×

System and method for detecting a security compromise on a device

  • US 9,619,653 B2
  • Filed: 10/10/2014
  • Issued: 04/11/2017
  • Est. Priority Date: 07/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for verifying security mechanisms of an operating system, the method comprising:

  • receiving, via a security application executing on a computer, one or more decryption keys configured to enable a media component on the computer to decrypt encrypted content;

    determining, via the security application executing on the computer, whether a replacement operating system or an altered operating system is present on the computer;

    determining, via the security application executing on the computer, that one or more security mechanisms of the operating system of the computer are not compromised in response to a replacement operating system or an altered operating system not being present on the computer;

    attempting, via the security application executing on the computer, to initiate execution of an insecure application through the operating system;

    determining, via the security application executing on the computer, that the one or more security mechanisms of the operating system are not compromised in response to the operating system preventing execution of the insecure application; and

    providing, via the security application executing on the computer, the one or more decryption keys to the media component on the computer in response to determining that the one or more security mechanisms of the operating system of the computer are not compromised.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×