Eight encryption methods protect disc data from theft

Source: Internet
Author: User
Keywords Optical disk data CSS encryption technology APS encryption technology DCPS technology CPPM Technology CPRM Technology CGMS Technology Shell encryption technology Disc dog technology
To prevent pirated software from infringing the software market, more and more software providers use encryption to protect their software. Although there are many ways to encrypt optical discs at present, the main principle is that some of the feature information on a special disc master is not reproducible, and most of these features are not data on the disc, and are not copied when the disc is copied. In order to enable us to have a certain understanding of the technology of the encryption disc, the following is a brief introduction to some newer encryption techniques. 1, CSS encryption technology in English all called content scrambling system, the Chinese meaning for the data jamming systems. The main idea of the technology is to set the Global compact disc to 6 regions, and each region for different technical encryption, only the region decoder with the optical drive to correctly handle the data on the disc. When you use this technology to encrypt, you first need to process all the information that is stored in the disc through the encoding program, and to access the encoded data, you must first decode the data. 2, APS encryption technology APS English is called Analog homeowner system, the Chinese meaning for analog signal protection system. The main purpose of this encryption technique is to prevent copying from CD to CD. APS encryption technology is mainly through a chip Macrovision 7, the use of special signals to affect the reproduction of the disc, so that the image of the disc produced transverse, contrast uneven and so on. Of course, when we use the computer to access the disc, if we want to output through the display card to the TV, then the display card must support the analogy encryption function, otherwise, will not be able to get the correct information, we can not enjoy the film on TV the excellent picture. 3, Disc Dog technology General optical disk encryption technology needs to make a special master, and then change the mother disk machine, so that the implementation of high costs do not say, but also spend a lot of time. For the above shortcomings, Disc Dog technology does not work on the motherboard manufacturing, so we are free to choose the disc factory to suppress the disc. The encryption technique can be used to distinguish between original and pirated discs by identifying the features on the disc. This feature is produced naturally when the disc is suppressed, that is, the disc pressed out by the same master disc features the same characteristics, and the disc is suppressed by different master discs even if the contents of the disc are identical, the characteristics of the disc is not the same. In other words, this feature is not able to be extracted and reproduced during the pirated discs. The disc dog is an excellent program for encrypting the optical disk software, and has passed the test of encryption performance and compatibility of China Software Evaluation Center. 4, Shell encryption technology so-called "shell" is to the executable file plus a shell. The user executes the program that is actually the shell, this shell is responsible for the user's original program in the storage to unlock the compression, and the control returned to the real program after the release, because all the work is in memory, users do not know and do not need to know its running process, and the speed of implementation has no effect. AsIn the shell, add the verification part of the software lock or key disk, which is what we call the shell encryption. In fact, the role of Shell encryption is more than this, in the internet there are many programs are specifically designed for the shell, it to the program compression or not compression, its main feature is reverse tracking, encryption code and data to protect the integrity of your program data. If you do not want your program code to be hacked, if your program does not want to be tracked and debugged, if your algorithm does not want to be statically analyzed by others, this shell is designed for you. 5, CGMS Technology CGMS technology is also called Content Copy management technology, the technology is mainly used to prevent the illegal copy of the disc. The technology is mainly to control the digital copy through the Generation management system, which is realized by the information stored on each CD. CGMs This "serial" copy, the build management system can either prevent the master software from copying or prevent copies of its child version software. In the case where normal copies are allowed, the equipment making the copy must also comply with the rules. Digital copy information can be encoded into the video signal, the purpose is to make the digital recording function is easy to identify. 6, DCPS technology The Chinese meaning of the technology is digital copy protection system technology, its main role is to make the digital connection between the parts, but do not allow digital copy. With this encryption technology, digitally connected devices, such as DVD players and digital televisions or digital video recorders, can exchange authentication keys to establish secure channels. The DVD player encrypts the encoded audio/video signal and sends it to the receiving device, which is decrypted by the receiving device. This prevents unauthorized connected devices from stealing signals. Content without copy protection is not encrypted. New content, such as new platters or radio programs, and new devices that contain updated keys and lists (used to identify non-certified devices) also have security features. 7, CPPM technology is the Chinese meaning of the technology for pre-recorded media content protection technology, which is generally used for dvd-audio. This technique replaces the CSS encryption technique by placing keys in the input area of the platter to encrypt the disc, but without the title key in the sector header, the disc key is replaced by ' album identifier '. The authentication scheme for this technique is the same as that of CSS, so existing devices need not be changed. 8, CPRM Technology is also known as the recording Media content protection technology, it will be the media and recording associated. The encryption principle of the technique is that a 64-bit platter ID is placed on the BCA on each blank recordable CD. When protected content is burned on a platter, it can be encrypted by a 56-bit password obtained by the platter ID. When access to the disc information is required, the disk ID is read from the BCA and the key required to decrypt the disc content is generated. If the disc content is copied to another medium, the disc ID will be lost or wrong and the data will notDecrypt。 In the current software market, we can find a lot of tools software, multimedia software, design software, teaching software, anti-virus software have adopted the software encryption technology. The use of these technologies, to a certain extent, protects the market interests of the software. The application of this encryption technology can create obstacles to the illegal copying or illegal use of software. However, scientifically speaking, there is no one kind of encryption software (hardware) in the world, can claim to eliminate the software to decrypt pirated, only difficult points. A good encryption effect is to allow the pirates to crack the protected software, pay a huge price, a great deal of time and energy, and eventually forced to give up the attack. So, when choosing a cryptographic product, it is irresponsible for a salesman to say that his product "will never be solved". The responsible editor Zhao Zhaoyi#51cto.com TEL: (010) 68476636-8001 give force (0 votes) to be tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) The original text: eight encryption methods to protect the disc data not stolen back to the column Recycle Bin Home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.