Docstoc

Intellectual Property Rights Intellectual Property Rights

Document Sample
Intellectual Property Rights Intellectual Property Rights Powered By Docstoc
					     Intellectual Property
             Rights

An Overview of Laws, Licenses and Copyright Protection

             A Presentation by Team 9
   Perhaps the Greatest Team Ever to Exist…EVER!

     Cole Hoosier, Alex Stampbach, Leanne Gray,
          Ryan Hannebaum, Matthew Cook
Intellectual Property
        Laws
          Intellectual Property
   an umbrella term for various legal
    entitlements which attach to certain types
    of information, ideas, or other intangibles
    in their expressed form
Software Copyright Infringement
   Several different types
       Creating a copy for resale
       “Bulletin board” sharing
       “Softlifting”
   Unauthorized copying as ethical choice
   Existing and proposed laws
       TRIPS
       EULA
       UCITA
      The Scope of the Problem
Rank                   Product                        Value
 1     Marijuana                                 141.80 Billion
 2     Counterfeit Technology Products           100 Billion
 3     Cocaine                                   70.45 Billion
 4     Opium/Heroin                              64.82 Billion
 5     Pirated Web Videos                        60 Billion
 6     Counterfeit Pharmaceutical Drugs          40 Billion
 7     Pirated Software                          34 Billion
 8     Human Trafficking                         32 Billion
 9     Amphetamines/Meth                         28.25 Billion
 10    Animals and Wildlife Smuggling            20 Billion


                 http://www.havocscope.com/products.htm
    Attempts to Stop the Problem
   Genuine Microsoft Software Tools
    (http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx)

       Genuine copies allow users to get updates
       “Customers who purchase counterfeit
        products could find they are missing key
        elements, such as user manuals, product
        keys, certificates of authenticity and even
        software code. They may also find that the
        counterfeit software contains viruses or does
        not work as well as the genuine product
        does.” (Microsoft Product Activation FAQ)
Software Distribution
                 Freeware
   Software is free to use
   No limitations are placed on the program
   Author may *ask* for donations, but won’t
    demand them
   Examples: Vim, several flash-type games
                 Shareware
   use is completely free
   product is not fully functional unless
    "unlocked“
   Unlocking usually is by entering a key that
    is purchased
   Example: WinZip
                 Demoware
   Type of shareware
   Feature set of the software is limited in
    some manner
   Examples: Can’t save state or program
    halts after 15 minutes
 Licensing
Mi casa es su casa?
    GNU General Public License
   Source is available
   “Copyleft”
       Uses copyright laws to ensure that modified
        versions retain the same freedoms
   Lesser (or Library) GPL
       Can be linked into non-GPL program
   Example: most software for Linux
          BSD-style Licenses
   Closer to public domain than GPL
   Has been called “copycenter”
   Allows proprietary commercial use, and for
    the software released under the license to
    be incorporated into proprietary
    commercial products
   Example: NetBSD
                MIT License
   Very (very) similar to the BSD-style
    licenses
   Example: X11 for Linux
Copyright Protection
             Security – Software
   Validation
       Key checks
       Registration
   Limitations
                 Validation
   Making the software legal
   Verifying the user has the proper rights to
    use the software
                Key checks
   Software requires you to enter a product
    key
   Software will not function without a valid
    key
   Only given a valid key when you purchase
    the software
                   Key checks
   Bnetd project
       Free online community
       Distributed open source code
       Bnetd allowed users to create chat rooms,
        connect to other users, and play games
       Blizzard uses battle.net but uses CD key
        checks
       Blizzard sued them because they didn’t check
        authenticity to the game
                CD Cracks
   CD crack codes can get around key checks
   Eliminate the use of a CD
               Registration
   Some products require you to register the
    product
   Registration can be used as a validation
    technique
   You have to have a registration to get
    updates
                    Limitations
   File Sharing
       Peer to Peer (P2P)
   Improve existing software
Protection Through Documents
   Passwords
       Dials
       Manuals
          “Bottom of Page 6”
          Hidden




   Vital Information
       Manual contains data necessary to use
        software
    Protection Through Hardware
   Dongles – 1980’s
       USB keys, Parallel
       Implementations
            Check for Dongle’s presence
            Store key parts of Program on Dongle


   CD Check

   Lenslok
       Hold a Prism up to Screen
www.zock.com
        Protection Through People
   “Honor System”
       Software reminds you that the free trial is
        over


   Propaganda
       Shorts before Movies
       Posters
       Fake MP3 files in Sharing Networks
Questions?

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:34
posted:3/6/2012
language:English
pages:27