License Protection with a Tamper-Resistant Token

Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin

    Research output: Book/ReportReportOther research output

    125 Downloads (Pure)

    Abstract

    Content protection mechanisms are intended to enforce the usage rights on the content. These usage rights are carried by a license. Sometimes, a license even carries the key that is used to unlock the protected content. Unfortunately, license protection is difcult, yet it is important for digital rights management (DRM). Not many license protection schemes are available, and most if not all are proprietary. In this paper, we present a license protection scheme, which exploits tamper-resistant cryptographic hardware. The condentiality and integrity of the license or parts thereof can be assured with our protection scheme. In addition, the keys to unlock the protected content are always protected and stored securely as part of the license. We veriy secrecy and authentication aspects of one of our protocols. We implement the scheme in a prototype to assess the performance.
    Original languageEnglish
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages16
    Publication statusPublished - Jun 2004

    Publication series

    NameCTIT technical report series
    PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
    No.TR-CTIT-04-28

    Keywords

    • SCS-Cybersecurity

    Fingerprint

    Dive into the research topics of 'License Protection with a Tamper-Resistant Token'. Together they form a unique fingerprint.
    • License protection with a tamper-resistant token

      Chong, C. N., Ren, B., Doumen, J., Etalle, S., Hartel, P. H. & Corin, R., Aug 2004, Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers. Lim, C. H. & Yung, M. (eds.). Berlin, Heidelberg: Springer, p. 223-237 15 p. (Lecture Notes in Computer Science; vol. 3325).

      Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

      Open Access
      File
      3 Citations (Scopus)
      92 Downloads (Pure)

    Cite this