CHAPTER 42

PROTECTING DIGITAL RIGHTS: TECHNICAL APPROACHES

Robert Guess, Jennifer Hadley, Steven Lovaas, and Diane E. Levine

42.1 INTRODUCTION

42.1.1 Digital Rights

42.1.2 Patent, Copyright, and Trademark Laws

42.1.3 Piracy

42.1.4 Privacy

42.2 SOFTWARE-BASED ANTIPIRACY TECHNIQUES

42.2.1 Organizational Policy

42.2.2 Software Usage Counters

42.3 HARDWARE-BASED ANTIPIRACY TECHNIQUES

42.3.1 Dongles

42.3.2 Specialized Readers

42.3.3 Evanescent Media

42.3.4 Software Keys

42.4 DIGITAL RIGHTS MANAGEMENT

42.4.1 Purpose

42.4.2 Application

42.4.3 Examples

42.5 PRIVACY-ENHANCING TECHNOLOGIES

42.5.1 Network Proxy

42.5.2 Hidden Operating Systems

42.6 FUNDAMENTAL PROBLEMS

42.7 SUMMARY

42.8 GLOSSARY

42.9 FURTHER READING

42.10 NOTES

42.1 INTRODUCTION.

Ever since publishing and commerce were introduced to the digital world, the risks to intellectual property and to personal privacy in cyberspace have steadily escalated on comparable but separate paths. These paths have now converged. Unfortunately, many times, antipiracy efforts lead to possible breaches in personal privacy.

Efforts to stem the flow of pirated software worldwide remain mediocre in efficacy; piracy is still proving to be big business in the new millennium. According to the Business Software Alliance (BSA), a 2006 study shows that “thirty-five percent of the packaged software installed on personal computers (PC) worldwide in 2005 was illegal, amounting to $34 billion in global losses due to software piracy.”1 This single-year loss ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.