<<

and Digital Rights Management Clearinghouse Adam C. Champion Advisor: Dr. Bruce W. Weide Department of Science and Engineering

Introduction TC’s Impetuses TC Definition Implementations Effects on Civil • Computer users face Public-Key • TCG defines trust as TC Liberties, Economy many security threats “hardware and software • TCG published TC Cryptography behave as intended” • Very little except • Positive effects: standards to combat • Alice wants to send • Trusted computing is a “endpoint security” – Protect data these threats Bob a message computing paradigm products, BitLocker – Mitigate • These standards can without anyone that uses hardware- and • Possible abuses: greatly improve eavesdropping software-based security TC Operating Systems – Vendor lock-in , but • She encrypts the mechanisms to ensure • – Barriers to entry in there are many possible message with Bob’s that hardware and – TC support with computer markets abuses due to corporate public key, Bob software act in accord TPM, BitLocker – Market failure zeal to protect IP decrypts it with his with the intentions of a – Robust DRM – Loss of liberties (Vista) private key (Fig. 1) party who may not be the – Harsh licensing user of a computer system. • Windows XP: no TC, Methodology limited DRM support, Policy, Consumer looser licensing Suggestions • This study has 4 parts: TC’s Raisons d’Être • Mac OS X: no TC, – Examine TC’s limited DRM support • Ubiquitous security • : user- • Policy suggestions: impetuses: public-key – Amend DMCA to cryptography, IP, DRM threats: “malware,” configurable TC, Intellectual “phishing,” etc. DRM support allow circumvention – Define TC and explain for “” purpose its core technologies Property Law • Robust DRM enforcement on PCs TC Hardware – Set 14-year copyright – Examine TC • Focus: copyright (©) • Consumer suggestions: implementations in • 1976 Copyright Act: • vPro chips: – Evaluate OS X, Linux , gives © owners Trusted Execution – Use XP, not Vista operating systems, exclusive right to TC Technologies Technology (Fig. 2) – Educate populace software, etc. perform, display, – Vote with pocketbook • – Discuss effects on civil reproduce their Endorsement Key: Uniquely identifies TPM liberties and economy, works; “fair use” • Ensures no offer suggestions for exemptions Secure I/O: one can intercept Conclusion policymakers and • 1998 DMCA: bans computer’s input or consumers circumvention of any • TC can increase output ©-protection system computer security • Memory Curtaining: for any purpose, even • But computer, content Separates different • Many Glossary a legal one! industries eroded fair use programs’ memory from shipped with TPMs • 1998 Copyright Term • Intel’s High- with DMCA, abused • TC: Trusted Computing each other (defined in column 3) Extension Act: © market power • Sealed Storage: Securely bandwidth Digital • TCG: term lasts throughout • Must balance security consortium of IT and electronics stores data based on Content Protection companies implementing TC inventor’s life + 95 yrs. encryption required and freedom • DRM: Digital Rights Management hardware and software technology that enforces usage configuration by Hollywood policy for digital works DRM studios to play high- • IP: Intellectual Property • Remote Attestation: comprises copyrights, trademarks, • Uses cryptography to Detects “unauthorized” definition content Acknowledgments patents, trade secrets to encourage innovation technologically software changes and This work was supported by an Under- • DMCA: Digital Millennium Copyright Other Applications enforce usage policy notifies third party graduate Research Scholarship. Opinions Act • Printers, servers, … expressed are those of the author. All 1998 law banning circumvention of for digital works trademarks referenced herein are the copyright-protection technology • Benign to pernicious • Xbox 360 property of their respective owners.