Abstract
Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all are proprietary. In this paper, we present a license protection scheme, which exploits tamper-resistant cryptographic hardware. The confidentiality and integrity of the license or parts thereof can be assured with our protection scheme. In addition, the keys to unlock the protected content are always protected and stored securely as part of the license. We verify secrecy and authentication aspects of one of our protocols. We implement the scheme in a prototype to assess the performance.
This project is funded by Telematica Instituut, The Netherlands.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Atallah, M.J., Li, J.: Enhanced smart-card based license management. In: IEEE International Conference on E-Commerce, pp. 111–119. IEEE Computer Society, Los Alamitos (2003)
Banâtre, J.-P., Fradet, P., Métayer, D.L.: Gamma and the chemical reaction model: Fifteen years after. In: Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. LNCS, vol. 2235, pp. 17–44. Springer, Heidelberg (2001)
Bertino, E., Castano, S., Ferrari, E., Mesili, M.: Controlled access and dissemination of XML documents. In: Proceedings 2nd ACM Workshop on Web Information and Data Management (WIDM 1999), pp. 22–27 (1999)
Chong, C.N., Corin, R., Etalle, S., Hartel, P.H., Jonker, W., Law, Y.W.: LicenseScript: A novel digital rights language and its semantics. In: Ng, K., Busch, C., Nesi, P. (eds.) 3rd International Conference on Web Delivering of Music (WEDELMUSIC), September 2003, pp. 122–129. IEEE Computer Society Press, Los Alamitos (2003)
Chong, C.N., Etalle, S., Hartel, P.H., Joosten, R., Kleinhuis, G.: Service brokerage with prolog. Technical Report TR-CTIT-04-14, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands (February 2004)
Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamper-resistant hardware. In: Gritzalis, D., di Vimercati, S.D.C., Samarati, P., Katsikas, S.K. (eds.) 18th IFIP International Information Security Conference (IFIPSEC). IFIP Conference Proceedings, vol. 250, pp. 73–84. Kluwer Academic Publishers, Dordrecht (2003)
Chong, C.N., van Buuren, R., Hartel, P.H., Kleinhuis, G.: Security attribute based digital rights management (SABDRM). In: Boavida, F., Monteiro, E., Orvalho, J. (eds.) IDMS 2002 and PROMS 2002. LNCS, vol. 2515, pp. 339–352. Springer, Heidelberg (2002)
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326–341. Springer, Heidelberg (2002)
Damiani, E., de, S., di Vimercati, C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–135. Springer, Heidelberg (2000)
Goshi, J., Ladner, R.E.: Algorithms for dynamic multicast key distribution trees. In: Proceedings of of the twenty-second annual symposium on Principles of distributed computing, pp. 243–251. ACM Press, New York (2003)
Lloyd, J.W.: Foundations of Logic Programming. Symbolic Computation – Artificial Intelligence, 2nd edn. Springer, Heidelberg (1987)
Pearson, S., Balacheff, B., Chen, L., Plaqui, D., Proudler, G.: Trusted Computing Platforms – TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)
Sandhu, R., Park, J.: Towards usage control models: beyond traditional access control. In: 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), pp. 57–64. ACM, New York (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chong, C.N., Ren, B., Doumen, J., Etalle, S., Hartel, P.H., Corin, R. (2005). License Protection with a Tamper-Resistant Token. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)