Skip to main content

A Model for Prevention of Software Piracy through Secure Distribution

  • Conference paper

Abstract

Although many anti-piracy methods are prevalent today in the software market, still software piracy is constantly on the rise. The cause of this can be attributed to (a) either these methods are very expensive to be implemented (b) or are easy to be defeated (c) or are simply not very convenient to use. Anti-piracy methods usually consist of lock-and-key policy where the software to be protected is locked using some encryption method (lock) and this lock requires a key to be unlocked. The key is called as registration code and the mechanism is called as registration mechanism in the software parlance. The registration mechanism may be implemented in many ways- software, hardware, or a combination of both. The way it is implemented makes the protection scheme more vulnerable or less vulnerable to piracy. The method of implementation also affects the user convenience to use the software. Some mechanisms are very convenient to the user but are more vulnerable to piracy. Some others are least vulnerable to piracy but are very inconvenient to the user. Different vendors choose different ways to implement the lock and unlock mechanism to make it as hard as possible to pirate their software. In this paper, we discuss several anti-piracy methods, the security issues related to them, and present a model which allows prevention of software piracy through a secure mechanism for software distribution.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Third Annual BSA and IDC Global Software Piracy Study. May 2006.

    Google Scholar 

  2. R. Akiyama, M. Yoshioka, and Y. Uchida. Software copying System. Sept. 1998. US Patent no. 5805699.

    Google Scholar 

  3. Alladin. HASP HL Hardware Key with 128-bit AES Encryption. http://www.alladin.com/HASP/HaspHL.asp.

    Google Scholar 

  4. Andy McFadden. CD-Recordable FAQ-Section 2. http://www.cdrfaq.org.

    Google Scholar 

  5. J. A. Barnard, M. A. Inchalik, and B. L. Ha. Copy protection using multiple security levels on a programmable CD-ROM. June 2006. US Patent no. 7057993.

    Google Scholar 

  6. A. N. Chandra, L. D. Comerford, and S. R. White. Implementing a shared higher level of privilege on personal computers for copy protection of software. Feb. 1987. US Patent no. 4644493.

    Google Scholar 

  7. J. P. DeMont. Method and apparatus for distributing information products. Nov. 1999. US Patent no. 5982889.

    Google Scholar 

  8. B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. CD-ROM with machine-readable I.D. code. Mar. 1995. US Patent no. 5400319.

    Google Scholar 

  9. B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. Using defect read from a disk to represent a machine readable code. Sept. 1998. US Patent no. 5805549.

    Google Scholar 

  10. T. Hasebe, R. Akiyama, and M. Yoshioka. Storage medium for preventing illegal use by third party. Sept. 1996. US Patent no. 5555304.

    Google Scholar 

  11. R. S. Indeck, W. Marcel, L. George, and A. L. Hege. Method and appartus for improved fingerprinting

    Google Scholar 

  12. H. Kanamaru. Information recording method and apparatus, function recording method and apparatus, and information reproducing method and apparatus. Aug. 1999. US Patent no. 5940505.

    Google Scholar 

  13. Y. Kanzaki, A. Monden, M. Nakamura, and K. Matsumoto. A Software Protection Method Based on Instruction Camouage. Electronics and Communications in Japan, 89(1), 2006. Translated from: Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J87-A, No. 6, June 2004, pp. 755-767.

    Google Scholar 

  14. Macrovision. Game Disc Protection. http://www.macrovision.com.

    Google Scholar 

  15. MAI Digital Security. USB Port Dongle. http://www.keylok.com/usb dongle.html.

    Google Scholar 

  16. Mentor Graphics. ModelSim- a comprehensive simulation and debug environment for complex ASIC and FPGA designs. http://www.model.com/.

    Google Scholar 

  17. C. H. O’Connor and J. J. Pearce. Method of securing CD-ROM daafor retrieval by one machine. Apr. 1998. US Patent no. 5745568.

    Google Scholar 

  18. Rockey. ROCKEY4 Hardware Based Securiy. http://www.rockey.com.my.

    Google Scholar 

  19. Sony, Copy Control for CD-ROM, with SecuROM. http://www.sonydadc.com/.

    Google Scholar 

  20. Fourth Annual BSA and IDC Global Software Piracy Study. 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media B.V.

About this paper

Cite this paper

Chandu, V.P., Singh, K., Baskaran, R. (2008). A Model for Prevention of Software Piracy through Secure Distribution. In: Sobh, T. (eds) Advances in Computer and Information Sciences and Engineering. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8741-7_45

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8741-7_45

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8740-0

  • Online ISBN: 978-1-4020-8741-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics