Feeds

Israeli firm unveils the ‘copy-proof’ CD

Embedded smart card the secret

  • alert
  • submit to reddit

An Israeli security firm has developed a smart-card based copy protection technology that it claims can prevent software piracy.

The technology, called OpSecure from start-up firm Doc-Witness, features a smart card embedded within an optical disc, which can run on conventional PC CD or DVD drives.

However the embedded smart card, which is needed to decrypt the disc's content, will frustrate any attempts to copy the disc.

According to Doc-Witness, OpSecure provides a solution that solves the four aspects of software piracy: copying, sharing, counterfeiting, and faking IDs.

Burnt or replicated copies will not work, according to Doc-Witness, which says instructions on the smart card prevent software been installed on more machines than intended.

The company said the technology is impracticable to crack since it is hardware based and based on dynamic protection, rather than more easily defeat software or remote activation techniques.

That much remains to be seen, since the technology is yet to deployed commercially. OpSecure is designed to be easily implemented on traditional CD ROM / DVD ROM replication lines, however pricing of the technology will be another key factor in its success in the market. ®

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.