Advertisement

License Protection with a Tamper-Resistant Token

  • Cheun Ngen Chong
  • Bin Ren
  • Jeroen Doumen
  • Sandro Etalle
  • Pieter H. Hartel
  • Ricardo Corin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Abstract

Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all are proprietary. In this paper, we present a license protection scheme, which exploits tamper-resistant cryptographic hardware. The confidentiality and integrity of the license or parts thereof can be assured with our protection scheme. In addition, the keys to unlock the protected content are always protected and stored securely as part of the license. We verify secrecy and authentication aspects of one of our protocols. We implement the scheme in a prototype to assess the performance.

Keywords

Stock Price Protection Scheme Message Authentication Code Digital Right Management Content Part 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Atallah, M.J., Li, J.: Enhanced smart-card based license management. In: IEEE International Conference on E-Commerce, pp. 111–119. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  2. 2.
    Banâtre, J.-P., Fradet, P., Métayer, D.L.: Gamma and the chemical reaction model: Fifteen years after. In: Calude, C.S., Pun, G., Rozenberg, G., Salomaa, A. (eds.) Multiset Processing. LNCS, vol. 2235, pp. 17–44. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Bertino, E., Castano, S., Ferrari, E., Mesili, M.: Controlled access and dissemination of XML documents. In: Proceedings 2nd ACM Workshop on Web Information and Data Management (WIDM 1999), pp. 22–27 (1999)Google Scholar
  4. 4.
    Chong, C.N., Corin, R., Etalle, S., Hartel, P.H., Jonker, W., Law, Y.W.: LicenseScript: A novel digital rights language and its semantics. In: Ng, K., Busch, C., Nesi, P. (eds.) 3rd International Conference on Web Delivering of Music (WEDELMUSIC), September 2003, pp. 122–129. IEEE Computer Society Press, Los Alamitos (2003)CrossRefGoogle Scholar
  5. 5.
    Chong, C.N., Etalle, S., Hartel, P.H., Joosten, R., Kleinhuis, G.: Service brokerage with prolog. Technical Report TR-CTIT-04-14, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands (February 2004)Google Scholar
  6. 6.
    Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamper-resistant hardware. In: Gritzalis, D., di Vimercati, S.D.C., Samarati, P., Katsikas, S.K. (eds.) 18th IFIP International Information Security Conference (IFIPSEC). IFIP Conference Proceedings, vol. 250, pp. 73–84. Kluwer Academic Publishers, Dordrecht (2003)Google Scholar
  7. 7.
    Chong, C.N., van Buuren, R., Hartel, P.H., Kleinhuis, G.: Security attribute based digital rights management (SABDRM). In: Boavida, F., Monteiro, E., Orvalho, J. (eds.) IDMS 2002 and PROMS 2002. LNCS, vol. 2515, pp. 339–352. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326–341. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  9. 9.
    Damiani, E., de, S., di Vimercati, C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–135. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  10. 10.
    Goshi, J., Ladner, R.E.: Algorithms for dynamic multicast key distribution trees. In: Proceedings of of the twenty-second annual symposium on Principles of distributed computing, pp. 243–251. ACM Press, New York (2003)CrossRefGoogle Scholar
  11. 11.
    Lloyd, J.W.: Foundations of Logic Programming. Symbolic Computation – Artificial Intelligence, 2nd edn. Springer, Heidelberg (1987)Google Scholar
  12. 12.
    Pearson, S., Balacheff, B., Chen, L., Plaqui, D., Proudler, G.: Trusted Computing Platforms – TCPA Technology in Context. Prentice Hall PTR, Upper Saddle River (2003)Google Scholar
  13. 13.
    Sandhu, R., Park, J.: Towards usage control models: beyond traditional access control. In: 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), pp. 57–64. ACM, New York (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Cheun Ngen Chong
    • 1
  • Bin Ren
    • 1
  • Jeroen Doumen
    • 1
  • Sandro Etalle
    • 1
  • Pieter H. Hartel
    • 1
  • Ricardo Corin
    • 1
  1. 1.EEMCS FacultyUniversity of TwenteEnschedeThe Netherlands

Personalised recommendations