License Protection with a Tamper-Resistant Token

Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difficult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all are proprietary. In this paper, we present a license protection scheme, which exploits tamper-resistant cryptographic hardware. The confidentiality and integrity of the license or parts thereof can be assured with our protection scheme. In addition, the keys to unlock the protected content are always protected and stored securely as part of the license. We verify secrecy and authentication aspects of one of our protocols. We implement the scheme in a prototype to assess the performance.

[1]  J. W. Lloyd,et al.  Foundations of logic programming; (2nd extended ed.) , 1987 .

[2]  Charles A. Shoniregun,et al.  Securing XML Documents , 2004, Australas. J. Inf. Syst..

[3]  Z. Chen Java Card Technology for Smart Cards: Architecture and Programmer''s Guide. The Java Series. Addis , 2000 .

[4]  Richard E. Ladner,et al.  Algorithms for dynamic multicast key distribution trees , 2003, PODC '03.

[5]  Dieter Gollmann,et al.  Software License Management with Smart Cards , 1999, Smartcard.

[6]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[7]  Siani Pearson,et al.  Trusted Computing Platforms: TCPA Technology in Context , 2002 .

[8]  John Wylie Lloyd,et al.  Foundations of Logic Programming , 1987, Symbolic Computation.

[9]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[10]  Sandro Etalle,et al.  An Improved Constraint-Based System for the Verification of Security Protocols , 2002, SAS.

[11]  Pieter H. Hartel,et al.  Security Attributes Based Digital Rights Management , 2002, IDMS/PROMS.

[12]  Pascal Fradet,et al.  Gamma and the Chemical Reaction Model: Fifteen Years After , 2000, WMP.

[13]  Elisa Bertino,et al.  Controlled access and dissemination of XML documents , 1999, WIDM '99.

[14]  Bruce Schneier,et al.  Cryptographic Support for Secure Logs on Untrusted Machines , 1998, USENIX Security Symposium.

[15]  Pieter H. Hartel,et al.  Secure Audit Logging with Tamper-Resistant Hardware , 2003, SEC.

[16]  Mikhail J. Atallah,et al.  Enhanced smart-card based license management , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..

[17]  Pieter H. Hartel,et al.  Service Brokerage in Prolog , 2005, ICEIS.

[18]  Yee Wei Law,et al.  LicenseScript: a novel digital rights language and its semantics , 2003, Proceedings Third International Conference on WEB Delivering of Music.