Secure processing systems and methods

ABSTRACT

This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.

RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/676,587, filed Nov. 7, 2019 (now U.S. Pat. No. 10,949,550), which isa continuation of U.S. patent application Ser. No. 16/277,372, filedFeb. 15, 2019 (now U.S. Pat. No. 10,949,549), which is a continuation ofU.S. patent application Ser. No. 15/166,025, filed May 26, 2016 (nowU.S. Pat. No. 10,255,440), which is a continuation of U.S. patentapplication Ser. No. 14/509,376, filed Oct. 8, 2014 (now U.S. Pat. No.9,369,280), which is a continuation of U.S. patent application Ser. No.13/163,244, filed Jun. 17, 2011 (now U.S. Pat. No. 8,874,896), which isbased upon and claims priority under 35 U.S.C. § 119(e) to U.S.Provisional Patent Application No. 61/356,524, filed Jun. 18, 2010, andentitled “SECURE PROCESSING SYSTEMS AND METHODS,” all of which arehereby incorporated by reference in their entireties.

COPYRIGHT AUTHORIZATION

A portion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction by anyone of the patent documentor the patent disclosure, as it appears in the Patent and TrademarkOffice patent file or records, but otherwise reserves all copyrightrights whatsoever.

BACKGROUND AND SUMMARY

The present disclosure relates generally to systems and methods for thesecure processing of digital or electronic information. Morespecifically, the present disclosure relates to systems and methods forenabling the use of secret digital or electronic information withoutexposing the sensitive information to unsecured applications.

Computer systems are commonly used to store and process digitalinformation that a user may wish to keep secret or secure. For example,a user may wish to prevent secret information related to their identity,financial accounts, passwords, and the like from being accessed byand/or exposed to potential attackers who may desire to exploit suchsecret information. Further, information (e.g., cryptographic keys,certificates, licenses, control programs, etc.) utilized in digitalrights management (“DRM”) implementations designed to preventunauthorized access and/or use to secure and/or proprietary content mayalso need to be kept secret to maintain the integrity of the DRMimplementation. Accordingly, systems and methods to manage theprocessing of secret information by a computer system in a secure mannerare desirable.

To prevent unauthorized access to and/or exposure of secret or secureinformation, a processing environment may be established on a computersystem having a plurality of processing domains with different levels ofsecurity. For example, a secure processing domain may be establishedwhere secret information is securely processed and protected fromexposure to applications executing outside the secure processing domain.An open processing domain may be established where less-sensitive and/orless-secure operations and applications may be performed and/orexecuted. Potential attackers may gain access to the open processingdomain by virtue of its less secure nature, but will be substantiallyimpeded from accessing the secret or secure information processed withinthe secure processing domain given its higher level of security.

In some circumstances, applications running in the open processingdomain may need to use secret information protected within the secureprocessing domain. Consistent with embodiments disclosed herein, asecure programmatic abstraction layer may operate as a boundary betweenthe secure processing domain and the open processing domain allowingapplications running in the open processing domain to utilize secretinformation protected within the secure processing domain withoutcompromising the security of the secret information. The secureprogrammatic abstraction layer may be invoked by the application runningin the open processing domain and used to perform required operations onthe secret information in a secure environment.

Secure operations performed on and/or using secret informationconsistent with embodiments disclosed herein may initate when a clientapplication executing in an open processing domain of a system invokes asecure abstraction layer. The secure abstraction layer may be configuredto interface with secret data protected by a secure processing domain ofthe system. In some embodiments, the secure processing domain mayinclude a secure processor unit having integrated support for symmetricand asymmetric cryptographic algorithms Further, in certain embodiments,before invoking the secure abstraction layer, the system may determinethat the secure abstraction layer is trusted. Determining that thesecure abstraction layer is trusted may be based on, for example, asuccessful signature verification operation.

Once invoked, the secure abstraction layer may perform one or moresecure operations on the secret information based on an invocation froma client application. The secure operations may include, for example,loading a cryptographically wrapped key into the secure abstractionlayer, performing encryption/decryption operations utilizing the secretinformation, performing cryptographic signing and/or signatureverification utilizing the secret information, encrpyting secret fieldswithin a larger piece of data utilizing the secret information, and/orperforming digest calculations. By performing secure operations in thesecure processing domain, the secret information may not be exposed tothe less-secure client application running the open processing domain.

In certain embodiments, secret information may be exported and/orpersisted from the secure processing domain in a secure manner. Toexport or persist secret information, the secret information may firstbe encrypted using a persistent (e.g., permanent) encrpytion key. Incertain embodiments, the persistent encrpytion key may be associatedwith hardware components of the secure processing domain and beconfigured to persist between system reboots. The secret informationmay, in addition or alternatively, be encrpyted using a cyclingencrpytion key that may not be configured to persist between systemreboots. Once encrpyted by the persistant and/or cycling encryption key,the secret information may then be exported from the secure abstractionlayer to the client application running in the open processing domain.

BRIEF DESCRIPTION OF THE DRAWINGS

The inventive body of work will be readily understood by referring tothe following detailed description in conjunction with the accompanyingdrawings, in which:

FIG. 1 illustrates an exemplary system architecture for a mediaapplication deployed on an embedded device consistent with embodimentsof the present disclosure.

FIG. 2 illustrates a method for performing secure operations on secretdata consistent with embodiments of the present disclosure.

FIG. 3 illustrates a method for persisting and exporting secret dataconsistent with embodiments of the present disclosure.

FIG. 4 . illustrates a method of performing cloaking operationsconsistent with embodiments of the present disclosure.

FIG. 5 illustrates an exemplary computer system for implementingembodiments of the present disclosure.

DETAILED DESCRIPTION

A detailed description of the systems and methods consistent withembodiments of the present disclosure is provided below. While severalembodiments are described, it should be understood that disclosure isnot limited to any one embodiment, but instead encompasses numerousalternatives, modifications, and equivalents. In addition, whilenumerous specific details are set forth in the following description inorder to provide a thorough understanding of the embodiments disclosedherein, some embodiments can be practiced without some or all of thesedetails. Moreover, for the purpose of clarity, certain technicalmaterial that is known in the related art has not been described indetail in order to avoid unnecessarily obscuring the disclosure.

Systems and methods are presented for facilitating the secure processingof secret, proprietary, and/or other information (e.g., secureelectronic content). In certain embodiments, the systems and methodsdescribed herein can, for example, be used in connection with digitalrights management (“DRM”) technologies such as that described incommonly assigned, co-pending U.S. patent application Ser. No.11/583,693, filed Oct. 18, 2006 (“the '693 application”), and/or serviceorchestration technologies such as those described in commonly assignedU.S. patent application Ser. No. 10/863,551 (“the '551 application”)(thecontents of both the '693 application and the '551 application herebybeing incorporated by reference in their entireties) as well as in othercontexts. It will be appreciated that these systems and methods arenovel, as are many of the components, systems, and methods employedtherein.

DRM engines (e.g., such as those described in the '693 application) andother software can benefit from leveraging the security and/or mediaacceleration functionality of certain system on a chip (“SoC”) baseddevices. Leveraging integral secure components of a SoC can simplify andoptimize the development process, especially with respect to achievingcompliance with security and robustness rules of a particular contentprotection implementation.

Embodiments of the systems and methods described herein can be used toprovide a minimal programmatic abstraction layer that confines thehandling of secret information (e.g., cryptographic keys) to arelatively small and verifiable secure code module. Depending on thesystem architecture, this secure code module may directly interact witha secure processor integrated on the SoC operating in a secureprocessing domain. With this level of integration, cryptographic keysand other secret information can be isolated from applications runningon a general purpose CPU integrated on the SoC operating in an openprocessing domain, and be protected from exposure to potential attackersby the security processor. Secret information (e.g., cryptographic keys)may only be exposed within the protected memory space of the securityprocessor (i.e., within the secure processing domain), and encryption,decryption, signing, and verification functions may be executed on thesecurity processor. By preventing the secret information from beingexposed to the general purpose CPU and/or the open processing domain,the security of the secret information may be maintained.

Device makers may benefit from this approach by limiting their portingeffort to mapping the native security functionality of their platformunder this abstraction layer. This may allow the port to be completedwith only minimal knowledge of the content protection system beingdeployed. In the case of SoC based systems that include an integralsecure processor, the effort needed to harden the system so as to complywith desired or mandated robustness requirements may be simplified.

To implement a secure and robust DRM system (e.g., embodiments of theDRM system described in the '693 application) and/or other contentprotection systems, only basic and commonly supported securitycapabilities may be required. From these basic primitives, higher-levelfunctions can be implemented that may provide consistent behavior acrossdifferent underlying hardware architectures. For example, in someembodiments, the basic security capabilities of the underlying platformmight include a secret device key (e.g., a symmetric or asymmetricsecret device key), basic cryptographic primitives, and/or an integrityprotected bootstrap.

Secure Key Box (“SKB”)

In certain embodiments, an application programming interface (“API”) isprovided, an abstraction of which may be an SKB configured to operate asa secure programmatic abstraction layer. The SKB may be realized by thepresence of a secured secret device key (or keys) that, in certainembodiments, may be referred to as a Master Key. In some embodiments,the Master Key may be securely embedded in a hardware security element(e.g., One Time Programmable [“OTP”] memory) such as a SoC or TrustedPlatform Module (“TPM”). In some embodiments, the Master Key maycomprise a white-box cipher key, or other type of key that issufficiently protected so as to act as a root of trust used to enablethe secure marshalling of other keys and credentials into the Secure KeyBox.

In one embodiment, when a device boots, or prior to loading a DRM(and/or other relevant) software application, the SKB software codemodule may be verified to determine if it is trusted. The mechanism bywhich this is accomplished can be a platform specific function. Incertain embodiments, verification of whether the SKB software codemodule is trusted may be performed through signature verification of theSKB software module. In certain embodiments, having a Master Keyembedded within a hardware security module (e.g., SoC or TPM) enablesthis verification step to be very robust.

In some embodiments, the Master Key can be used directly to verify theintegrity of the code, while in other embodiments, a more flexibleapproach can be employed, in which the Master Key can be used to marshalan integrity-protected trust anchor or a confidentiality-protectedsymmetric key from a secondary storage (e.g., non-volatile random-accessmemory (“NVRAM”)). This technique of storing secrets and trustedinformation may be referred to as a Vault. Once this trust anchor or keyhas been securely loaded from secondary storage, it can then be used bya integrity protected bootstrap to verify the signature over the SKBcode module.

Other than the secure storage of the Master Key, some embodiments of anSKB need no additional secure storage, and may rely on a Vault tosecurely store any trusted data that may be necessary in secondarystorage. That is, in such embodiments, secret and trusted informationmay be stored in secondary storage so long as the information at rest isprotected by the Master Key or some other key that is confidentialityprotected by the Master Key.

In one embodiment, the SKB API provides an interface in support of thefollowing functions:

-   -   Load a wrapped key    -   Encrypt/Decrypt data using a loaded key    -   Sign/Verify data using a loaded key    -   Digest data        Loading Keys

In certain embodiments, an SKB can be used to enable an applicationexecuting in an open processing domain to use cryptographic keys withoutdirectly exposing the value of the cipher key to the application (i.e.,keeping the value of the cipher from being exposed in the clear or theopen processing environment). The SKB API may provide a mechanism toload cryptographically wrapped keys (e.g., keys encrypted with anotherkey) into the SKB and then to use the loaded key in cryptographicoperations. The first key loaded into the SKB may be unwrapped with theMaster Key and other keys can be then loaded and unwrapped accordingly.

In some embodiments, the SKB API may expose common cryptographic methodsto encrypt/decrypt, sign/verify and digest buffers that may possiblyinclude secret data to applications executing in the open processingdomain. In some embodiments, the SKB implementation may support one ormore cryptographic algorithms. For example, the SKB implementation maysupport one or more of the following cryptographic algorithms:

-   -   RSA 1.5 encryption/decryption, sign/verify    -   AES 128 encryption/decryption in electronic codebook (“ECB”)        mode    -   SHA1/SHA256 digest

The SKB API may implement additional cipher modes of operation such ascipher-block chaining (“CBC”) and counter (“CTR”). In certainembodiments, given their inherent security, these cipher modes could besafely implemented outside of the SKB in an open processing domain. Itwill be appreciated that the aforementioned algorithms are justexamples, and that any suitable algorithm(s) could be supported.

SoC Based System Architecture

FIG. 1 illustrates an exemplary SoC architecture 100 for a mediaapplication 102 deployed on an embedded device consistent withembodiments of the present disclosure. In certain embodiments, the mediaapplication 102 may execute in the clear in an open processing domain.The architecture 100 may further include a secure processor 104operating in a secure processing domain. In certain embodiments, thesecure processor 104 may include built-in cryptographic support forsymmetric, asymmetric and digest algorithms including, for example, RSA1.5 encryption/decryption sign/verify 106, AES 128 encryption/decryption108, and SHA1/SHA256 digest 110. The architecture 100 may furtherinclude at least one device key 112 (i.e., a Master Key) that is notexposed outside of the secure processing domain. In certain embodiments,the secure processing domain and/or the secure processor 104 may supporta key ladder that is rooted at this device key 112.

The system architecture 100 may further include media processing blocks114 that may incorporate a central processing unit (“CPU”) 116, agraphics processing unit (“GPU”) 118, decoder 120, and input/output(“I/O”) 122 functionality. An operating system (“OS”) 124 may also beincluded to manage and coordinate in part system hardware resources andprovide for common services for execution of various applications.

Firmware 126 may be included that can supply the SoC specific interfacesto the media 114 and security 104 processing components. In certainembodiments, this firmware 126 may be trusted. In some embodiments, theSoC boot sequence may verify the integrity and authenticity of thefirmware 126. The security 104 and media 114 processing components maybe exposed to applications (e.g., media application 102) by theoperating system 124 as devices. Drivers 128, that may be trusted, canbe configured to interface with these devices. Additional trustedsoftware components included in the system architecture 100 may includean SKB and a DRM client binary. In certain embodiments, mechanisms maybe included to verify the integrity and trustworthiness of thesecomponents. In some embodiments, the system architecture 100 integratessome degree of sandboxing that may ensure that unauthorized applicationscannot access secure resources including, for example, system memory ora media-processing pipeline.

Secure Key Box API

As discussed above, a secure programmatic abstraction layer may functionas an SKB API 130. Consistent with some embodiments, the SKB API 130 mayprovide a simple programmatic interface to enable the use ofcryptographic keys without exposing this sensitive information to acalling application operating in an open processing domain (e.g., mediaapplication 102). For example, in one embodiment, the SKB API 130supports common cryptographic functions such as unwrapping a key insidethe SKB and then using this key to decrypt bulk data within the secureenvironment of the SKB.

SKB_Engine

An SKB_Engine object may be initialized via an SKB API 130 thatrepresents an instance of a secure processor engine that can manage andoperate on secret data (e.g., cryptographic keys and the like). Incertain embodiments, the secret data may not otherwise be accessed by acalling application. A client application may execute a callingoperation to obtain an SKB_Engine and a releasing operation to releasethe SKB_Engine. In some embodiments, an SKB_Engine may provide at leastthe following categories of functionality:

-   -   Providing information about the SKB_Engine    -   Creating SKB_Secure data objects    -   Creating objects providing cryptographic functionality (e.g.,        SKB_Transform objects and SKB_Cipher objects)

In some embodiments, the abstractions exposed by the SKB API 130 mayinclude SKB_SecureData, SKB_Transform, and SKB_Cipher objects. ExemplarySKB_Engine methods relating to these abstractions may include:

SKB_Engine_CreateCipher Creates an SKB_Cipher ObjectSKB_Engine_CreateDataFromExported Creates an SKB_SecureData object frompreviously exported data SKB_Engine_CreateDataFromWrapped Creates anSKB_SecureData object for data resulting from unwrapping (e.g.,decrypting) previously wrapped data, or for data that was not wrappedSKB_Engine_CreateTransform Creates an SKB_Transform objectSKB_Engine_GetDataByName Creates an SKB_SecureData object for datareferenced by name SKB_Engine_GetInfo Obtains information about theengine, such as its major and minor version numbersSKB_Engine_GetInstance Obtains an SKB_Engine instance SKB-Engine_ReleaseReleases the SKB_Engine objectSKB_SecureData

An SKB_SecureData object may allow a calling application to refer to andoperate on data ensconced, secured and protected within the SKB that maynot otherwise be accessed by the calling application (e.g., cipher keysor arbitrary byte sequences). In one embodiment, SKB_Secure Data objectsmay be named so that a calling application can locate a specific secretwithin the SKB. For example, an application can query the SKB for theMaster Key 112 by its name (e.g. “OTPKey0”) so that it can load andunwrap cryptographic key material that may be stored external to theSoC.

In some embodiments, an SKB_SecureData object can be created for eachsecret data to be operated on by the SKB. In certain embodiments, tocreate an SKB_SecureData object, an appropriate SKB_Engine method may becalled. For example, calling SKB_Engine_CreateDataFromWrapped may createan SKB_SecureData object that represents secret data created fromunwrapping (i.e., decrypting) specified cryptographically wrapped data.

As described above, an SKB_SecureData object may be used to representsecret data having values that are not exposed to client applicationsexecuting in an open processing environment but can be operated on bythe SKB API implementation 130. Client applications may ask for datacharacteristics of secret data referenced by an SKB_SecureData object,such as its size in bites and its type, and can call the SKB API 130 tooperate on the secret data. Client applications may further referencesecret data within the SKB via an SKB_SecureData object. Methodsrelating to SKB_SecureData objects may include:

SKB_SecureData_Derive Derives a new SKB-SecureData object from anexisting one SKB_SecureData_Export Exports the data represented by theSKB_SecureData object to a protected form SKB_SecureData_GetInfoRetrieves information about the secret data represented by theSKB_SecureData object SKB_SecureData_Release Releases the SKB_SecureDataobject

FIG. 2 illustrates a general method for performing secure operations onsecret data consistent with embodiments of the present disclosure. Asecure abstraction layer (e.g., the SKB) may be initialized 200operating in a secure processing domain. The secure abstraction layermay operate to allow an unsecured calling application to refer to andoperate on data protected within the secure processing domain (e.g., inan SKB) that the calling application may not otherwise access. A securedata object may be created 202 that, in certain embodiments, referencessecret data protected within the secure processing domain (e.g., withinthe SKB). Using a secure engine called by the client application throughthe secure abstraction layer, operations and other methods may beperformed on the secure data object 204 without exposing the secure dataoutside the secure processing domain and/or secure abstraction layer.

Exporting and Persisting SKB_SecureData

In some embodiments, SKB_SecureData can be persisted. For example, if aclient application needs some secret data to be persistent, so that itis available across reboots and/or resets, or if the client applicationwishes the secret data to be available outside the secure processingdomain, the client application may ask the SKB API 130 for a protectedform of the secret data that can be exported or persistently stored,since client applications may not obtain the secret data bytes in theclear. When the persisted data is needed later, the client applicationmay request to have the exported or persisted data “imported” (e.g.,unencrypted) and, in certain embodiments, referenced by a newSKB_SecureData object.

In certain embodiments, persisting SKB_SecureData across reboots and/orresets returns a serialized form of the SKB_SecureData object encryptedusing a permanent key (e.g., Master Key 112 or a derivative thereof). Insome embodiments, this persisted serialized form will be an encryptedrepresentation of the secret data. Using a built-in permanent key (e.g.,the Master Key 112 or a derivative thereof) that the SKB API 130implementation supports, the persisted encrypted representation can beunwrapped upon a restart.

In some embodiments, upon boot or the first time an SKB-Engine iscreated after a boot, the SKB API 130 may generate a random numbercalled a transient export key. When the SKB API 130 is called by aclient application to export data outside the secure processing domainthat does not need to be persistent across reboot, a serialized form ofthe SKB_SecureData may be created. For example, data to be exported,along with information regarding the data type, size, and the like maybe exported after encryption by the transient export key. Later, whenthe client application requests that the exported data be imported backinto the SKB, the transient export key may be used to decrypt theexported data.

FIG. 3 illustrates a method for persisting and exporting secret dataconsistent with embodiments of the present disclosure. To persist orexport an SKB_SecureData object, the SKB_SecureData object can beserialized 300 within a protected processing domain (e.g., within theSKB). To ensure that secret data is not exposed in the clear, theserialized SKB_SecureData object may then be encrypted 302 using eithera permanent or a temporary cryptographic key. For example, if secretdata is to be persisted for use after a reboot, a permanent key (e.g.,the Master Key 112 or a derivative thereof) may be used to encrypt theSKB_SecureData object. If the secret data needs to be persisted for useafter a reboot, a temporary cryptographic key (e.g., a transient exportkey) may be used to encrypt the SKB_SecureData object. Once encrypted,the encrypted form of the secret data may be transferred out of thesecure processing domain (e.g., the SKB) and stored in the open 304. Ifthe secret data needs to be utilized again, it can be loaded back intothe secure processing domain (i.e., loaded back into the SKB), anddecrypted using the appropriate cryptographic key.

SKB_Cipher

An SKB Cipher object may encapsulate attributes and parameters used toperform cryptographic operations on SKB_SecureData objects.Particularly, SKB_Cipher objects may be called by client applicationsthrough the SKB API 130 to encrypt or decrypt data. In some embodiments,an SKB_Cipher object may be created by calling an appropriateSKB_Engine. Methods relating to SKB_Cipher objects may include:

SKB_Cipher_ProcessBuffer Outputs the result of performing a cipheroperation on a specified buffer of data SKB_Cipher_Release Releases aSKB_Cipher object

When an SKB_Engine is called to create an SKB_Cipher object, the callingapplication may indicate whether the cipher operation is an encryptionor a decryption operation, the relevant encryption/decryption algorithm,any flags indicating cipher usage, any parameters required by thealgorithm, the SKB_SecureData holding the encryption or decryption keyused by the SKB_Cipher method, and/or the address of a pointer that themethod will set to refer to the SKB-Cipher object that is created.

SKB_Transform

An SKB_Transform object may be called by a client application throughthe SKB API 130 to perform operations on secret data included in asecure processing domain, such as calculating a digest, signing data, orverifying a signature and returning a result to a client application.Methods relating to SKB_Transform objects may include:

SKB_Transform_AddBytes Adds caller-supplied bytes to the transformSKB-Transform_AddSecureData Adds the payload of an SKB- SecureDataobject to the transform SKB_Transform_GetOutput Retrieves the result ofthe transform SKB_Transform_Release Releases the SKB_Transform object

The SKB_Transform object may encapsulate attributes and parameters toperform cryptographic operations on and with SKB_SecureData objects. Inone embodiment, the SKB_Transform supports any of the cryptographicoperations described above. Using the SKB_Transform and SKB_SecureDataobjects, the underlying SKB API 130 implementation may operate on secretdata as desired using the integral security functions of the secureprocessor 104 and/or the secure processing domain.

Cloaking SKB_SecureData

The SKB API 130 may support cloaking fields within an SKB_SecureDataobject. In some embodiments, SKB_Data_Cloak methods may providemechanisms to process encrypted data that ensconces other secrets. Thecloaking mechanism may ensure that secrets continue to be protected bythe SKB while enabling a client application operating in the openprocessing domain to process the decrypted (e.g., encapsulating) datastructure. For example, an application may need to process encryptedcomplex XML content that contains keys or other secrets within childelements. However, merely decrypting the encrypted XML and returning theplaintext to the application would expose these encapsulated secrets.

In some embodiments, cloaked data represents secret data that appearsinside a data structure that is cloaked in-place before the datastructure is returned to a calling client application executing in anopen processing domain. This enables the caller to parse the public partof the data structure and extract the cloaked fields from it in order tofeed them back to the SKB API 130 for performing secure operations. Inthis manner, the value of the cloaked or secret fields in the datastructure may not be revealed to the calling application operating andthe security of the secret data contained in these fields is preserved.

FIG. 4 . illustrates a method of performing cloaking operationsconsistent with embodiments of the present disclosure. As illustrated,cloaking operations work generally as follows:

-   -   (a) The calling application passes an encrypted data structure        containing secret fields 400.    -   (b) The SKB decrypts this data structure 402, locates the secret        fields, and replaces them in-situ (no size change) with a new        field containing enough information for the SKB to reconstruct        or regain access to this secret data later 404.    -   (c) The application obtains the decrypted data structure with        the cloaked fields. It can parse and process this data structure        and calls the SKB API 130 to create an SKB_Data object for the        cloaked secrets 406.

The client application can now have the SKB perform any operations andtransformations on the decrypted data structure that require use of thecloaked secret data.

FIG. 5 illustrates an exemplary system 500 that may be used to implementembodiments of the systems and methods disclosed herein. While thedisclosed systems and methods may be integrated in a SoC architecture,embodiments of the same may also be included in any suitable computersystem. For example, embodiments of the systems and methods may beintegrated in a computer system having virtual open and secureprocessing environments.

The exemplary system 500 may comprise a general purpose computing devicesuch as a personal computer or a network server, or a specializedcomputing device such as a cellular telephone, personal digitalassistance, portable audio or video player, television set-top box,kiosk, gaming system, other embedded device, or the like. As illustratedin FIG. 5 , the system 500 may include: a processing unit 502; systemmemory 504, which may include high speed random access memory (RAM),non-volatile memory (ROM), and/or one or more bulk non-volatilecomputer-readable storage mediums (e.g., a hard disk, flash memory,etc.) for storing programs and other data for use and execution by theprocessing unit 502; a port 506 for interfacing with removable memory508 that may include one or more diskettes, optical storage mediums(flash memory, thumb drives, USB dongles, compact discs, DVDs, etc)and/or other computer-readable storage mediums; a network interface 510for communicating with other systems via a network 516 such as, forexample, the Internet, a local area network, a virtual private network,and the like using one or more communication technologies (e.g.,wireless, Ethernet, and/or the like); a user interface 512 that mayinclude a display and/or one or more input devices such as, for example,a touchscreen, a keyboard, a mouse, a track pad, and the like; and oneor more busses 514 for communicatively coupling the elements of thesystem 500.

In some embodiments, the system 500 may, alternatively or in addition,include a secure processing unit (“SPU”) 518 that is protected fromtampering by a user of system 500 or other entities by utilizing securephysical and/or virtual security techniques. An SPU 518 can help enhancethe security of sensitive operations such as key management, signatureverification, and other aspects of the digital rights managementprocess. In certain embodiments, the SPU 518 may operate in a logicallysecure processing domain and be configured to protect and operate onsecret information as described herein. In some embodiments, the SPU 518may include internal memory storing executable instructions or programsconfigured to enable to the SPU 518 to perform secure operations asdescribed herein.

The operation of the system 500 may be generally controlled by aprocessing unit 502 and/or 518 operating by executing softwareinstructions and programs stored in the system memory 504 (and/or othercomputer-readable media, such as removable memory 508). The systemmemory 504 may store a variety of executable programs or modules forcontrolling the operation of the system 500. For example, the systemmemory 504 may include an OS 520 that may manage and coordinate in partsystem hardware resources and provide for common services for executionof various applications and a DRM engine 522 for implementing DRMfunctionality. The system memory 504 may further include communicationsoftware 524 configured to enable in part communication within and bythe system 500, applications 526 (e.g., media applications), and dataand/or content 528.

The systems and methods disclosed herein are not inherently related toany particular computer or other apparatus and may be implemented by asuitable combination of hardware, software, and/or firmware. Softwareimplementations may include one or more computer programs comprisingexecutable code/instructions that, when executed by a processor, maycause the processor to perform a method defined at least in part by theexecutable instructions. The computer program can be written in any formof programming language, including compiled or interpreted languages,and can be deployed in any form, including as a standalone program or asa module, component, subroutine, or other unit suitable for use in acomputing environment. Further, a computer program can be deployed to beexecuted on one computer or on multiple computers at one site ordistributed across multiple sites and interconnected by a communicationnetwork. Software embodiments may be implemented as a computer programproduct that comprises a non-transitory storage medium configured tostore computer programs and instructions, that when executed by aprocessor, are configured to cause the processor to perform a methodaccording to the instructions. In certain embodiments, thenon-transitory storage medium may take any form capable of storingprocessor-readable instructions on a non-transitory storage medium. Anon-transitory storage medium may be embodied by a compact disk,digital-video disk, a magnetic tape, a Bernoulli drive, a magnetic disk,a punch card, flash memory, integrated circuits, or any othernon-transitory digital processing apparatus memory device.

Although the foregoing has been described in some detail for purposes ofclarity, it will be apparent that certain changes and modifications maybe made without departing from the principles thereof. It should benoted that there are many alternative ways of implementing both theprocesses and apparatuses described herein. Accordingly, the presentembodiments are to be considered as illustrative and not restrictive,and the invention is not to be limited to the details given herein, butmay be modified within the scope and equivalents of the appended claims.

APPENDIX A Example Code An illustrative example of code implementing anSKB API consistent with embodiments of the present disclosure isprovided below: /** Secure Key Box **/ #ifndef _SKB_SECURE_KEY_BOX_H_(—)#define _SKB_SECURE_KEY_BOX_H_(—) #define SKB_API_VERSION_MAJOR 0#define SKB_API_VERSION_MINOR 1 #define SKB_API_VERSION_REVISION 0#define SKB_API_VERSION_STRING “0.1.0” #defineSKB_DATA_FLAG_KEY_USAGE_UNWRAP 1 /*<< Can be used to unwrap wrappeddata*/ #define SKB_DATA_FLAG_KEY_USAGE_ENCRYPTION 2 /*<< Can be usedwith an SKB_Cipher for encryption */ #defineSKB_DATA_FLAG_KEY_USAGE_DECRYPTION 4 /*<< Can be used with an SKB_Cipherfor decryption */ #define SKB_DATA_FLAG_EXTERNAL_DATA 8 /*<< Data comesfrom external cleartext */ #define SKB_SUCCESS 0 #define SKB_FAILURE(−1) #define SKB_ERROR_BASE (−80000) #define SKB_ERROR_INTERNAL((SKB_ERROR_BASE) − 1) #define SKB_ERROR_INVALID_PARAMETERS((SKB_ERROR_BASE) − 2) #define SKB_ERROR_NOT_SUPPORTED ((SKB_ERROR_BASE)− 3) #define SKB_ERROR_OUT_OF_RESOURCES ((SKB_ERROR_BASE) − 4) #defineSKB_ERROR_BUFFER_TOO_SMALL ((SKB_ERROR_BASE) − 5) typedef intSKB_Result; typedef unsigned char SKB_Byte; typedef unsigned intSKB_Size; typedef struct { struct { unsigned int major; unsigned intminor; unsigned int revision; } api_version; const char* name; unsignedint flags; } SKB_EngineInfo; typedef enum { SKB_DATA_TYPE_BYTES,SKB_DATA_TYPE_SYMMETRIC_KEY, SKB_DATA_TYPE_RSA_PRIVATE_KEY,SKB_DATA_TYPE_RSA_PUBLIC_KEY, SKB_DATA_TYPE_DH_PUBLIC_KEY,SKB_DATA_TYPE_DH_PRIVATE_KEY } SKB_DataType; typedef struct {SKB_DataType type; /** Data type */ unsigned int flags; /** Data flags*/ } SKB_DataInfo; typedef enum { SKB_TRANSFORM_TYPE_DIGEST_SHA1,SKB_TRANSFORM_TYPE_DIGEST_SHA256, SKB_TRANSFORM_TYPE_DIGEST_MD5,SKB_TRANSFORM_TYPE_TLS_RECORD } SKB_TransformType; typedef enum {SKB_CIPHER_ALGORITHM_NULL, SKB_CIPHER_ALGORITHM_AES_128_ECB,SKB_CIPHER_ALGORITHM_AES_128_CBC, SKB_CIPHER_ALGORITHM_AES_128_CTR,SKB_CIPHER_ALGORITHM_RSA_1_5, SKB_CIPHER_ALGORITHM_RSA_OAEP }SKB_CipherAlgorithm; typedef enum { SKB_CIPHER_DIRECTION_ENCRYPT,SKB_CIPHER_DIRECTION_DECRYPT } SKB_CipherDirection; typedef enum {SKB_DATA_FORMAT_RAW, SKB_DATA_FORMAT_PKCS8 } SKB_DataFormat; #ifdefined(_(——)cplusplus) extern “C” { #endif /** @defgroup SKB_DatanSKB_Data Class * @{ */ /**An SKB_Data object represents secret data thatcannot be accessed directly by the caller. Secret data is typed: it canrepresent cipher keys as well as arbitrary byte sequences.**/ typedefstruct SKB_Datan SKB_Data; /** An SKB_Transform object represents a datatransform. The purpose of such transforms is to be able to transformdata supplied by the caller as well as secret data and return to thecaller the output of the transform, which does not reveal any of thesecret data used as input to the transform. **/ typedef structSKB_Transform SKB_Transform; /**An SKB_Cipher object can encrypt ordecrypt data supplied by the caller.**/ typedef struct SKB_CipherSKB_Cipher; /** @defgroup SKB_Cloak SKB_Cloak Class * @{ */ /*AnSKB_Cloak object manages cloaked data. Cloaked data is secret data thatappears inside a data structure and cloaked in-place before the datastructure is returned to the caller. This enables the caller to parsethe public part of the data structure and extract the cloaked fieldsfrom it in order to feed them back to the engine and obtain a dataobject in return. This way, the value of the secret fields in the datastructure is never revealed to the caller.*/ typedef struct SKB_CloakSKB_Cloak; /** @defgroup SKB_Engine SKB_Engine Class * @{ */ /**AnSKB_Engine object represents an instance of an engine that can manageand operate n secret data that cannot be accessed by the caller.**/typedef struct SKB_Engine SKB_Engine; /** Obtain an engine instance.This instance can be released by calling SKB_Engine_Release when nolonger needed. **/ SKB_Result SKB_GetEngine(SKB_Engine** engine); /**Release an SKB_Engine object. The object can no longer be used by thecaller after this call returns. All SKB_Data objects returned by thisengine can be released before calling this method. @param self TheSKB_Engine to release. **/ SKB_Result SKB_Engine_Release(SKB_Engine*self); SKB_Result SKB_Engine_GetInfo(const SKB_Engine* self,SKB_EngineInfo* info); /**Obtain a named data object from an SKB_Engineobject. @param self The SKB_Engine to obtain the data object from.@param name The name of the data object to obtain. @param data Addressof a pointer to an SKB_Data object where the object pointer will bereturned. @result SKB_SUCCESS if the data object was found,SKB_ERROR_NO_SUCH_ITEM if no such data object exists, or another errorcode if the call could not be completed successfully. **/ SKB_ResultSKB_Engine_GetDataByName(SKB_Engine* self, const char* name, SKB_Data**data); SKB_Result SKB_Engine_CreateDataFromWrapped(SKB_Engine* self,const SKB_Byte* wrapped, SKB_Size wrapped_size, SKB_DataTypewrapped_type, SKB_DataFormat wrapped_format, SKB_CipherAlgorithmwrapping_algorithm, const SKB_Data* wrapping_key, SKB_Data** data);SKB_Result SKB_Engine_CreateDataFromExported(SKB_Engine*  self,  constSKB_Byte*  exported,  SKB_Size  exported_size,  SKB_Data**  data);SKB_Result SKB_Engine_CreateDataFromFrozen(SKB_Engine* self, constSKB_Byte*  frozen, SKB_Size frozen_size, SKB_Data** data); /**Create anSKB_Data object with random bytes. The object will have the data typeSKB_DATA_TYPE_BYTES. **/ SKB_ResultSKB_Engine_CreateDataFromRandom(SKB_Engine*  self, SKB_Size  size,SKB_Data**  data); /**Creates an SKB_Transform object **/ SKB_ResultSKB_Engine_CreateTransform(SKB_Engine* self,  SKB_TransformType type, void* params,  SKB_Transform** transform); /** Creates an SKB_Cipherobject **/ SKB_Result SKB_Engine_CreateCipher(SKB_Engine*  self, SKB_CipherAlgorithm  type,  SKB_CipherDirection  direction,  SKB_Data* key,  SKB_Cipher**  cipher); /** @ingroup SKB_Cloak  @{ */ SKB_ResultSKB_Cloak_CreateData(SKB_Cloak*  self, const SKB_Byte* cloaked_data,SKB_Size  cloaked_data_size, SKB_Data**  data); SKB_ResultSKB_Cloak_Release(SKB_Cloak* self); /** @ingroup SKB_Data * @{ *//**Release an SKB_Data object. The object can no longer be used by thecaller after this call returns. @param self The SKB_Data to release.**/SKB_Result SKB_Data_Release(SKB_Data* self); /**Get information aboutthe data represented by an SKB_Data object. @param self The SKB_Datawhose info is obtained. **/ SKB_Result SKB_Data_GetInfo(const SKB_Data*self, SKB_DataInfo* info); /**Get the exported serialized payload of anSKB_Data object. Data in an exported form can be stored and reloaded ata later time in the the same or different SKB_Engine, as long as theSKB_Engines are considered to be compatible (they can share some commonstate, which typically does not persist across a CPU or securityprocessor shutdown or reset.) @param self The SKB_Data whose frozenserialized payload is obtained. @param buffer Memory buffer where theexported data is to be written. The memory buffer must be large enoughto hold the number of bytes specified by the buffer_size parameter. Ifbuffer_size points to a zero value, this parameter may be NULL. @parambuffer_size Pointer to the size of the memory buffer. This parameter isin/out: the caller sets the value pointed to to the size of the memorybuffer, and upon return the value pointed to will be equal to the numberof bytes written (or the number of bytes that would be written, if thevalue passed was too small). @return SKB_SUCCESS if the call succeeds,SKB_ERROR_BUFFER_TOO_SMALL if there is not enough space in the buffer towrite the exported data, or a different error code if some other failureoccurred. **/ SKB_Result SKB_Data_Export(const SKB_Data* self, SKB_Byte*buffer, SKB_Size* buffer_size); /**Get the frozen serialized payload ofan SKB_Data object. Data in a frozen form can be stored and reloaded ata later time in the the same or different SKB_Engine instance, evenafter a complete shutdown or reset of the CPU or security processor.@param self The SKB_Data whose frozen serialized payload is obtained. **/ SKB_Result SKB_Data_Freeze(const SKB_Data* self, SKB_Byte* buffer,SKB_Size* buffer_size); /** Get the cloaked payload of an SKB_Dataobject and an SKB_Cloak object that can be used subsequently to uncloakthe data. Only data of the following types can be cloaked:SKB_DATA_TYPE_XXX * @param self The SKB_Data whose cloaked payload isobtained. */ SKB_Result SKB_Data_Cloak(const SKB_Data* self, SKB_Byte*buffer, SKB_Cloak** cloak); /** @ingroup SKB_Transform @{ **/ /** Addscaller-supplied bytes to the transform **/ SKB_ResultSKB_Transform_AddBytes(SKB_Transform*  self,  const SKB_Byte*zzzz  data, SKB_Size  data_size); /**Adds the contents of a data object to thetransform. Only data objects of the following types can be used:SKB_DATA_TYPE_BYTES * SKB_DATA_TYPE_SYMMETRIC_KEY **/ SKB_ResultSKB_Transform_AddData(SKB_Transform* self, const SKB_Data* data);/**Gets the output size of the transform**/ SKB_SizeSKB_Transform_GetOutputSize(const SKB_Transform* self); /**Get theoutput of the transform**/ SKB_ResultSKB_Transform_GetOutput(SKB_Transform* self, SKB_Byte* output);SKB_Result SKB_Transform_Release(SKB_Transform* self); /** @ingroupSKB_Cipher **/ SKB_Result SKB_Cipher_ProcessBuffer(SKB_Cipher* self,const SKB_Byte* in_buffer, SKB_Size in_buffer_size, SKB_Byte*out_buffer, SKB_Size* out_buffer_size, unsigned int flags); SKB_ResultSKB_Cipher_Release(SKB_Cipher* self); #if defined(_(——)cplusplus) }#endif #endif /* _SKB_SECURE_KEY_BOX_H_ */

What is claimed is:
 1. A non-transitory computer-readable storage mediumstoring instructions that, when executed by at least one processor of asystem, cause the system to perform a method comprising: receiving, by asecure abstraction layer of the system from an application executingwithin a first processing domain of the system, one or more firstrequests to invoke a secure processing domain of the system to performone or more operations using secret data within the secure processingdomain, the secure processing domain being different, at least in part,than the first processing domain, the one or more first requestscomprising first data; generating, by the secure abstraction layer, oneor more second requests, the one or more second requests comprising thefirst data and being configured to cause the secure processing domain ofthe system to perform at least one cryptographic operation using thefirst data and the secret data; issuing, by the secure abstractionlayer, the one or more second requests to the secure processing domain;receiving, by the secure abstraction layer from the secure processingdomain in response to the one or more second requests, one or moreresponses, the one or more responses comprising second data, the seconddata being generated by the secure processing domain at least in part byperforming the at least one cryptographic operation using the first dataand the secret data; and sending, to the application executing withinthe first processing domain from the secure abstraction layer, thesecond data.
 2. The non-transitory computer-readable storage medium ofclaim 1, wherein the secure abstraction layer is trusted by the system.3. The non-transitory computer-readable storage medium of claim 2,wherein the secure abstraction layer is trusted by the system based onverifying a digital signature of the secure abstraction layer using, atleast in part, a secure master key.
 4. The non-transitorycomputer-readable storage medium of claim 3, wherein the secure masterkey is secured using a secure hardware element of the system.
 5. Thenon-transitory computer-readable storage medium of claim 4, wherein thesecure abstraction layer is trusted by the system based on verifyingthat the secure abstraction layer is trusted during a secure bootprocess.
 6. The non-transitory computer-readable storage medium of claim3, wherein the secure master key comprises a white-box cipher key. 7.The non-transitory computer-readable storage medium of claim 1, whereinthe secure processing domain comprises a secure processing unit.
 8. Thenon-transitory computer-readable storage medium of claim 1, wherein thesecure processing domain comprises a white-box cryptographic module. 9.The non-transitory computer-readable storage medium of claim 1, whereinthe secret data is protected from disclosure outside the secureprocessing domain by the secure processing domain.
 10. Thenon-transitory computer-readable storage medium of claim 1, wherein atleast one of the one or more first requests and the one or more secondrequests further comprise an indication of a cryptographic algorithmused to perform the at least one cryptographic operation.
 11. Thenon-transitory computer-readable storage medium of claim 1, wherein thesecret data comprises a key.
 12. The non-transitory computer-readablestorage medium of claim 11, wherein the at least one cryptographicoperation comprises a cryptographic signature operation.
 13. Thenon-transitory computer-readable storage medium of claim 12, wherein thecryptographic signature operation comprises cryptographically signingthe first data using the key to generate cryptographically signed firstdata.
 14. The non-transitory computer-readable storage medium of claim13, wherein the second data comprises the cryptographically signed firstdata.
 15. The non-transitory computer-readable storage medium of claim1, wherein the at least one cryptographic operation comprises a digestcalculation operation.
 16. The non-transitory computer-readable storagemedium of claim 15, wherein the second data comprises a message digest.