copy protection
Recently Published Documents


TOTAL DOCUMENTS

108
(FIVE YEARS 6)

H-INDEX

10
(FIVE YEARS 1)

Author(s):  
Scott Aaronson ◽  
Jiahui Liu ◽  
Qipeng Liu ◽  
Mark Zhandry ◽  
Ruizhe Zhang

2020 ◽  
Vol 10 (8) ◽  
pp. 2796 ◽  
Author(s):  
Raimarius Delgado ◽  
Jaeho Park ◽  
Cheonho Lee ◽  
Byoung Wook Choi

Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing. However, its feasibility is still in question due to two major drawbacks: safety and security. In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements. In this sense, we explore the real-time characteristics of Xenomai to guarantee strict temporal deadlines, and provide a viable method integrating Android processes to real-time tasks. Security is another issue that affects safety due to the increased connectivity in industrial systems provoking a higher risk of cyber and hardware attacks. Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. These policies ensure that the developed system is protected from physical tampering and unwanted Android applications. The articulacy of the administrative policies is demonstrated through experiments. The developed embedded system is connected to an industrial EtherCAT motion device network exhibiting operability on an actual industrial application. Real-time performance was evaluated in terms of schedulability and responsiveness, which are critical in determining the safety and reliability of the control system.


2020 ◽  
Vol 7 (4) ◽  
pp. 012-017
Author(s):  
S. V. Belim ◽  
◽  
S. N. Munko ◽  

An algorithm for embedding digital watermarks into the memory of the executable program is proposed. Digital watermarks are used for copy protection and copyright confirmation of digital objects. The proposed approach makes it possible to form a digital watermark in the operative memory of an executable program for a limited period of time. The address of the embedded information in RAM is random, which greatly complicates its detection and identification. Extraction of digital watermark is performed by passphrase. The embedding, extraction and removal of a digital watermark is implemented using a dynamic library, which is an integral part of the user authentication process, which prevents third-party removal of the digital watermark.


Author(s):  
Ilia V. Safonov ◽  
Ilya V. Kurilin ◽  
Michael N. Rychagov ◽  
Ekaterina V. Tolstaya
Keyword(s):  

2018 ◽  
Vol 28 (5) ◽  
pp. 464-469
Author(s):  
Jaeho Park ◽  
Raimarius Delgado ◽  
Cheonho Lee ◽  
Byoung Wook Choi

2017 ◽  
Vol 16 (1) ◽  
pp. 1-26
Author(s):  
Sang Hoo Bae ◽  
Myungsup Kim ◽  
Kyeongwon Yoo

Abstract The purpose of this paper is to investigate how digitalization affects vertically related content industries with the threat of piracy. We construct a model of vertical relationship where an upstream [a downstream] firm is considered as a content provider [a retailer]. Three business models are proposed depending on who has the right to implement digital rights management (DRM): a vertically-integrated entity, an upstream, and a downstream. First, we analyze how different modes of control on DRM affect the optimal prices and the level of copy protection. The results are dependent upon the different control modes of DRM and the degree of opportunistic behavior responding to increasing piracy costs. Second, we analyze the effect of two types of piracy depending on distribution channels (non-digital versus digital). Strengthening intellectual property rights (IPR) protection results in a price hike for both cases, while we have opposite changes in quantities depending on the types of piracy.


Sign in / Sign up

Export Citation Format

Share Document