1 / 3

Architecting Systems to Protect Intellectual Property

Architecting Systems to Protect Intellectual Property. Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16 th November 2007. Legal. Illegal. Moral. Inexpensive. Easy. Expensive. Immoral. Easy. Difficult. Difficult. Lessig’s Taxonomy of Control. IP theft.

paloma
Download Presentation

Architecting Systems to Protect Intellectual Property

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Architecting Systems to Protect Intellectual Property Presentation to NZTE China Workshop Prof. Clark Thomborson Auckland NZ 16th November 2007

  2. Legal Illegal Moral Inexpensive Easy Expensive Immoral Easy Difficult Difficult Lessig’s Taxonomy of Control IP theft Ideally: it would be difficult, immoral, expensive, and illegal for anyone to misappropriate your IP.

  3. Defense in Depth for Software IP • Prevention: • Don’t allow unauthorised use (licence control). • Don’t let anyone read your code (black box). • Don’t let anyone decipher your code (encryption). • Don’t let anyone understand your code (obfuscation). • Don’t let anyone modify your code (tamper-proofing). • Detection: • Monitor subjects (user logs). Requires user ID and user surveillance. • Monitor uses (execution logs). Requires code ID (hashingorwatermarking) and platform surveillance. • Monitor objects (inventory logs). Requires code ID, storage surveillance. • Monitor platforms (platform logs). Requires tamper-evident platforms and platform surveillance. • Response: • Automated. Requires a trusted platform which can “call for help”. • Offline. Requires a trusted inspector (to read the logs).

More Related