Abstract
Product piracy has become a serious threat for automation and mechanical engineering in recent years. Therefore effective protection measures are desperately needed. Especially the software has to be protected since it determines the machine’s functionality and without software the machine (and the imitations) cannot work. Thereby it has to be prevented that software can be copied from one machine to another and that it can be manipulated in order to activate additional machine functionalities. Moreover the unauthorized replacement of software-equipped machine components must be prohibited. This can be achieved by applying Trusted Computing and TPMs to this new field of application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 156–168. Springer, Heidelberg (2008)
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)
Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, Burlington (2006)
Trusted Computing Group: TCG Glossary, http://www.trustedcomputinggroup.org/developers/glossary
RSA Laboratories: PKCS #1 v2.1: RSA Cryptography Standard, http://www.rsa.com/rsalabs/node.asp?id=2125
Rouvroy, A., Poullet, Y.: The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In: Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection? pp. 45–76. Springer, Netherlands (2009)
Trusted Computing Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures, http://www.trustedcomputinggroup.org/files/resource_files/6479CD77-1D09-3519-AD89EAD1BC8C97F0/TSS_1_2_Errata_A-final.pdf
IBM: TrouSerS - An open-source TCG software stack implementation, http://sourceforge.net/projects/trousers/
Security Innovation: Core TCG Software Stack (CTSS), http://www.securityinnovation.com/pdf/collateral/trusted-software-stack.pdf
Microsoft Developer Network: TPM Base Services, http://msdn.microsoft.com/en-us/library/aa446796%28VS.85%29.aspx
Zhou, Z., Xu, R.: BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 427–437. Springer, Heidelberg (2007)
Phoenix Technologies: Phoenix SecureCore, http://www.phoenix.com/ptec/docs/securecore_ds_en.pdf
Microsoft: BitLocker Drive Encryption: Technical Overview, http://technet.microsoft.com/en-us/library/cc732774.aspx
Trusted Computing Group TPM Working Group: TPM Main Part 3 Commands Specification Version 1.2 Level 2 Revision 103, http://www.trustedcomputinggroup.org/files/static_page_files/ACD28F6C-1D09-3519-AD210DC2597F1E4C/mainP3Commandsrev103.pdf
FIPS: Specification for the Advanced Encryption Standard (AES), In: Federal Information Processing Standards Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Microsoft: Next-Generation Secure Computing Base General Information http://technet.microsoft.com/en-us/library/cc723472.aspx
Mueller, T.: Trusted Computing Systeme. Springer, Heidelberg (2008)
Trusted Computing Group: TCG Specification Architecture Overview http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf
Eastlake III, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1). RFC 3174 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lieberknecht, N. (2010). Application of Trusted Computing in Automation to Prevent Product Piracy. In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-13869-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13868-3
Online ISBN: 978-3-642-13869-0
eBook Packages: Computer ScienceComputer Science (R0)