请输入您要查询的百科知识:

 

词条 List of copy protection schemes
释义

  1. Computer Software protection schemes

  2. Commercial CD/DVD protection schemes

  3. Commercial Blu-ray Disc protection schemes

  4. Digital Audio/Video Transmission protection schemes

  5. Protection Schemes for Other Media

  6. References

This is a list of notable copy protection schemes for various medias.

Computer Software protection schemes

//Dongle">Dongle

Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the hardware breaks.

//Product Activation">Product Activation

Requiring user to verify the license, often by entering a Product key in order to activate and use the software; some activation schemes require sending registration information over internet to prevent the same product key from being used by multiple users. In some cases, users are required to call a number to register and receive device-specific serial number.

//Bus encryption">Bus encryption

Use of encrypted code together with Secure cryptoprocessor so only the machine with cryptoprocessor could execute the program; used in systems that require high security such as ATMs.

//ILok (Copy Protection)">iLok

Combines USB Dongle and an online registration system so the authorized users can use the software on multiple computers without registering each machine.

//Keyfile">Keyfile

A file with activation key that needs to be installed in same directory as software; similarly, a disc media (often installation disc) may be required as key disk for activation.[1]

//Code Morphing">Code Morphing

Hiding intermediate code by means of code obfuscation so that execution logic is not visible. This method does not protect against runtime tracing.[2]

Commercial CD/DVD protection schemes

{{main|List of Compact Disc and DVD copy protection schemes}}

Commercial Blu-ray Disc protection schemes

//Advanced Access Content System">AACS

The encrypted content can only be decrypted using combination of media key (obtained from Media Key Block by one of device keys available for each reproduction devices) and the Volume ID (unique identifiers stored on each disk) of the media.

//BD+">BD+

The BD+ virtual machine embedded in authorized players will execute programs included in Blu-ray discs, allowing to verify the player's keys, transform the output so that content is unscrambled, and/or execute native code to patch the system against vulnerabilities. Based on concept of self-protecting digital content.

//ROM-Mark">ROM-Mark

Recorders will check for watermark that cannot be duplicated by consumer-level recorders, allowing authentic media for movies, musics and games.

Digital Audio/Video Transmission protection schemes

//Digital Transmission Content Protection">DTCP

Encrypts interconnection between devices so "digital home" technologies such as DVD players and televisions are restricted.

//HDCP">HDCP

Transmitting device checks before sending that receiver is authorized to receive the data. The data is encrypted during transmission to prevent eavesdropping.

//Serial Copy Management System">Serial Copy Management System

Records in the sub code data bits that expresses whether the media is copy allowed(00), copy once(10) or copy prohibited(11).

//Traitor tracing">Traitor Tracing

Rather than directly preventing copying, embeds user information into files so if they are uploaded, the copyright holder could find out exactly who uploaded the file.

Protection Schemes for Other Media

//CGMS-A">CGMS-A (Analog Television Signals)

Inserts a waveform into the non-picture Vertical Blanking Interval (VBI) of the analog video signal so compatible device can block or restrict recording when the waveform is detected.

//Spiradisc">Spiradisc (Floppy Disk)

Writes data on spiraling paths rather than in concentric circles.

//USB-Cops">USB-Cops (USB-stick)

Using a normal USB-stick as a key.

References

1. ^Ashe, Philip R. "Copy protection for a recordable medium and for controlling a recorder." [U.S. Patent No. 6,070,799|http://www.google.ca/patents/US6070799?printsec=abstract&hl=ja&f=false#v=onepage&q&f=false]. 6 Jun. 2000.
2. ^{{cite journal | title = Watermarking, tamper-proofing, and obfuscation - tools for software protection | journal = Software Engineering, IEEE Transactions on | date = 28 Aug 2002 | first = C.S. | last = Collberg |author2=Thomborson, C. | volume = 28 | issue = 8 | pages = 735–746 | doi = 10.1109/TSE.2002.1027797 }}

3 : Digital rights management|Compact Disc and DVD copy protection|Copy protection

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/13 7:39:54