×

Attested content protection

  • US 8,387,152 B2
  • Filed: 06/27/2008
  • Issued: 02/26/2013
  • Est. Priority Date: 06/27/2008
  • Status: Active Grant
First Claim
Patent Images

1. At a computer system including a processor, an operating system and one or more applications, a method for protecting content, the method comprising:

  • establishing a protection policy to protect content regardless of where the content is initially or subsequently distributed, the protection policy being manageable by a rights management system that includes a separate rights management server, the protection policy including;

    a list of users that are authorized to access the protected content and a list of authorized computing environments that are permitted to access the protected content, wherein the list of authorized computing environments is separately specified for and is specific to each portion of protected content, and wherein each authorized computing environment comprises a specific combination of computer system attributes required for the computing environment to be authorized to access the protected content;

    determining by the processor that a user is attempting to access the protected content through an application of the one or more applications at the computer system;

    prior to allowing the application to access the protected content;

    the computer system exchanging information with the rights management server about the user'"'"'s identity so as to validate that the user is authorized to access the protected content;

    the operating system attesting to a specified set of information indicating that the computer system includes the specified combination of computer system attributes required for the computer system to be an authorized computing environment that is permitted to access the protected content according to the established protection policy which includes the list of users and authorized computing environments that are permitted to access the protected content; and

    the computer system allowing the application to access the protected content in response to the operating system attesting to an authorized computing environment that is permitted to access the protected content and validating that the user is authorized to access the protected content.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×