System and Method for Detecting a Security Compromise on a Device
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of a system and method for detecting a security compromise on a device are described. Embodiments may be implemented by a content consumption application configured to protect content decryption keys on a device, such as a computer system (e.g., a desktop or notebook computer) or a mobile device (e.g., a smartphone or tablet). For instance, the content consumption application may be configured to provide decryption keys for respective content to a media component (or another component of the operating system) if multiple conditions have been met. For instance, in various embodiments, the content consumption application may pass the key to the media component after ensuring that i) one or more security mechanisms of the device operating system have not been compromised and ii) one or more executable instructions of the content consumption application have not been tampered (e.g., instructions corresponding to a function that handles the decryption key(s)).
39 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A computer-implemented method comprising:
-
receiving, via an application executing on a computer, one or more decryption keys configured to enable a media component on the computer to decrypt encrypted content; determining whether a replacement operating system or an altered operating system is present on the computer; determining that one or more security mechanisms of an operating system of the computer are not compromised in response to a replacement operating system or an altered operating system not being present on the computer; and providing, via the application, the one or more decryption keys to the media component on the computer in response to determining that the one or more security mechanisms of the operating system of the computer are not compromised. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system, comprising:
-
one or more processors; one or more computer-readable media comprising processor-executable instructions that, responsive to execution by the one or more processors, implement an application to perform operations comprising; receiving one or more decryption keys configured to enable a media component on the system to decrypt encrypted content; determining whether a file indicative of a replacement operating system or an altered operating system is present on the system; determining that one or more security mechanisms of an operating system of the system are not compromised in response to the file indicative of a replacement operating system or an altered operating system not being present on the system; and providing the one or more decryption keys to the media component on the system in response to determining that the one or more security mechanisms of the operating system of the system are not compromised. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A computer-readable storage device comprising processor-executable instructions that, responsive to execution by one or more processors, implement an application to perform operations comprising:
-
receiving one or more decryption keys configured to enable a media component of a computing device to decrypt encrypted content; determining whether a replacement operating system or an altered operating system is present on the computing device; determining that one or more security mechanisms of an operating system of the computing device are not compromised in response to a replacement operating system or an altered operating system not being present on the computing device; and providing the one or more decryption keys to the media component of the computing device in response to determining that the one or more security mechanisms of the operating system of the computing device are not compromised. - View Dependent Claims (37, 38, 39, 40)
-
Specification