Automatic update of computer-readable components to support a trusted environment
First Claim
Patent Images
1. A computer-readable medium having computer-executable instructions performing a method, comprising:
- determining whether computer-readable components loaded within a memory of a computing device are at a level of protection specified for protected content that a media application is attempting to process; and
if a current level of protection of the computing device provides less protection than the level of protection specified for the protected content, updating a file to achieve at least the level of protection specified by the protected content, wherein updating is performed in a manner that minimizes rebooting of the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
The present automatic update mechanism provides a method for determining whether computer-readable components loaded within a memory device are at a level of protection specified for protected content that a media application is attempting to process. If a current level of protection provides lower protection that the level specified, a file is updated to achieve at least the level of protection specified by the protected content. Updating the file to achieve the level of protection is performed in a manner that minimizes rebooting of a computing device.
16 Citations
20 Claims
-
1. A computer-readable medium having computer-executable instructions performing a method, comprising:
-
determining whether computer-readable components loaded within a memory of a computing device are at a level of protection specified for protected content that a media application is attempting to process; and
if a current level of protection of the computing device provides less protection than the level of protection specified for the protected content, updating a file to achieve at least the level of protection specified by the protected content, wherein updating is performed in a manner that minimizes rebooting of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computing device, comprising:
-
a processor;
a memory into which a plurality of computer-executable components are loaded, the plurality of components comprising;
a media application for processing protected content;
an authorization component executing within a kernel space of the memory;
a renewal component configured to receive an identifier associated with one of the plurality of computer-executable components when the authorization component fails to load the one component due to its untrustworthiness and to automatically obtain an updated version of the one component using the identifier upon user authorization. - View Dependent Claims (17, 18, 19)
-
-
20. A computer-readable storage medium having stored thereon a data structure, comprising:
-
a header section including a version identifier and a force reboot parameter, the version identifier corresponding to a level of trust provided to protected content processed by a computing device enforcing the data structure;
a revocation section identifying at least one computer-readable component that has become untrustworthy in supporting the level of trust; and
a renewal section identifying a location for an updated version of a corresponding computer-readable component identified within the revocation section;
wherein upon processing of protected content, the version is examined to determine whether the computing device needs to obtain another data structure having a different version and examining the force reboot parameter to determine whether the computing device needs to be rebooted after obtaining the updated version for each of the computer-readable components, the force reboot parameter indicating that rebooting occurs if any one of the computer-readable components identified in the revocation section is a malicious kernel-mode computer-readable component.
-
Specification