Systems and methods for governing content rendering, protection, and management applications
DC CAFCFirst Claim
Patent Images
1. A method performed by a system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the system to perform the method, the method comprising:
- receiving, by a secure control application executing on the system in a protected processing environment, a request to access protected content by a governed application executing on the system in a processing environment separate from the protected processing environment;
extracting, by the secure control application, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and
sending, by the secure control application, the unencrypted secret information from the protected processing environment to the governed application executing in the processing environment separate from the protected processing environment.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.
78 Citations
18 Claims
-
1. A method performed by a system comprising a processor and a non-transitory computer-readable storage medium storing instructions that, when executed by the processor, cause the system to perform the method, the method comprising:
-
receiving, by a secure control application executing on the system in a protected processing environment, a request to access protected content by a governed application executing on the system in a processing environment separate from the protected processing environment; extracting, by the secure control application, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and sending, by the secure control application, the unencrypted secret information from the protected processing environment to the governed application executing in the processing environment separate from the protected processing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable storage medium storing instructions that, when executed by a processor of a system, cause the system to perform a method, the method comprising:
-
receiving, by a secure control application executing on the system in a protected processing environment, a request to access protected content by a governed application executing on the system in a processing environment separate from the protected processing environment; extracting, by the secure control application, secret information from a secure electronic container, the secret information being configured to be used, at least in part, to decrypt the protected content, wherein extracting the secret information comprises decrypting at least a portion of the secure electronic container to generate unencrypted secret information; and sending, by the secure control application, the unencrypted secret information from the protected processing environment to the governed application executing in the processing environment separate from the protected processing environment. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification