Skip to main content

Copy Protection

  • Reference work entry
  • 108 Accesses

Copy protection attempts to find ways which limit the access to copyrighted material and/or inhibit the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers or through the use of special hardware add-ons (dongles), and technical copy protection mechanisms on the media.

Copy protection mechanisms can work pro-actively by aiming to prevent users from accessing copy protected content.

For content that is distributed on physical media such as floppy disks, digital audio tape (DAT), CD-ROM or digital versatile disk (DVD), copy protection can be achieved by master copy control and copy generation control:

  • Master copy control:If consumers are not allowed to even make backup copies of their master media, then one can mark the master media themselves in addition to or instead of marking the copyrighted content. This was an inexpensive and common way to protect software distributed...

This is a preview of subscription content, log in via an institution.

References

  1. Anderson, Ross (2001). Security Engineering. Wiley & Sons, New York.

    MATH  Google Scholar 

  2. Bloom, Jefrey A., Ingemar J. Cox, Ton Kalker, Jean-Paul, M.G. Linnartz, Matthew L. Miller, C. Brendan, and S. Traw (1999). “Copy protection for DVD video.” Proceedings of the IEEE, 87 (7), 1267–1276.

    Google Scholar 

  3. Craver, Scott A., Min Wu, Bede Liu, Adam Subblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, and Edward W. Felten (2001). “Reading between the lines: Lessons from the SDMI Challenge.” 10th Usenix Security Symposium 2002, The USENIX Association 2001, 353–363.

    Google Scholar 

  4. Digital Millenium Copyright Act: http://www.lo.gov/copyright/legislation/dmca.pdf

  5. Digital Rights Management: http://www.epic.org/privacy/drm/

  6. Petitcolas, Fabien A., Ross Anderson, Markus G. Kuhn (1998). “Attacks on copyright marking systems.” Information Hiding, Lecture Notes in Computer Science, vol. 1525, ed. D. Aucsmith. Springer-Verlag, Berlin, 218–238.

    Google Scholar 

  7. Secure Digital Music Initiative http://www.sdmi.org

  8. Trusted Computing Platform Initiative: http://www.trustedcomputing.org

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Bleumer, G. (2005). Copy Protection. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_78

Download citation

Publish with us

Policies and ethics