| 
                           
                              | 
                                       Diane E. (Dione) Levine
                                          | Chapter 26 – | Piracy and Antipiracy Techniques |  
 Chapter Contents:
 
 
 
                                       
                                          |  | 26.1 |  | Introduction |  
                                          |  | 26.1.1 |  | Patent, Copyright, and Trademark Laws |  
                                          |  | 26.1.2 |  | Types of Piracy |  
                                          |  | 26.2 |  | Terminology |  
                                          |  | 26.3 |  | Hardware-based Antipiracy Techniques |  
                                          |  | 26.3.1 |  | Dongles |  
                                          |  | 26.3.2 |  | Specialized Readers |  
                                          |  | 26.3.2.1 |  | Audio |  
                                          |  | 26.3.2.2 |  | Video |  
                                          |  | 26.3.2.3 |  | TV (Analog) |  
                                          |  | 26.3.2.4 |  | Television (HDTV) |  
                                          |  | 26.3.2.5 |  | Specialized readers rejected by consumers |  
                                          |  | 26.3.3 |  | Evanescent Media |  
                                          |  | 26.4 |  | Software Keys |  
                                          |  | 26.4.1 |  | Examples |  
                                          |  | 26.4.1.1 |  | Video cassettes vs. copy machines |  
                                          |  | 26.4.1.2 |  | DVD area encoding |  
                                          |  | 26.4.2 |  | Implementation |  
                                          |  | 26.4.3 |  | Watermarks |  
                                          |  | 26.4.4 |  | Resistance to Reverse Engineering |  
                                          |  | 26.4.5 |  | Published Attacks |  
                                          |  | 26.5 |  | Software Usage Counters |  
                                          |  | 26.5.1 |  | Controlling Concurrent Installations |  
                                          |  | 26.5.2 |  | Controlling Concurrent Usage |  
                                          |  | 26.5.3 |  | Examples |  
                                          |  | 26.5.4 |  | Implementation |  
                                          |  | 26.6 |  | Digital Rights Management |  
                                          |  | 26.6.1 |  | Purpose |  
                                          |  | 26.6.2 |  | Application |  
                                          |  | 26.6.3 |  | Examples |  
                                          |  | 26.7 |  | Fundamental Problems |  
                                          |  | 26.8 |  | Summary |  
                                          |  | 26.9 |  | Notes |  
                                          |  | 26.10 |  | References |  
 |  | 
                  
                     |  |