Intellectual Property Rights Intellectual Property Rights by ewghwehws


									     Intellectual Property

An Overview of Laws, Licenses and Copyright Protection

             A Presentation by Team 9
   Perhaps the Greatest Team Ever to Exist…EVER!

     Cole Hoosier, Alex Stampbach, Leanne Gray,
          Ryan Hannebaum, Matthew Cook
Intellectual Property
          Intellectual Property
   an umbrella term for various legal
    entitlements which attach to certain types
    of information, ideas, or other intangibles
    in their expressed form
Software Copyright Infringement
   Several different types
       Creating a copy for resale
       “Bulletin board” sharing
       “Softlifting”
   Unauthorized copying as ethical choice
   Existing and proposed laws
       TRIPS
       EULA
       UCITA
      The Scope of the Problem
Rank                   Product                        Value
 1     Marijuana                                 141.80 Billion
 2     Counterfeit Technology Products           100 Billion
 3     Cocaine                                   70.45 Billion
 4     Opium/Heroin                              64.82 Billion
 5     Pirated Web Videos                        60 Billion
 6     Counterfeit Pharmaceutical Drugs          40 Billion
 7     Pirated Software                          34 Billion
 8     Human Trafficking                         32 Billion
 9     Amphetamines/Meth                         28.25 Billion
 10    Animals and Wildlife Smuggling            20 Billion

    Attempts to Stop the Problem
   Genuine Microsoft Software Tools

       Genuine copies allow users to get updates
       “Customers who purchase counterfeit
        products could find they are missing key
        elements, such as user manuals, product
        keys, certificates of authenticity and even
        software code. They may also find that the
        counterfeit software contains viruses or does
        not work as well as the genuine product
        does.” (Microsoft Product Activation FAQ)
Software Distribution
   Software is free to use
   No limitations are placed on the program
   Author may *ask* for donations, but won’t
    demand them
   Examples: Vim, several flash-type games
   use is completely free
   product is not fully functional unless
   Unlocking usually is by entering a key that
    is purchased
   Example: WinZip
   Type of shareware
   Feature set of the software is limited in
    some manner
   Examples: Can’t save state or program
    halts after 15 minutes
Mi casa es su casa?
    GNU General Public License
   Source is available
   “Copyleft”
       Uses copyright laws to ensure that modified
        versions retain the same freedoms
   Lesser (or Library) GPL
       Can be linked into non-GPL program
   Example: most software for Linux
          BSD-style Licenses
   Closer to public domain than GPL
   Has been called “copycenter”
   Allows proprietary commercial use, and for
    the software released under the license to
    be incorporated into proprietary
    commercial products
   Example: NetBSD
                MIT License
   Very (very) similar to the BSD-style
   Example: X11 for Linux
Copyright Protection
             Security – Software
   Validation
       Key checks
       Registration
   Limitations
   Making the software legal
   Verifying the user has the proper rights to
    use the software
                Key checks
   Software requires you to enter a product
   Software will not function without a valid
   Only given a valid key when you purchase
    the software
                   Key checks
   Bnetd project
       Free online community
       Distributed open source code
       Bnetd allowed users to create chat rooms,
        connect to other users, and play games
       Blizzard uses but uses CD key
       Blizzard sued them because they didn’t check
        authenticity to the game
                CD Cracks
   CD crack codes can get around key checks
   Eliminate the use of a CD
   Some products require you to register the
   Registration can be used as a validation
   You have to have a registration to get
   File Sharing
       Peer to Peer (P2P)
   Improve existing software
Protection Through Documents
   Passwords
       Dials
       Manuals
          “Bottom of Page 6”
          Hidden

   Vital Information
       Manual contains data necessary to use
    Protection Through Hardware
   Dongles – 1980’s
       USB keys, Parallel
       Implementations
            Check for Dongle’s presence
            Store key parts of Program on Dongle

   CD Check

   Lenslok
       Hold a Prism up to Screen
        Protection Through People
   “Honor System”
       Software reminds you that the free trial is

   Propaganda
       Shorts before Movies
       Posters
       Fake MP3 files in Sharing Networks

To top