Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
An efficient software protection scheme
Maña A., Pimentel E.  Information security: Trusted information (Proceedings of the 16th international conference, Paris, France,2001.Type:Proceedings
Date Reviewed: Sep 3 2002

The authors propose a new system for protecting software using tamperproof smart cards in this paper. Their idea is to transfer some of the encryption process and execution of the protected software to the smart card. This transfer would take place in ways that defeat attack and are amenable to commercial exploitation. To do this, some of the code is encrypted in the factory and shipped and packaged independently of the smart card that has the decryption key. At execution, the encrypted code is sent to the smart card with processing data, and the code is decrypted and executed using the data. Enhancements are suggested to fight attacks and to deal with issues such as transferring licenses.

The authors’ scheme does offer greater protection at a minimal disruption to the product distribution process, though the explanation and diagrams in section 3.1 could be a bit clearer. It will be interesting to see the counterattacks for their scheme. Can any system be, overall, truly tamperproof?

As in many similar papers, the authors include a nice bibliography of related journal articles and conference papers. I would like to suggest that such authors also start including references to at least a few related patents, given the increasing importance of patents in commercial affairs. Anyone wanting to use the authors’ techniques might have to deal with such patents.

Reviewer:  G. Aharonian Review #: CR126422 (0211-0667)
Bookmark and Share
 
Hardware/ Software Protection (K.5.1 )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Hardware/Software Protection": Date
Intellectual property issues in software
, 1991. Type: Book
Apr 1 1992
Computer law for computer professionals
Thomas R. I., Prentice-Hall, Inc., Upper Saddle River, NJ, 1984. Type: Book (9789780131638822)
Jul 1 1985
Preventing piracy: a business guide to software protection
Keet E., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, 1985. Type: Book (9789780201150476)
Sep 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy