Claims
- 1. A system for handling digital content in a secure manner, comprising:
a first module trusted by a content distributor for handling the digital content; at least one other module specified by the first module as trusted for handling the digital content.
- 2. The system of claim 1 further comprising at least one additional module specified by the at least one other module as trusted for handling the digital content.
- 3. The system of claim 2 where the at least one other module is a security manager, and where the application program includes a component specified as trusted for handling the digital content.
- 4. The system of claim 1 where the at least one other module is a content provider.
- 5. The system of claim 4 where the content provider is an application program for presenting the digital content to a user.
- 6. The system of claim 5 where the application program includes a component specified as trusted for handling the digital content.
- 7. The system of claim 1 further comprising a plurality of other modules specified by the first module as trusted to handle the digital content.
- 8. The system of claim 1 where the other module is a hardware device.
- 9. The system of claim 8 where the hardware device has an identity, and where the first module verifies the identity of the hardware device.
- 10. The system of claim 8 where the first module grants access to a designated memory area to the hardware device.
- 11. The system of claim 1 further comprising a secure memory for holding code and secret data for executing the modules.
- 12. The system of claim 11 where the secure memory is divided into multiple pages.
- 13. The system of claim 12 further comprising a table for storing a number of permissions for the modules for each of the pages.
- 14. The system of claim 12 where the memory is divided into a plurality of rings.
- 15. The system of claim 14 further comprising a table for storing a number of permissions for the modules for each of the pages.
- 16. The system of claim 11 further comprising a processor for executing the modules.
- 17. A system for handling digital content in a secure manner, comprising:
a secure loader for manipulating secret data; a security manager named by the secure loader as trusted for handling secret premium data comprising the digital content; a number of content providers named by the security manager as trusted for performing operations upon the premium data.
- 18. The system of claim 17 further comprising a secure memory.
- 19. The system of claim 18 where the secure loader executes in the secure memory.
- 20. The system of claim 18 where the security manager decrypts the premium data.
- 21. The system of claim 18 where the security manager specifies at least one entry point for multiple code modules executing in the secure memory.
- 22. The system of claim 18 where the secure loader programs permissions for other code modules operating in the secure memory.
- 23. The system of claim 18 further comprising a memory manager for holding permissions for multiple pages in the secure memory.
- 24. The system of claim 23 where the permissions for each page include a permission for executing code located in that page.
- 25. A method implemented on a programmable digital computer for handling content, the method comprising:
establishing trust for a first module; naming within the first module at least a second module that the first module trusts; establishing trust for the second module in response to the naming step.
- 26. The method of claim 25 further comprising:
naming within the second module at least a third module that the second module trusts; establishing trust for the third module in response to the second naming step.
- 27. The method of claim 26 further comprising:
naming within the first module a plurality of modules that the first module trusts; establishing trust for the plurality of modules in response to the second naming step.
- 28. A method implemented on a programmed digital computer for handling premium content, comprising:
executing a first code module; calling a second code module from the first module; setting pages in a secure memory for the use of the second module; executing the second module from the secure memory.
- 29. The method of claim 28, further comprising, prior to setting, determining that the second module is trusted by determining that a previously trusted code module names the second module as trusted.
- 30. The method of claim 29 further comprising verifying a signature of the second module.
- 31. The method of claim 29 further comprising initiating a trusted interrupt handler for trapping interrupts during execution of the second module.
- 32. A method implemented on a programmed digital computer for handling premium content, comprising:
starting a secure loader in the system; initiating a secure session with the secure loader; receiving a trusted security manager during the session; storing the security manager to a nonvolatile storage; thereafter, handling the premium with the security manager.
- 33. The method of claim 32 where the secure loader issues a certificate attesting its authenticity during the secure session.
- 34. The method of claim 33 wherein receiving comprises receiving, from another party, the trusted security manage during the secure session, where the another party to the secure session determines whether or not to trust the secure loader based upon the certificate.
- 35. The method of claim 33 where the security manager is received in encrypted form.
- 36. The method of claim 35 where the secure loader decrypts the security manager.
- 37. The method of claim 32 further comprising storing the security manager in a secure memory.
- 38. The method of claim 37 where handling the premium content comprises:
calling a code module for handling the content via an entry point in the security manager; determining that the code module is named in the security manager as a trusted module; designating one or more pages in the secure memory for the code module; executing the code module from the designated pages.
- 39. The method of claim 32 further comprising:
requesting the premium content from a distributor; determining that the security manager trusts a component for handling the premium data; vouching for the trusted component to the distributor; executing the trusted component upon the premium data.
- 40. A medium bearing instructions and data for performing a method for handling premium content, the method comprising:
establishing trust for a first module; naming within the first module at least a second module that the first module trusts; establishing trust for the second module in response to the naming step.
- 41. A medium bearing instructions and data for performing a method for handling premium content, the method comprising:
executing a first code module; calling a second code module from the first module; setting pages in a secure memory for the use of the second module; executing the second module from the secure memory.
- 42. The medium of claim 41, further comprising instructions for determining that the second module is a trusted module prior to setting pages.
- 43. A medium bearing instructions and data for performing a method for handling premium content, the method comprising:
starting a secure loader in the system; initiating a secure session with the secure loader; receiving a trusted security manager during the session; storing the security manager to a nonvolatile storage; thereafter, handling the premium with the security manager.
RELATED APPLICATIONS
[0001] This application is a continuation of U.S. patent application Ser. No. 09/287,698, filed on Apr. 6, 1999, entitled “Heirarchical Trusted Code For Content Protection In Computers”, naming Butler W. Lampson and Paul England as inventors, the disclosure of which is hereby incorporated herein by reference.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09287698 |
Apr 1999 |
US |
Child |
10870845 |
Jun 2004 |
US |