List Of Copy Protection Schemes
   HOME

TheInfoList



OR:

This is a list of notable
copy protection Copy protection, also known as content protection, copy prevention and copy restriction, describes measures to enforce copyright by preventing the reproduction of software, films, music, and other media. Copy protection is most commonly found on ...
schemes for various medias.


Computer Software protection schemes

;
Dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synonym ...
: Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the hardware breaks. ;
Product Activation Product activation is a license validation procedure required by some proprietary software programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it ''determin ...
: Requiring user to verify the license, often by entering a
Product key A product key, also known as a software key, serial key or activation key, is a specific software-based key for a computer program. It certifies that the copy of the program is original. Product keys consist of a series of numbers and/or letters ...
in order to activate and use the software; some activation schemes require sending registration information over internet to prevent the same product key from being used by multiple users. In some cases, users are required to call a number to register and receive device-specific serial number. ;
Bus encryption Bus encryption is the use of encrypted program instructions on a data bus in a computer that includes a secure cryptoprocessor for executing the encrypted instructions. Bus encryption is used primarily in electronic systems that require high secu ...
: Use of encrypted code together with
Secure cryptoprocessor A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike crypt ...
so only the machine with cryptoprocessor could execute the program; used in systems that require high security such as ATMs. ;
Keyfile {{Unreferenced, date=December 2009 A keyfile (or ''key-file'') is a file on a computer which contains encryption or license keys. A common use is web server software running secure socket layer (SSL) protocols. Server-specific keys issued by tru ...
: A file with activation key that needs to be installed in same directory as software; similarly, a disc media (often installation disc) may be required as key disk for activation.Ashe, Philip R. "Copy protection for a recordable medium and for controlling a recorder." http://www.google.ca/patents/US6070799?printsec=abstract&hl=ja&f=false#v=onepage&q&f=false 6 Jun. 2000. ;
Code Morphing Code morphing is an approach used in obfuscating software to protect software applications from reverse engineering, analysis, modifications, and cracking. This technology protects intermediate level code such as compiled from Java and .NET languag ...
: Hiding intermediate code by means of
code obfuscation In software development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statem ...
so that execution logic is not visible. This method does not protect against runtime tracing.


Commercial CD/DVD protection schemes


Commercial Blu-ray Disc protection schemes

; AACS : The encrypted content can only be decrypted using combination of media key (obtained from
Media Key Block The Media Key Block (MKB) is one of the keys included inside the copying protection system (DRM) AACS. This system is used to prevent Blu-ray and HD DVD formats from being copied. The system was developed by companies from the film industry and t ...
by one of device keys available for each reproduction devices) and the Volume ID (unique identifiers stored on each disk) of the media. ; BD+ : The BD+ virtual machine embedded in authorized players will execute programs included in Blu-ray discs, allowing to verify the player's keys, transform the output so that content is unscrambled, and/or execute native code to patch the system against vulnerabilities. Based on concept of
self-protecting digital content {{Refimprove, date=March 2008 Self Protecting Digital Content (SPDC), is a copy protection ( digital rights management) architecture which allows restriction of access to, and copying of, the next generation of optical discs and streaming/download ...
. ;
ROM-Mark In computing, ROM Mark or BD-ROM Mark is a serialization technology designed to guard against mass production piracy or the mass duplication and sale of unauthorized copies of pre-recorded Blu-ray Discs. Only licensed BD-ROM manufacturers have acce ...
: Recorders will check for watermark that cannot be duplicated by consumer-level recorders, allowing authentic media for movies, musics and games.


Digital Audio/Video Transmission protection schemes

;
DTCP Digital Transmission Content Protection (DTCP) is a digital rights management (DRM) technology that restricts digital home technologies including DVD players and televisions by encrypting interconnections between devices. This permits the distributi ...
: Encrypts interconnection between devices so "digital home" technologies such as DVD players and televisions are restricted. ;
HDCP High-bandwidth Digital Content Protection (HDCP) is a form of digital copy protection developed by Intel Corporation to prevent copying of digital audio and video content as it travels across connections. Types of connections include DisplayPort ...
: Transmitting device checks before sending that receiver is authorized to receive the data. The data is encrypted during transmission to prevent eavesdropping. ;
Serial Copy Management System The Serial Copy Management System (SCMS) is a copy protection scheme that was created in response to the digital audio tape (DAT) invention, in order to prevent DAT recorders from making second-generation or serial copies. SCMS sets a "copy" bit ...
: Records in the sub code data bits that expresses whether the media is copy allowed(00), copy once(10) or copy prohibited(11). ;
Traitor Tracing Traitor tracing schemes help trace the source of leaks when secret or proprietary data is sold to many customers. In a traitor tracing scheme, each customer is given a different personal decryption key. (Traitor tracing schemes are often combined ...
: Rather than directly preventing copying, embeds user information into files so if they are uploaded, the copyright holder could find out exactly who uploaded the file.


Protection Schemes for Other Media

;
CGMS-A Copy Generation Management System – Analog (CGMS-A) is a copy protection mechanism for analog television signals. It consists of a waveform inserted into the non-picture Vertical Blanking Interval (VBI) of an analogue video signal. If a compatib ...
(Analog Television Signals) : Inserts a waveform into the non-picture Vertical Blanking Interval (VBI) of the analog video signal so compatible device can block or restrict recording when the waveform is detected. ;
Spiradisc Spiradisc (often misspelled as "Spiradisk") was a copy protection scheme used by Sierra On-Line on their floppy disk releases for the Apple II. The technique, developed by Mark Duchaineau, involved writing the data on spiralling paths on the disk ...
(Floppy Disk) : Writes data on spiraling paths rather than in concentric circles. ; USB-Cops (USB-stick) : Using a normal USB-stick as a key.


References

{{Reflist Digital rights management Compact Disc and DVD copy protection Copy protection