; and
in response to the call to the conformance library, connecting the conformance library to a governance engine on the host computer system, the governance engine being operable to govern, at least in part, the operation of the application program, the governance engine performing the following steps;
(i) performing an integrity check on the application program, the integrity check being operable to (a) detect improper modifications to at least part of the application program and (b) deny access to the piece of electronic content if an improper modification is detected; and
(ii) performing an authorization check, the authorization check being operable to (a) determine if the application program is authorized to access electronic content and (b) deny access to the piece of electronic content if authorization is not detected; and
retrieving the piece of electronic content from a file system of the host computer system if permitted by the governance engine. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method of controlling access to electronic content, the method comprising:
-
receiving, at a conformance library running on a computer system, a request from a governed application running on the computer system to access a piece of electronic content, wherein the conformance library implements one or more interfaces that the governed application calls to access the electronic content, and wherein the request to access the piece of electronic content comprises at least a first call to at least a first interface of said one or more interfaces that the conformance library implements;
connecting to a supervisory application, the supervisory application being operable to check a credential associated with the governed application, the supervisory application being further operable to disable access to the piece of electronic content by the governed application if the credential check fails; and
enabling access to the piece of electronic content by the governed application after completion of a successful credential check, wherein said enabling step includes making at least a second call to at least a second interface, and wherein the second interface comprises a file input/output interface of the computer system that corresponds to said first interface implemented by the conformance library. - View Dependent Claims (27, 28, 29)
-
-
30. A computer-readable storage medium storing instructions that, when executed by a computer, cause the computer to perform steps comprising:
-
receiving a request from a governed application running on the computer to access a piece of electronic content, wherein the request to access the piece of electronic content comprises at least a first call to at least a first interface;
connecting to a supervisory application running on the computer, the supervisory application being operable to check a credential associated with the governed application, the supervisory application being further operable to disable access to the piece of electronic content by the governed application if the credential check fails; and
enabling access to the piece of electronic content by the governed application upon completion of a successful credential check, wherein said enabling includes making at least a second call to at least a second interface, and wherein the second interface comprises a file input/output interface of the computer that corresponds to said first interface. - View Dependent Claims (31, 32, 33)
-
Specification