SYSTEM FOR CONTROLLING ACCESS AND DISTRIBUTION OF DIGITAL PROPERTY
First Claim
Patent Images
1. An apparatus for the protection of digital data comprising:
- a first processor programmed to run an operating system, the operating system programmed to generate one or more interrupts;
an access mechanism including access control software run on a second processor and a memory, the access mechanism operative to;
detect one or more interrupts at or below a BIOS level, a given detected interrupt being associated with an operating system request to access protected portions of the data;
restrict access to the protected portions of the data by the operating system in accordance with at least one rule; and
a tamper detecting mechanism operative to prevent access to the data in an unprotected form comprising means for destroying data stored in the access mechanism when tampering is detected.
11 Assignments
0 Petitions
Accused Products
Abstract
Digital data protection is provided by a processor running an operating system programmed to generate one or more interrupts; an access mechanism detects one or more interrupts at or below a BIOS level, a given detected interrupt being associated with an operating system request to access protected portions of the data, and restricts access to the protected portions of the data by the operating system in accordance with at least one rule; a tamper detecting mechanism prevents access to the data in an unprotected form has means for destroying data stored in the access mechanism when tampering is detected.
-
Citations
25 Claims
-
1. An apparatus for the protection of digital data comprising:
-
a first processor programmed to run an operating system, the operating system programmed to generate one or more interrupts; an access mechanism including access control software run on a second processor and a memory, the access mechanism operative to; detect one or more interrupts at or below a BIOS level, a given detected interrupt being associated with an operating system request to access protected portions of the data; restrict access to the protected portions of the data by the operating system in accordance with at least one rule; and a tamper detecting mechanism operative to prevent access to the data in an unprotected form comprising means for destroying data stored in the access mechanism when tampering is detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
receiving protected data at an access mechanism, the access mechanism including access control software, a first processor and a memory device; transmitting an unprotected form of the protected data to a second processor in accordance with at least one rule; detecting, through the use of the access mechanism, an interrupt at or below a BIOS level, the detected interrupt comprising a request to output the unprotected form of the protected data to an output peripheral device; outputting the unprotected form of the protected data to the output peripheral device through the access mechanism in accordance with the at least one rule. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification