A secure processor assuring application software is executed securely, and
assuring only authorized software is executed, monitored modes and secure
modes of operation. The former executes application software
transparently to that software. The latter verifies execution of the
application software is authorized, performs any extraordinary services
required by the application software, and verifies the processor has
obtained rights to execute the content. The secure processor (1) appears
hardware-identical to an ordinary processor, with the effect that
application software written for ordinary processors can be executed on
the secure processor without substantial change, (2) needs only a minimal
degree of additional hardware over and above those portions appearing
hardware-identical to an ordinary processor. The secure processor
operates without substantial reduction in speed or other resources
available to the application software. Functions operating in secure mode
might reside in an on-chip non-volatile memory, or might be loaded from
external storage with authentication.