an efficient software protection scheme
DESCRIPTION
An Efficient Software Protection Scheme. Antonio Ma ña, Ernesto Pimentel University of Málaga, Spain Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security, June 11-13, 2001, Paris, France. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/1.jpg)
An Efficient Software An Efficient Software Protection SchemeProtection Scheme
Antonio MaAntonio Maña, Ernesto ña, Ernesto PimentelPimentel
University of Málaga, SpainUniversity of Málaga, Spain
Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on
Information Security, June 11-13, 2001, Paris, France.
Presented by Matt Barrett, [email protected]
![Page 2: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/2.jpg)
SummarySummary
The paper describes a software based The paper describes a software based protection scheme using smart-card protection scheme using smart-card
based hardware tokens allowing Internet based hardware tokens allowing Internet based software distribution, with a based software distribution, with a
powerful license management system. powerful license management system.
![Page 3: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/3.jpg)
Appreciative CommentAppreciative Comment
Thorough description of problemThorough description of problem
Well stated and defensible justificationWell stated and defensible justification
“…“…it is concluded that to obtain a provable it is concluded that to obtain a provable secure protection scheme we must have a secure protection scheme we must have a tamperproof processor that contains and tamperproof processor that contains and executes the protected software.”executes the protected software.”
![Page 4: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/4.jpg)
Critical CommentCritical Comment
Unclear definition of schemesUnclear definition of schemesFail to separate two descriptionsFail to separate two descriptions
Error in diagramsError in diagrams
Marked difference in clarityMarked difference in clarity
Explanations could be more conciseExplanations could be more concise
![Page 5: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/5.jpg)
Scheme OneScheme One
![Page 6: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/6.jpg)
Scheme TwoScheme Two
![Page 7: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/7.jpg)
Appreciative CommentAppreciative Comment
Licensing managementLicensing managementFree distribution over the InternetFree distribution over the InternetEasy recovery of lost licensesEasy recovery of lost licensesTransfer of licenses to other smart cardsTransfer of licenses to other smart cardsExpiration of licenseExpiration of license
Extremely useful features, giving scheme Extremely useful features, giving scheme a wide scope of usefulnessa wide scope of usefulness
![Page 8: An Efficient Software Protection Scheme](https://reader036.vdocuments.us/reader036/viewer/2022083004/56812cfe550346895d91d54d/html5/thumbnails/8.jpg)
DiscussionDiscussion
Just not practical for use with softwareJust not practical for use with software ““The cat is already out of the bag.”The cat is already out of the bag.”
Could the principles of this scheme be Could the principles of this scheme be modified for use with pure content?modified for use with pure content?