Skip to main content

Application of Trusted Computing in Automation to Prevent Product Piracy

  • Conference paper
Trust and Trustworthy Computing (Trust 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6101))

Included in the following conference series:

Abstract

Product piracy has become a serious threat for automation and mechanical engineering in recent years. Therefore effective protection measures are desperately needed. Especially the software has to be protected since it determines the machine’s functionality and without software the machine (and the imitations) cannot work. Thereby it has to be prevented that software can be copied from one machine to another and that it can be manipulated in order to activate additional machine functionalities. Moreover the unauthorized replacement of software-equipped machine components must be prohibited. This can be achieved by applying Trusted Computing and TPMs to this new field of application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dietrich, K., Pirker, M., Vejda, T., Toegl, R., Winkler, T., Lipp, P.: A practical approach for establishing trust relationships between remote platforms using trusted computing. In: Barthe, G., Fournet, C. (eds.) TGC 2007 and FODO 2008. LNCS, vol. 4912, pp. 156–168. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Kinney, S.: Trusted Platform Module Basics: Using TPM in Embedded Systems. Elsevier, Burlington (2006)

    Google Scholar 

  4. Trusted Computing Group: TCG Glossary, http://www.trustedcomputinggroup.org/developers/glossary

  5. RSA Laboratories: PKCS #1 v2.1: RSA Cryptography Standard, http://www.rsa.com/rsalabs/node.asp?id=2125

  6. Rouvroy, A., Poullet, Y.: The Right to Informational Self-Determination and the Value of Self-Development: Reassessing the Importance of Privacy for Democracy. In: Gutwirth, S., Poullet, Y., de Hert, P., de Terwangne, C., Nouwt, S. (eds.) Reinventing Data Protection? pp. 45–76. Springer, Netherlands (2009)

    Chapter  Google Scholar 

  7. Trusted Computing Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1 Errata A Part1: Commands and Structures, http://www.trustedcomputinggroup.org/files/resource_files/6479CD77-1D09-3519-AD89EAD1BC8C97F0/TSS_1_2_Errata_A-final.pdf

  8. IBM: TrouSerS - An open-source TCG software stack implementation, http://sourceforge.net/projects/trousers/

  9. Security Innovation: Core TCG Software Stack (CTSS), http://www.securityinnovation.com/pdf/collateral/trusted-software-stack.pdf

  10. Microsoft Developer Network: TPM Base Services, http://msdn.microsoft.com/en-us/library/aa446796%28VS.85%29.aspx

  11. Zhou, Z., Xu, R.: BIOS Security Analysis and a Kind of Trusted BIOS. In: Qing, S., Imai, H., Wang, G. (eds.) ICICS 2007. LNCS, vol. 4861, pp. 427–437. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Phoenix Technologies: Phoenix SecureCore, http://www.phoenix.com/ptec/docs/securecore_ds_en.pdf

  13. Microsoft: BitLocker Drive Encryption: Technical Overview, http://technet.microsoft.com/en-us/library/cc732774.aspx

  14. Trusted Computing Group TPM Working Group: TPM Main Part 3 Commands Specification Version 1.2 Level 2 Revision 103, http://www.trustedcomputinggroup.org/files/static_page_files/ACD28F6C-1D09-3519-AD210DC2597F1E4C/mainP3Commandsrev103.pdf

  15. FIPS: Specification for the Advanced Encryption Standard (AES), In: Federal Information Processing Standards Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  16. Microsoft: Next-Generation Secure Computing Base General Information http://technet.microsoft.com/en-us/library/cc723472.aspx

  17. Mueller, T.: Trusted Computing Systeme. Springer, Heidelberg (2008)

    Google Scholar 

  18. Trusted Computing Group: TCG Specification Architecture Overview http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf

  19. Eastlake III, D., Jones, P.: US Secure Hash Algorithm 1 (SHA1). RFC 3174 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lieberknecht, N. (2010). Application of Trusted Computing in Automation to Prevent Product Piracy. In: Acquisti, A., Smith, S.W., Sadeghi, AR. (eds) Trust and Trustworthy Computing. Trust 2010. Lecture Notes in Computer Science, vol 6101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13869-0_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13869-0_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13868-3

  • Online ISBN: 978-3-642-13869-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics