Abstract
Although many anti-piracy methods are prevalent today in the software market, still software piracy is constantly on the rise. The cause of this can be attributed to (a) either these methods are very expensive to be implemented (b) or are easy to be defeated (c) or are simply not very convenient to use. Anti-piracy methods usually consist of lock-and-key policy where the software to be protected is locked using some encryption method (lock) and this lock requires a key to be unlocked. The key is called as registration code and the mechanism is called as registration mechanism in the software parlance. The registration mechanism may be implemented in many ways- software, hardware, or a combination of both. The way it is implemented makes the protection scheme more vulnerable or less vulnerable to piracy. The method of implementation also affects the user convenience to use the software. Some mechanisms are very convenient to the user but are more vulnerable to piracy. Some others are least vulnerable to piracy but are very inconvenient to the user. Different vendors choose different ways to implement the lock and unlock mechanism to make it as hard as possible to pirate their software. In this paper, we discuss several anti-piracy methods, the security issues related to them, and present a model which allows prevention of software piracy through a secure mechanism for software distribution.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Third Annual BSA and IDC Global Software Piracy Study. May 2006.
R. Akiyama, M. Yoshioka, and Y. Uchida. Software copying System. Sept. 1998. US Patent no. 5805699.
Alladin. HASP HL Hardware Key with 128-bit AES Encryption. http://www.alladin.com/HASP/HaspHL.asp.
Andy McFadden. CD-Recordable FAQ-Section 2. http://www.cdrfaq.org.
J. A. Barnard, M. A. Inchalik, and B. L. Ha. Copy protection using multiple security levels on a programmable CD-ROM. June 2006. US Patent no. 7057993.
A. N. Chandra, L. D. Comerford, and S. R. White. Implementing a shared higher level of privilege on personal computers for copy protection of software. Feb. 1987. US Patent no. 4644493.
J. P. DeMont. Method and apparatus for distributing information products. Nov. 1999. US Patent no. 5982889.
B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. CD-ROM with machine-readable I.D. code. Mar. 1995. US Patent no. 5400319.
B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. Using defect read from a disk to represent a machine readable code. Sept. 1998. US Patent no. 5805549.
T. Hasebe, R. Akiyama, and M. Yoshioka. Storage medium for preventing illegal use by third party. Sept. 1996. US Patent no. 5555304.
R. S. Indeck, W. Marcel, L. George, and A. L. Hege. Method and appartus for improved fingerprinting
H. Kanamaru. Information recording method and apparatus, function recording method and apparatus, and information reproducing method and apparatus. Aug. 1999. US Patent no. 5940505.
Y. Kanzaki, A. Monden, M. Nakamura, and K. Matsumoto. A Software Protection Method Based on Instruction Camouage. Electronics and Communications in Japan, 89(1), 2006. Translated from: Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J87-A, No. 6, June 2004, pp. 755-767.
Macrovision. Game Disc Protection. http://www.macrovision.com.
MAI Digital Security. USB Port Dongle. http://www.keylok.com/usb dongle.html.
Mentor Graphics. ModelSim- a comprehensive simulation and debug environment for complex ASIC and FPGA designs. http://www.model.com/.
C. H. O’Connor and J. J. Pearce. Method of securing CD-ROM daafor retrieval by one machine. Apr. 1998. US Patent no. 5745568.
Rockey. ROCKEY4 Hardware Based Securiy. http://www.rockey.com.my.
Sony, Copy Control for CD-ROM, with SecuROM. http://www.sonydadc.com/.
Fourth Annual BSA and IDC Global Software Piracy Study. 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media B.V.
About this paper
Cite this paper
Chandu, V.P., Singh, K., Baskaran, R. (2008). A Model for Prevention of Software Piracy through Secure Distribution. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_45
Download citation
DOI: https://doi.org/10.1007/978-1-4020-8741-7_45
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-8740-0
Online ISBN: 978-1-4020-8741-7
eBook Packages: Computer ScienceComputer Science (R0)