A trusted system is a hardware device, such as a computer or home entertainment center, that is equipped with digital rights management (DRM) software. DRM software controls the uses that can be made of copyrighted material in the secondary (after sale) market, in violation of established U.S. Principles of copyright law; however, copyright law restrictions are evaded by software licenses denying that a sale has taken place.
Software for such systems specify transport rights (permission to copy the media, loan it to another user, or transfer the license to another user), rendering rights (permission to view or listen to the content), and derivative-work rights (permission to extract and reuse content from the protected work). See copyright, Digital Millennium Copyright Act (DMCA), digital rights management (DRM), first sale.
Technipages Explains Trusted System
Taking a closer look at the terminology “Trusted System” involved in understanding and describing trust. The word “Trust” reflects a dichotomy: Something is either secure or not secure. If secure, it should withstand all attacks, today, tomorrow, and a century from now, and if we claim that it is secure, you either accept our assertion (and buy and use it) or reject it (and either do not use it or use it but do not trust it).
So we say that software is trusted software if we know that the code has been rigorously developed and analyzed, giving us reason to believe that the code does what it is expected to do and nothing more. Typically, trusted code can be a foundation on which other untrusted code runs, i.e. the untrusted system’s quality depends, in part, on the trusted code; the trusted code establishes the baseline for the security of the overall system. In particular, an operating system can be trusted software when there is a basis for trusting that it correctly controls the accesses of components or systems run from it. For example, the operating system might be expected to limit users’ access to specific files.
Common Uses of Trusted System
- A trusted system can protect malicious attacks from future bugs or viruses.
- The code of a trusted system is passed through rigorous analysis and development
- A trusted system and an untrusted system can share a similar foundation
Common Misuses of Trusted System
- A trusted system cannot withstand attacks from future malware attack