Download presentation
Presentation is loading. Please wait.
Published byVictoria Blair Modified over 9 years ago
1
Intellectual Property Rights An Overview of Laws, Licenses and Copyright Protection A Presentation by Team 9 Perhaps the Greatest Team Ever to Exist…EVER! Cole Hoosier, Alex Stampbach, Leanne Gray, Ryan Hannebaum, Matthew Cook
2
Intellectual Property Laws
3
an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form an umbrella term for various legal entitlements which attach to certain types of information, ideas, or other intangibles in their expressed form Intellectual Property
4
Software Copyright Infringement Several different types Several different types Creating a copy for resale Creating a copy for resale “Bulletin board” sharing “Bulletin board” sharing “Softlifting” “Softlifting” Unauthorized copying as ethical choice Unauthorized copying as ethical choice Existing and proposed laws Existing and proposed laws TRIPS TRIPS EULA EULA UCITA UCITA
5
The Scope of the Problem RankProductValue 1Marijuana 141.80 Billion 2 Counterfeit Technology Products 100 Billion 3Cocaine 70.45 Billion 4Opium/Heroin 64.82 Billion 5 Pirated Web Videos 60 Billion 6 Counterfeit Pharmaceutical Drugs 40 Billion 7 Pirated Software 34 Billion 8 Human Trafficking 32 Billion 9Amphetamines/Meth 28.25 Billion 10 Animals and Wildlife Smuggling 20 Billion http://www.havocscope.com/products.htm
6
Attempts to Stop the Problem Genuine Microsoft Software Tools Genuine Microsoft Software Tools (http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx) http://www.microsoft.com/resources/howtotell/ww/windows/default.mspx Genuine copies allow users to get updates Genuine copies allow users to get updates “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ) “Customers who purchase counterfeit products could find they are missing key elements, such as user manuals, product keys, certificates of authenticity and even software code. They may also find that the counterfeit software contains viruses or does not work as well as the genuine product does.” (Microsoft Product Activation FAQ)
7
Software Distribution
8
Freeware Software is free to use Software is free to use No limitations are placed on the program No limitations are placed on the program Author may *ask* for donations, but won’t demand them Author may *ask* for donations, but won’t demand them Examples: Vim, several flash-type games Examples: Vim, several flash-type games
9
Shareware use is completely free use is completely free product is not fully functional unless "unlocked“ product is not fully functional unless "unlocked“ Unlocking usually is by entering a key that is purchased Unlocking usually is by entering a key that is purchased Example: WinZip Example: WinZip
10
Demoware Type of shareware Type of shareware Feature set of the software is limited in some manner Feature set of the software is limited in some manner Examples: Can’t save state or program halts after 15 minutes Examples: Can’t save state or program halts after 15 minutes
11
Licensing Mi casa es su casa?
12
GNU General Public License Source is available Source is available “Copyleft” “Copyleft” Uses copyright laws to ensure that modified versions retain the same freedoms Uses copyright laws to ensure that modified versions retain the same freedoms Lesser (or Library) GPL Lesser (or Library) GPL Can be linked into non-GPL program Can be linked into non-GPL program Example: most software for Linux Example: most software for Linux
13
BSD-style Licenses Closer to public domain than GPL Closer to public domain than GPL Has been called “copycenter” Has been called “copycenter” Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Allows proprietary commercial use, and for the software released under the license to be incorporated into proprietary commercial products Example: NetBSD Example: NetBSD
14
MIT License Very (very) similar to the BSD-style licenses Very (very) similar to the BSD-style licenses Example: X11 for Linux Example: X11 for Linux
15
Copyright Protection
16
Security – Software Validation Validation Key checks Key checks Registration Registration Limitations Limitations
17
Validation Making the software legal Making the software legal Verifying the user has the proper rights to use the software Verifying the user has the proper rights to use the software
18
Key checks Software requires you to enter a product key Software requires you to enter a product key Software will not function without a valid key Software will not function without a valid key Only given a valid key when you purchase the software Only given a valid key when you purchase the software
19
Key checks Bnetd project Bnetd project Free online community Free online community Distributed open source code Distributed open source code Bnetd allowed users to create chat rooms, connect to other users, and play games Bnetd allowed users to create chat rooms, connect to other users, and play games Blizzard uses battle.net but uses CD key checks Blizzard uses battle.net but uses CD key checks Blizzard sued them because they didn’t check authenticity to the game Blizzard sued them because they didn’t check authenticity to the game
20
CD Cracks CD crack codes can get around key checks CD crack codes can get around key checks Eliminate the use of a CD Eliminate the use of a CD
21
Registration Some products require you to register the product Some products require you to register the product Registration can be used as a validation technique Registration can be used as a validation technique You have to have a registration to get updates You have to have a registration to get updates
22
Limitations File Sharing File Sharing Peer to Peer (P2P) Peer to Peer (P2P) Improve existing software Improve existing software
23
Protection Through Documents Passwords Passwords Dials Dials Manuals Manuals “Bottom of Page 6” “Bottom of Page 6” Hidden Hidden Vital Information Vital Information Manual contains data necessary to use software Manual contains data necessary to use software
24
Protection Through Hardware Dongles – 1980’s Dongles – 1980’s USB keys, Parallel USB keys, Parallel Implementations Implementations Check for Dongle’s presence Check for Dongle’s presence Store key parts of Program on Dongle Store key parts of Program on Dongle CD Check CD Check Lenslok Lenslok Hold a Prism up to Screen Hold a Prism up to Screen
25
www.zock.com
26
Protection Through People “Honor System” “Honor System” Software reminds you that the free trial is over Software reminds you that the free trial is over Propaganda Propaganda Shorts before Movies Shorts before Movies Posters Posters Fake MP3 files in Sharing Networks Fake MP3 files in Sharing Networks
27
Questions?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.