computersecurityhandbook.com
Home  >  Fourth Edition  >  Chapter 26
Chapter 26 –  Piracy and Antipiracy Techniques
     Diane E. (Dione) Levine

Chapter Contents:

   26.1    Introduction
   26.1.1    Patent, Copyright, and Trademark Laws
   26.1.2    Types of Piracy
   26.2    Terminology
   26.3    Hardware-based Antipiracy Techniques
   26.3.1    Dongles
   26.3.2    Specialized Readers
   26.3.2.1    Audio
   26.3.2.2    Video
   26.3.2.3    TV (Analog)
   26.3.2.4    Television (HDTV)
   26.3.2.5    Specialized readers rejected by consumers
   26.3.3    Evanescent Media
   26.4    Software Keys
   26.4.1    Examples
   26.4.1.1    Video cassettes vs. copy machines
   26.4.1.2    DVD area encoding
   26.4.2    Implementation
   26.4.3    Watermarks
   26.4.4    Resistance to Reverse Engineering
   26.4.5    Published Attacks
   26.5    Software Usage Counters
   26.5.1    Controlling Concurrent Installations
   26.5.2    Controlling Concurrent Usage
   26.5.3    Examples
   26.5.4    Implementation
   26.6    Digital Rights Management
   26.6.1    Purpose
   26.6.2    Application
   26.6.3    Examples
   26.7    Fundamental Problems
   26.8    Summary
   26.9    Notes
   26.10    References

Please report problems to the webmaster at: webmaster@removethis.rlgsc.com
copyright 2002-2006, Robert Gezelter, All Rights Reserved