US 12,255,879 B2
Secure application processing systems and methods
Gary Ellison, San Mateo, CA (US); Gilles Boccon-Gibod, San Francisco, CA (US); and Pierre Chavanne, Davis, CA (US)
Assigned to Intertrust Technologies Corporation, Berkeley, CA (US)
Filed by Intertrust Technologies Corporation, Sunnyvale, CA (US)
Filed on May 10, 2021, as Appl. No. 17/316,554.
Application 17/316,554 is a continuation of application No. 16/534,966, filed on Aug. 7, 2019, granted, now 11,032,253.
Application 16/534,966 is a continuation of application No. 14/609,288, filed on Jan. 29, 2015, granted, now 10,419,400, issued on Sep. 17, 2019.
Claims priority of provisional application 61/932,994, filed on Jan. 29, 2014.
Prior Publication US 2021/0266301 A1, Aug. 26, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); G06F 21/10 (2013.01); G06F 21/72 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/0428 (2013.01) [G06F 21/10 (2013.01); G06F 21/72 (2013.01); H04L 2463/061 (2013.01); H04L 2463/101 (2013.01)] 14 Claims
OG exemplary drawing
 
1. A method performed by a first application running in a secure execution environment of a first computing system, the method comprising:
receiving a service invocation request from a second application running in an execution environment of the first computing system separate from the secure execution environment;
establishing, in response to the service invocation request, a communications channel between the first application and a second computing system, the second computing system being a different computing system than the first computing system;
obtaining a license from the second computer system, the license comprising an encrypted content decryption key, the encrypted content decryption key being encrypted using at least one derived key generated based on at least one shared secret between the first application and the second computing system, wherein the at least one shared secret is not exposed within the first computing system outside the secure execution environment;
decrypting the encrypted content decryption key included in the license to generate a decrypted content decryption key using, at least in part, the at least one shared secret;
decrypting a piece of content using the decrypted content decryption key; and
providing the second application with access to the decrypted piece of content.