A Model for Prevention of Software Piracy through Secure Distribution
Abstract
Although many anti-piracy methods are prevalent today in the software market, still software piracy is constantly on the rise. The cause of this can be attributed to (a) either these methods are very expensive to be implemented (b) or are easy to be defeated (c) or are simply not very convenient to use. Anti-piracy methods usually consist of lock-and-key policy where the software to be protected is locked using some encryption method (lock) and this lock requires a key to be unlocked. The key is called as registration code and the mechanism is called as registration mechanism in the software parlance. The registration mechanism may be implemented in many ways- software, hardware, or a combination of both. The way it is implemented makes the protection scheme more vulnerable or less vulnerable to piracy. The method of implementation also affects the user convenience to use the software. Some mechanisms are very convenient to the user but are more vulnerable to piracy. Some others are least vulnerable to piracy but are very inconvenient to the user. Different vendors choose different ways to implement the lock and unlock mechanism to make it as hard as possible to pirate their software. In this paper, we discuss several anti-piracy methods, the security issues related to them, and present a model which allows prevention of software piracy through a secure mechanism for software distribution.
Keywords
Optical Disc Software Piracy Hardware Device Software Vendor Brute Force MethodPreview
Unable to display preview. Download preview PDF.
References
- [1]Third Annual BSA and IDC Global Software Piracy Study. May 2006.Google Scholar
- [2]R. Akiyama, M. Yoshioka, and Y. Uchida. Software copying System. Sept. 1998. US Patent no. 5805699.Google Scholar
- [3]Alladin. HASP HL Hardware Key with 128-bit AES Encryption. http://www.alladin.com/HASP/HaspHL.asp.Google Scholar
- [4]Andy McFadden. CD-Recordable FAQ-Section 2. http://www.cdrfaq.org.Google Scholar
- [5]J. A. Barnard, M. A. Inchalik, and B. L. Ha. Copy protection using multiple security levels on a programmable CD-ROM. June 2006. US Patent no. 7057993.Google Scholar
- [6]A. N. Chandra, L. D. Comerford, and S. R. White. Implementing a shared higher level of privilege on personal computers for copy protection of software. Feb. 1987. US Patent no. 4644493.Google Scholar
- [7]J. P. DeMont. Method and apparatus for distributing information products. Nov. 1999. US Patent no. 5982889.Google Scholar
- [8]B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. CD-ROM with machine-readable I.D. code. Mar. 1995. US Patent no. 5400319.Google Scholar
- [9]B. A. Fite, M. L. Mitchell, R. A. Kunz, and C. R. Brannon. Using defect read from a disk to represent a machine readable code. Sept. 1998. US Patent no. 5805549.Google Scholar
- [10]T. Hasebe, R. Akiyama, and M. Yoshioka. Storage medium for preventing illegal use by third party. Sept. 1996. US Patent no. 5555304.Google Scholar
- [11]R. S. Indeck, W. Marcel, L. George, and A. L. Hege. Method and appartus for improved fingerprintingGoogle Scholar
- [12]H. Kanamaru. Information recording method and apparatus, function recording method and apparatus, and information reproducing method and apparatus. Aug. 1999. US Patent no. 5940505.Google Scholar
- [13]Y. Kanzaki, A. Monden, M. Nakamura, and K. Matsumoto. A Software Protection Method Based on Instruction Camouage. Electronics and Communications in Japan, 89(1), 2006. Translated from: Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J87-A, No. 6, June 2004, pp. 755-767.Google Scholar
- [14]Macrovision. Game Disc Protection. http://www.macrovision.com.Google Scholar
- [15]MAI Digital Security. USB Port Dongle. http://www.keylok.com/usb dongle.html.Google Scholar
- [16]Mentor Graphics. ModelSim- a comprehensive simulation and debug environment for complex ASIC and FPGA designs. http://www.model.com/.Google Scholar
- [17]C. H. O’Connor and J. J. Pearce. Method of securing CD-ROM daafor retrieval by one machine. Apr. 1998. US Patent no. 5745568.Google Scholar
- [18]Rockey. ROCKEY4 Hardware Based Securiy. http://www.rockey.com.my.Google Scholar
- [19]Sony, Copy Control for CD-ROM, with SecuROM. http://www.sonydadc.com/.Google Scholar
- [20]Fourth Annual BSA and IDC Global Software Piracy Study. 2007.Google Scholar