Traitor tracing

Traitor tracing

Traitor tracing is an anti-piracy system which works by tracing the source of leaked files rather than by direct copy protection. The method is that the distributor adds a unique value to each copy given out. When a copy of it is leaked to the public, the distributor can check the value on it and trace it back to the "leaker".

Primary Methods

Activation Controls

The practice of traitor tracing is most often implemented with computer software, and evolved from the previous method of activation codes. In this model, software ships with a sticker or label printed on the outside of the software, but inside the package. This number is an encoded serial number, expanded to a usually large number or string of numbers, digits, and hyphens. When the software is being installed, or the first time it is run, the user is prompted to type in the license code. This code is then decoded back to its base serial number. This process reduces the number in complexity, and the additional information removed by this process is used to verify the authenticity of the serial number. If the user mistypes a single character in what is sometimes a very long code, the software will refuse to install and require them to retype the number until they get it right.

This activation code is generated during the packaging phase of manufacture, so that every user is receiving the same software but a different activation code. If a user performs a "casual copy" of the software for a friend, that friend must have the license code as well as the software to install it on their system. Since the software cannot determine that it is a copy, this is a way to beat this basic system.

With the expansion of computer networking, two additional levels of software protection have evolved, "network registration" and "online registration".

Network Registration

Software that employs this additional security keeps a copy of the actual serial number being used in the license code. When it is active, it is broadcasting this number on a clandestine channel on the local network. If the software has been installed on another computer on that same network, using the same license code, when the second copy is run it will detect its serial number in use on the network and typically will refuse to run. It may also cause the other copy of itself already in use to close. This prevents a small business from buying one copy of expensive software and installing it on several of the computers at their location, provided they are networked.

On-line Registration

The process is very similar to activation codes, but adds an additional step. Most modern companies are now not only internally networked, but are also connected to the internet. This allows the software manufacturers to add an additional check to their system during the installation process. When the user enters a valid license code, the software does not immediately install. Instead, it uses the active internet connection to contact a server being operated by the software manufacturer. The license code is transmitted to the server, and it waits for the server to tell it whether it's ok to install or not. The server maintains a database of all the serial numbers that have been used to install their software. If a single serial number is used on a number of machines (5 is a typical limit) then the server tells the software that it is likely a copy and to abort the installation. The user is usually presented with a dialog instructing them to contact the manufacturer.

Other Methods

Some software that implements online registration extends this with a process commonly known as "phoning home". In this case, the software, either each time it is used or at some preset interval such as monthly, makes another connection back to the registration server. It does this to check in with the server to see if the serial number it is using has been determined to be one that is being used to install in many places. Serial numbers that have been identified as "pirated" (illegally distributed) are added to a blacklist on the server, a process referred to as being "burned". Burned serial numbers cannot be used to install or activate the product. Serial number lists are available on the internet that include a large number of valid registration codes for many software titles. It's common for software manufacturers to seek out these lists and burn the serial numbers for their product that appear on these lists. This discourages individuals from giving out their registration codes for fear that their software will phone home and find the number has been burned, which will disable the software.

Some of the more expensive software requires the user to send personal information to the software vendor before receiving the activation code. The activation code is usually a large sequence of numbers and letters, and encodes information including the license serial number, information to ensure the code is valid, and also includes the ability to verify the personal information the user sent to the software vendor. In this way, his/her name or business name must be entered along with the registration code. The registration code will not be accepted by the software unless the user types in his/her business name exactly as submitted to the software vendor. The business name is usually displayed by the software on its opening banner whenever the software is used. If the customer gives away his activation code it will be useless without his business name, and anyone that uses the activation code must enter it in during the activation process, leaving the original buyer's business name on the banner of the software. This makes it very easy to "trace the traitor" and find the customer that originally gave out their activation code. Since giving away the registration code is a violation of the license agreement, the software vendor may burn the user's serial number (disabling his/her software in the process) and may take legal action against him/her as well. This does raise privacy concerns in some areas.


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Advanced Access Content System — AACS decryption process The Advanced Access Content System (AACS) is a standard for content distribution and digital rights management, intended to restrict access to and copying of the next generation of optical discs and DVDs. The specification …   Wikipedia

  • Digital watermarking — An image with visible digital watermarking the text Brian Kell 2006 is visible across the center of the image Digital watermarking is the process of embedding information into a digital signal which may be used to verify its authenticity or the… …   Wikipedia

  • AACS — Работа с оптическими дисками Оптический диск Образ оптического диска, ISO образ Эмулятор оптических дисководов Программное обеспечение для работы с файловыми системами оптических дисков Технологии записи Режимы записи Пакетная запись Типы… …   Википедия

  • Relational database — A visual diagram showing the relationship between the two tables, as indicated by the arrow A relational database matches data by using common characteristics found within the data set. The resulting groups of data uses the relational model (a… …   Wikipedia

  • Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… …   Wikipedia

  • Canary trap — A canary trap is a method for exposing an information leak, which involves giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked.The term was coined by Tom Clancy in his novel Patriot… …   Wikipedia

  • Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… …   Wikipedia

  • Broadcast encryption — is the cryptographic problem of encrypting broadcast content (e.g. TV programs) in such a way that only qualified users (e.g. subscribers who ve paid their fees) can decrypt the content. The challenge arises from the requirement that… …   Wikipedia

  • literature — /lit euhr euh cheuhr, choor , li treuh /, n. 1. writings in which expression and form, in connection with ideas of permanent and universal interest, are characteristic or essential features, as poetry, novels, history, biography, and essays. 2.… …   Universalium

  • List of Green Lanterns — The Green Lantern Corps that appear in fictional stories published by DC Comics has at least 7200 members, two per sector (originally 3600 with one per sector), in addition to assorted other members who fulfill roles other than patrolling.… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”