Skip to main content

License Protection with a Tamper-Resistant Token

  • Conference paper
Book cover Information Security Applications (WISA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Included in the following conference series:

  • 944 Accesses

Abstract

Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all are proprietary. In this paper, we present a license protection scheme, which exploits tamper-resistant cryptographic hardware. The confidentiality and integrity of the license or parts thereof can be assured with our protection scheme. In addition, the keys to unlock the protected content are always protected and stored securely as part of the license. We verify secrecy and authentication aspects of one of our protocols. We implement the scheme in a prototype to assess the performance.

This project is funded by Telematica Instituut, The Netherlands.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atallah, M.J., Li, J.: Enhanced smart-card based license management. In: IEEE International Conference on E-Commerce, pp. 111–119. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  2. Banâtre, J.-P., Fradet, P., Métayer, D.L.: Gamma and the chemical reaction model: Fifteen years after. In: Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. LNCS, vol. 2235, pp. 17–44. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Bertino, E., Castano, S., Ferrari, E., Mesili, M.: Controlled access and dissemination of XML documents. In: Proceedings 2nd ACM Workshop on Web Information and Data Management (WIDM 1999), pp. 22–27 (1999)

    Google Scholar 

  4. Chong, C.N., Corin, R., Etalle, S., Hartel, P.H., Jonker, W., Law, Y.W.: LicenseScript: A novel digital rights language and its semantics. In: Ng, K., Busch, C., Nesi, P. (eds.) 3rd International Conference on Web Delivering of Music (WEDELMUSIC), September 2003, pp. 122–129. IEEE Computer Society Press, Los Alamitos (2003)

    Chapter  Google Scholar 

  5. Chong, C.N., Etalle, S., Hartel, P.H., Joosten, R., Kleinhuis, G.: Service brokerage with prolog. Technical Report TR-CTIT-04-14, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands (February 2004)

    Google Scholar 

  6. Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamper-resistant hardware. In: Gritzalis, D., di Vimercati, S.D.C., Samarati, P., Katsikas, S.K. (eds.) 18th IFIP International Information Security Conference (IFIPSEC). IFIP Conference Proceedings, vol. 250, pp. 73–84. Kluwer Academic Publishers, Dordrecht (2003)

    Google Scholar 

  7. Chong, C.N., van Buuren, R., Hartel, P.H., Kleinhuis, G.: Security attribute based digital rights management (SABDRM). In: Boavida, F., Monteiro, E., Orvalho, J. (eds.) IDMS 2002 and PROMS 2002. LNCS, vol. 2515, pp. 339–352. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326–341. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Damiani, E., de, S., di Vimercati, C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–135. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  10. Goshi, J., Ladner, R.E.: Algorithms for dynamic multicast key distribution trees. In: Proceedings of of the twenty-second annual symposium on Principles of distributed computing, pp. 243–251. ACM Press, New York (2003)

    Chapter  Google Scholar 

  11. Lloyd, J.W.: Foundations of Logic Programming. Symbolic Computation – Artificial Intelligence, 2nd edn. Springer, Heidelberg (1987)

    Google Scholar 

  12. Pearson, S., Balacheff, B., Chen, L., Plaqui, D., Proudler, G.: Trusted Computing Platforms – TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)

    Google Scholar 

  13. Sandhu, R., Park, J.: Towards usage control models: beyond traditional access control. In: 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), pp. 57–64. ACM, New York (2002)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chong, C.N., Ren, B., Doumen, J., Etalle, S., Hartel, P.H., Corin, R. (2005). License Protection with a Tamper-Resistant Token. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics