Systems and methods for governing content rendering, protection, and management applications
First Claim
Patent Images
1. A method performed by a first system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the first system to perform the method, the method comprising:
- receiving, by a secure control application executing on the first system in a protected processing environment, a request to access protected content by a governed application executing on a second system, the second system being remote from the first system;
extracting, by the secure control application executing on the first system, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and
sending, by the secure control application executing on the first system, the unencrypted secret information to the governed application of the second system.
2 Assignments
0 Petitions
Accused Products
Abstract
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.
78 Citations
18 Claims
-
1. A method performed by a first system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the first system to perform the method, the method comprising:
-
receiving, by a secure control application executing on the first system in a protected processing environment, a request to access protected content by a governed application executing on a second system, the second system being remote from the first system; extracting, by the secure control application executing on the first system, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and sending, by the secure control application executing on the first system, the unencrypted secret information to the governed application of the second system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor of a first system, cause the first system to perform a method, the method comprising:
-
receiving, by a secure control application executing on the first system in a protected processing environment, a request to access protected content by a governed application executing on a second system, the second system being remote from the first system; extracting, by the secure control application executing on the first system, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and sending, by the secure control application executing on the first system, the unencrypted secret information to the governed application. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification