an efficient software protection scheme

8
An Efficient Software An Efficient Software Protection Scheme Protection Scheme Antonio Ma Antonio Ma ña, ña, Ernesto Pimentel Ernesto Pimentel University of Málaga, University of Málaga, Spain Spain Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security, June 11-13, 2001, Paris, France. Presented by Matt Barrett, [email protected]

Upload: haviva-black

Post on 31-Dec-2015

10 views

Category:

Documents


0 download

DESCRIPTION

An Efficient Software Protection Scheme. Antonio Ma ña, Ernesto Pimentel University of Málaga, Spain Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security, June 11-13, 2001, Paris, France. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Efficient Software Protection Scheme

An Efficient Software An Efficient Software Protection SchemeProtection Scheme

Antonio MaAntonio Maña, Ernesto ña, Ernesto PimentelPimentel

University of Málaga, SpainUniversity of Málaga, Spain

Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on

Information Security, June 11-13, 2001, Paris, France.

Presented by Matt Barrett, [email protected]

Page 2: An Efficient Software Protection Scheme

SummarySummary

The paper describes a software based The paper describes a software based protection scheme using smart-card protection scheme using smart-card

based hardware tokens allowing Internet based hardware tokens allowing Internet based software distribution, with a based software distribution, with a

powerful license management system. powerful license management system.

Page 3: An Efficient Software Protection Scheme

Appreciative CommentAppreciative Comment

Thorough description of problemThorough description of problem

Well stated and defensible justificationWell stated and defensible justification

“…“…it is concluded that to obtain a provable it is concluded that to obtain a provable secure protection scheme we must have a secure protection scheme we must have a tamperproof processor that contains and tamperproof processor that contains and executes the protected software.”executes the protected software.”

Page 4: An Efficient Software Protection Scheme

Critical CommentCritical Comment

Unclear definition of schemesUnclear definition of schemesFail to separate two descriptionsFail to separate two descriptions

Error in diagramsError in diagrams

Marked difference in clarityMarked difference in clarity

Explanations could be more conciseExplanations could be more concise

Page 5: An Efficient Software Protection Scheme

Scheme OneScheme One

Page 6: An Efficient Software Protection Scheme

Scheme TwoScheme Two

Page 7: An Efficient Software Protection Scheme

Appreciative CommentAppreciative Comment

Licensing managementLicensing managementFree distribution over the InternetFree distribution over the InternetEasy recovery of lost licensesEasy recovery of lost licensesTransfer of licenses to other smart cardsTransfer of licenses to other smart cardsExpiration of licenseExpiration of license

Extremely useful features, giving scheme Extremely useful features, giving scheme a wide scope of usefulnessa wide scope of usefulness

Page 8: An Efficient Software Protection Scheme

DiscussionDiscussion

Just not practical for use with softwareJust not practical for use with software ““The cat is already out of the bag.”The cat is already out of the bag.”

Could the principles of this scheme be Could the principles of this scheme be modified for use with pure content?modified for use with pure content?