Chapter 26 – |
Piracy and Antipiracy Techniques |
Diane E. (Dione) Levine
Chapter Contents:
|
26.1 |
|
Introduction
|
|
26.1.1 |
|
Patent, Copyright, and Trademark Laws
|
|
26.1.2 |
|
Types of Piracy
|
|
26.2 |
|
Terminology
|
|
26.3 |
|
Hardware-based Antipiracy Techniques
|
|
26.3.1 |
|
Dongles
|
|
26.3.2 |
|
Specialized Readers
|
|
26.3.2.1 |
|
Audio
|
|
26.3.2.2 |
|
Video
|
|
26.3.2.3 |
|
TV (Analog)
|
|
26.3.2.4 |
|
Television (HDTV)
|
|
26.3.2.5 |
|
Specialized readers rejected by consumers
|
|
26.3.3 |
|
Evanescent Media
|
|
26.4 |
|
Software Keys
|
|
26.4.1 |
|
Examples
|
|
26.4.1.1 |
|
Video cassettes vs. copy machines
|
|
26.4.1.2 |
|
DVD area encoding
|
|
26.4.2 |
|
Implementation
|
|
26.4.3 |
|
Watermarks
|
|
26.4.4 |
|
Resistance to Reverse Engineering
|
|
26.4.5 |
|
Published Attacks
|
|
26.5 |
|
Software Usage Counters
|
|
26.5.1 |
|
Controlling Concurrent Installations
|
|
26.5.2 |
|
Controlling Concurrent Usage
|
|
26.5.3 |
|
Examples
|
|
26.5.4 |
|
Implementation
|
|
26.6 |
|
Digital Rights Management
|
|
26.6.1 |
|
Purpose
|
|
26.6.2 |
|
Application
|
|
26.6.3 |
|
Examples
|
|
26.7 |
|
Fundamental Problems
|
|
26.8 |
|
Summary
|
|
26.9 |
|
Notes
|
|
26.10 |
|
References
|
|
|
|