|
This is a list of notable copy protection schemes for various medias. == Computer Software protection schemes == ; Dongle : Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the hardware breaks. ; Product Activation : Requiring user to verify the license, often by entering a Product key in order to activate and use the software; some activation schemes require sending registration information over internet to prevent the same product key from being used by multiple users. In some cases, users are required to call a number to register and receive device-specific serial number. ; Bus encryption : Use of encrypted code together with Secure cryptoprocessor so only the machine with cryptoprocessor could execute the program; used in systems that require high security such as ATMs. ; iLok : Combines USB Dongle and an online registration system so the authorized users can user the software on multiple computers without registering each machine. ; Keyfile : A file with activation key that needs to be installed in same directory as software; similarly, a disc media (often installation disc) may be required as key disk for activation.〔Ashe, Philip R. "Copy protection for a recordable medium and for controlling a recorder." (Patent No. 6,070,799|http://www.google.ca/patents/US6070799?printsec=abstract&hl=ja&f=false#v=onepage&q&f=false ). 6 Jun. 2000.〕 ; Code Morphing : Hiding intermediate code by means of code obfuscation so that execution logic is not visible. This method does not protect against runtime tracing. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「List of copy protection schemes」の詳細全文を読む スポンサード リンク
|