Feeds

Israeli firm unveils the ‘copy-proof’ CD

Embedded smart card the secret

  • alert
  • submit to reddit

An Israeli security firm has developed a smart-card based copy protection technology that it claims can prevent software piracy.

The technology, called OpSecure from start-up firm Doc-Witness, features a smart card embedded within an optical disc, which can run on conventional PC CD or DVD drives.

However the embedded smart card, which is needed to decrypt the disc's content, will frustrate any attempts to copy the disc.

According to Doc-Witness, OpSecure provides a solution that solves the four aspects of software piracy: copying, sharing, counterfeiting, and faking IDs.

Burnt or replicated copies will not work, according to Doc-Witness, which says instructions on the smart card prevent software been installed on more machines than intended.

The company said the technology is impracticable to crack since it is hardware based and based on dynamic protection, rather than more easily defeat software or remote activation techniques.

That much remains to be seen, since the technology is yet to deployed commercially. OpSecure is designed to be easily implemented on traditional CD ROM / DVD ROM replication lines, however pricing of the technology will be another key factor in its success in the market. ®

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.