HOME
*





List Of Copy Protection Schemes
This is a list of notable copy protection schemes for various medias. Computer Software protection schemes ; Dongle : Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the hardware breaks. ; Product Activation : Requiring user to verify the license, often by entering a Product key in order to activate and use the software; some activation schemes require sending registration information over internet to prevent the same product key from being used by multiple users. In some cases, users are required to call a number to register and receive device-specific serial number. ; Bus encryption : Use of encrypted code together with Secure cryptoprocessor so only the machine with cryptoprocessor could execute the program; used in systems that require high security such as ATMs. ; Keyfile : A file with activation key that needs to be installed in same directory as software; similarly, a disc media (often installation ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Copy Protection
Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on videotapes, DVDs, Blu-ray discs, HD-DVDs, computer software discs, video game discs and cartridges, audio CDs and some VCDs. Some methods of copy protection have also led to criticism because it caused inconvenience for paying consumers or secretly installed additional or unwanted software to detect copying activities on the consumer's computer. Making copy protection effective while protecting consumer rights remains a problem with media publication. Terminology Media corporations have always used the term copy protection, but critics argue that the term tends to sway the public into identifying with the publishers, who favor restriction technologies, rather than with the users. Copy prevention and copy control may be more neutral ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


ROM-Mark
In computing, ROM Mark or BD-ROM Mark is a serialization technology designed to guard against mass production piracy or the mass duplication and sale of unauthorized copies of pre-recorded Blu-ray Discs. Only licensed BD-ROM manufacturers have access to the equipment that can make these unique ROM Marks, thus allowing authentic BD-ROM media like movies and music to be identified. The ROM Mark contains the Volume ID required to decrypt content encrypted using AACS.Digital Content Protection Status Report See also * Burst Cutting Area Notes References * Panasonic, Philips, Sony. ''3C BD-ROM Mark Specification''. * Edmonds, Robert A.; (Saratoga, CA) ; McDonnell, Kevin J.; (Pleasanton, CA) ; Meulder, Johan De; (Kessel, BE).Method and apparatus for identifying a digital recording source. * MPAA.Digital Content Protection Status Report. ''IRMA Annual Recording Media Forum''. (PowerPoint file, via The Internet Archive The Internet Archive is an American digital library ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Digital Rights Management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted works. DRM technologies govern the use, modification, and distribution of copyrighted works (such as software and multimedia content), as well as systems that enforce these policies within devices. Laws in many countries criminalize the circumvention of DRM, communication about such circumvention, and the creation and distribution of tools used for such circumvention. Such laws are part of the United States' Digital Millennium Copyright Act (DMCA), and the European Union's Information Society Directive (the French DADVSI is an example of a member state of the European Union implementing the directive). DRM techniques include licensing agreements and encryption. The industry has expanded the usage of DRM to various hardware products, such as K ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Spiradisc
Spiradisc (often misspelled as "Spiradisk") was a copy protection scheme used by Sierra On-Line on their floppy disk releases for the Apple II. The technique, developed by Mark Duchaineau, involved writing the data on spiralling paths on the disk rather than in concentric circles. Initially, no commercial copying software or bit nibbler could successfully copy the disks it was applied to. Games which used Spiradisc copy protection include '' Lunar Leepers'', ''Frogger'', some very early versions of ''Ultima II Ultima may refer to: Places * Ultima, Victoria, a town in Australia * Pangaea Ultima, a supercontinent to occur in the future * ''Ultima'', the larger lobe of the trans-Neptunian object 486958 Arrokoth, nicknamed ''Ultima Thule'' Companies and ...'', '' Jawbreaker'',{{cite journal , last1=Etarip , first1=Rich , title=Softkey for ''Jawbreaker'' , journal= Computist , issue=82 , page16, publisher= SoftKey Publishing , url=https://archive.org/details/computist-scan-82 , ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


CGMS-A
Copy Generation Management System – Analog (CGMS-A) is a copy protection mechanism for analog television signals. It consists of a waveform inserted into the non-picture Vertical Blanking Interval (VBI) of an analogue video signal. If a compatible recording device (for example, a DVD recorder) detects this waveform, it may block or restrict recording of the video content. It is not the same as the broadcast flag, which is designed for use in digital television signals, although the concept is the same. There is a digital form of CGMS specified as CGMS-D which is required by the DTCP ("5C") protection standard. History CGMS-A has been in existence since 1995, and has been standardized by various organizations including the IEC and EIA/ CEA. It is used in devices such as PVRs/DVRs, DVD players and recorders, D-VHS, and Blu-ray recorders, as well certain television broadcasts. More recent TiVo firmware releases comply with CGMS-A signals. Applications Implementation of CGMS-A ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Traitor Tracing
Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined with conditional access systems so that, once the traitor tracing algorithm identifies a personal decryption key associated with the leak, the content distributor can revoke that personal decryption key, allowing honest customers to continue to watch pay television while the traitor and all the unauthorized users using the traitor's personal decryption key are cut off.) Traitor tracing schemes are used in pay television to discourage pirate decryption – to discourage legitimate subscribers from giving away decryption keys. Traitor tracing schemes are ineffective if the traitor rebroadcasts the entire (decrypted) original content. There are other kinds of schemes that discourages pirate rebroadcast – i.e., discourages legitimate subscr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Serial Copy Management System
The Serial Copy Management System (SCMS) is a copy protection scheme that was created in response to the digital audio tape (DAT) invention, in order to prevent DAT recorders from making second-generation or serial copies. SCMS sets a "copy" bit in all copies, which prevents anyone from making further copies of those first copies. It does not, however, limit the number of first-generation copies made from a master. SCMS was also included in consumer CD-R, MiniDisc and Digital Compact Cassette (DCC) players and recorders. With the demise of these formats, SCMS is not in widespread use. However, the concept of SCMS was resurrected in the broadcast flag, a measure formerly mandated by the Federal Communications Commission (FCC) to limit the copying of digital TV signals. SCMS flags are also included in the MP3 specifications, though no known decoder or player honors them. Personal Computers were not required to include SCMS in the US. History SCMS was created as a compromise betw ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




HDCP
High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connections. Types of connections include DisplayPort (DP), Digital Visual Interface (DVI), and High-Definition Multimedia Interface (HDMI), as well as less popular or now deprecated protocols like Gigabit Video Interface (GVIF) and Unified Display Interface (UDI). The system is meant to stop HDCP-encrypted content from being played on unauthorized devices or devices which have been modified to copy HDCP content. Before sending data, a transmitting device checks that the receiver is authorized to receive it. If so, the transmitter encrypts the data to prevent eavesdropping as it flows to the receiver. In order to make a device that plays HDCP-enabled content, the manufacturer must obtain a license for the patent from Intel subsidiary Digital Content Protection LLC, pay an annual fee, and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Digital Transmission Content Protection
Digital Transmission Content Protection (DTCP) is a digital rights management (DRM) technology that restricts digital home technologies including DVD players and televisions by encrypting interconnections between devices. This permits the distribution of content through other devices such as personal computers or portable media players, if they also implement the DTCP standards. DTCP has also been referred to as "5C" content protection, a reference to the five companies that created DTCP; Hitachi, Intel, Matsushita, Sony, and Toshiba. The standard was originally proposed in February 1998, when the five companies presented the system to the Copy Protection Technical Working Group (CPTWG), an ''ad hoc'' body organized to evaluate DRM technologies. The five companies subsequently established thDigital Transmission Licensing Administrator(DTLA) in June 1998 to simplify licensing procedures and promote acceptance of the DTCP method by content providers, electronics manufacturers, and br ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Self-Protecting Digital Content
{{Refimprove, date=March 2008 Self Protecting Digital Content (SPDC), is a copy protection ( digital rights management) architecture which allows restriction of access to, and copying of, the next generation of optical discs and streaming/downloadable content. Overview Designed by Cryptography Research, Inc. of San Francisco, SPDC executes code from the encrypted content on the DVD player, enabling the content providers to change DRM systems in case an existing system is compromised. It adds functionality to make the system "dynamic", as opposed to "static" systems in which the system and keys for encryption and decryption do not change, thus enabling one compromised key to decode all content released using that encryption system. "Dynamic" systems attempt to make future content released immune to existing methods of circumvention. Playback method If a method of playback used in previously released content is revealed to have a weakness, either by review or because it has a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Dongle
A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonymous with ''software protection dongles''—a form of hardware digital rights management where a piece of software will only operate if a specified dongle—which typically contains a license key or some other cryptographic protection mechanism—is plugged into the computer while it is running. The term has since been applied to other forms of devices with a similar form factor, such as: * adapters that convert ports to handle different types of connectors (such as DVI to VGA for displays, USB-to-serial data communication, and in modern computing, USB-C to other types of ports, and Mobile High-Definition Link), * USB wireless adapters for standards such as Bluetooth and Wi-Fi * USB flash drives (more commonly described as "USB stick" or " ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]