SECURE PROCESSOR ARCHITECTURE FOR USE WITH A DIGITAL RIGHTS MANAGEMENT (DRM) SYSTEM ON A COMPUTING DEVICE
First Claim
1. A secure processor for a computing device, the processor being operable in a normal mode and a preferred mode, the processor including a security kernel for being instantiated on the processor when the processor enters into the preferred mode and a security key accessible by the instantiated security kernel when the processor is operating in the preferred mode, the security kernel employing the accessed security key during the preferred mode to authenticate a secure application on the computing device, wherein the security kernel allows the processor to be trusted to keep hidden a secret of the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure processor is operable in normal and preferred modes, and includes a security kernel instantiated when the processor enters into preferred mode and a security key accessible by the security kernel during preferred mode. The security kernel employs the accessed security key to authenticate a secure application, and allows the processor to be trusted to keep hidden a secret of the application. To instantiate the application, the processor enters preferred mode where the security key is accessible, and instantiates and runs the security kernel. The security kernel accesses the security key and applies same to decrypt a key for the application, stores the decrypted key in a location where the application will expect same, and instantiates the application. The processor then enters the normal mode, where the security key is not accessible.
38 Citations
20 Claims
- 1. A secure processor for a computing device, the processor being operable in a normal mode and a preferred mode, the processor including a security kernel for being instantiated on the processor when the processor enters into the preferred mode and a security key accessible by the instantiated security kernel when the processor is operating in the preferred mode, the security kernel employing the accessed security key during the preferred mode to authenticate a secure application on the computing device, wherein the security kernel allows the processor to be trusted to keep hidden a secret of the application.
-
15. A method for a secure processor to instantiate a secure application thereon, the method comprising:
-
instantiating a first security kernel which employs symmetric cryptography;
instantiating by way of the instantiated first security kernel a second security kernel which employs asymmetric cryptography; and
authenticating by way of the instantiated second security kernel the secure application. - View Dependent Claims (16, 17)
-
-
18. A computer-readable medium having stored thereon computer-executable instructions implementing a method for a secure processor to instantiate a secure application thereon, the method comprising:
-
instantiating a first security kernel which employs symmetric cryptography;
instantiating by way of the instantiated first security kernel a second security kernel which employs asymmetric cryptography; and
authenticating by way of the instantiated second security kernel the secure application. - View Dependent Claims (19, 20)
-
Specification