A method of securing a digital object with a secure hardware adjunct in communication with a digital device, comprising configuring the digital object on the secure hardware adjunct so that the digital object may be portable among digital devices, executing a first portion of code on the digital device, and providing predefined digital rights verification and enforcement located on the secure hardware adjunct.