Wednesday, January 23, 2008

Safenet Sentinel Usb Format

protection technologies for resource-based

Dear Reader,

The protection of intellectual resources using technical tools can be traced back far in history be. As one of the oldest protection techniques is the Skytale of Sparta (circa 500 BC) used for transmission of confidential military intelligence was used. For the same purpose-developed German cryptographer in World War II became known cipher machine Enigma. The objectives of such use cryptography or Steganografieverfahren have not changed much over time. Basically it's about limiting the diffusion of sensitive and valuable information, such as business secrets, to a fixed set of people. Unauthorized third parties will be the inter-pre-documentation and utilization of information per se impossible (User control).

But this is not the only area of application of protection technologies. They can also be used for disability and detection of fraudulent appropriation of intellectual achievements use (access control). Some access and access technologies that are used for authentication of authorized persons and for the identification and analysis of very fraudulent attempts will be presented later. Again, other protective mechanisms may aim to control the modification and copying of innovative and creative works (change and diffusion control). This manifests itself in others, that

  • pirated copies are unusable after the reproduction operation or after a certain time,
  • imitation and plagiarism are different from originals, which should simplify the claims investigation, or
  • of reproductive effort is increased so that it bears no reasonable relationship to the economic benefits of counterfeiting or the opportunity cost of the permitted appropriation.

The interim conclusion is noted: the owner and creator try using of technical protection mechanisms, the exercise of property rights to prevent its results of creative work by unauthorized third parties and / or to identify such behavior. The respective measures designed in particular to make it more difficult to abuse so and to accelerate its exposure of the associated costs and risks are high and discourage injury trials. It will thus increase the willingness of interested parties relating to intellectual property of designated market players charged. At the same time consumers and competitors are limited in their ability to use permits or illegally acquired goods in harmful intention to reproduce and give weiterzu. Technical protection does these points with the A-policy objectives in line with laws. Nevertheless rights holders resulting from the misuse of their intellectual property protected technically liable for any compensation for any possible benefit loss. This requires necessarily accompany by legal arrangements.

As developments in industrial processes are subject to the protection of intellectual property are very dynamic and diverse, this section can only offer an overview of some of the most topical protection and detection technologies. To simplify their subsequent economic evaluation is given to the previously taken Systematization of the control functions used.

access control

for the control of access to creative services can use different technologies. One of the simplest and widely used solutions to protect mass-marketable results of intellectual activities include software-based queries of key information on registration numbers and passwords. Actors who have received this information, according to their input access to defined areas of intellectual resources. Another method for people qualified - is the authentication test key physical carriers such as CDs, floppy disks, dongle or memory card. Owner of this key carrier must, in order to see protected results of intellectual work, can be read before this special equipment. Is it or its registration with the identifier stored in the system match, access is enabled. The advantage over purely informative key is to lower risk of forgetting and of uncontrolled diffusion of key information. A disadvantage may prove to be the transport of key support between different access points, for example, the change of Dongeln between multiple computers. Another disadvantage is the fact that readers usually can not distinguish between duplicated or passed on key physical media. Pro-repeal these problems, was more recently begun to refer to individual characteristics of different body of people for authentication.

addition, there are no less relevant technologies, whose job it is to exclude the intrusion into computer networks for unauthorized access to intellectual resources is stored. These include so-called firewalls. These included systems compare with each network access information

  • requested to Content, such as programs, records and documents
  • for user identity, for example, the name of the user, and / or
  • to the access point, for example, serial number of the user terminals.

Can not the information collected will be verified, protected areas of the network remain locked. As a complement or alternative to firewall solutions provide intrusion detection programs, ways to diagnose the unauthorized use of networks. These programs are specifically looking for abnormalities in the normal operation of data processing, trace their causes and effects and to determine the starting point the Normwidrigkeit.

usage control

suitable addition to access control, various authentication technologies, to monitor the use and modification of intellectual property. For example, the law on the inspection of program source code, or the copying of music CDs from the input of an identifier may be made. As appropriate technology for securing the distribution of information in unprotected or difficult to be protected channels and to control the consumption of valuable intellectual achievements is the cryptography. In this case, text, image and audio files from the transmitter prior to transmission of special mostly highly complex mathematical algorithms coded. Only selected recipients who have paid for the use or otherwise obtained an authorization to use get the algorithm and the technologies necessary for decoding. Users, which the algorithm is unknown, should theoretically not be able to interpret the encrypted intellectual resources. A sufficiently well-known example of the commercial use of cryptographic methods is the German pay-TV channel Premiere World.

change and diffusion control

A new and is in practice even less common in the literature under protection technology The term digital watermark discussed. Here is additional information that you hiding in digital media content, or fragments thereof for users not usually noticeable. For illegal acts, such as during the manufacture of pirated copies, certain features are changed the watermark. In this way, can be identified digital replicas and original intellectual property clearly attributed to a creator. With the assistance of specific testing mechanisms, it is also possible with this technology to trace the development of digital copies over several phases copy (first copy, copy the first copy) to the original, the more clues to the identity of wrongdoers to obtain. In addition, once identified piracy on networked computers will be automatically deleted or destroyed. For technical support of such an approach is offered by the use of intelligent agents. Originally designed for the infor-mation search-designed in peripheral databases that can provide these programs repurpose such that they search

  • in computer networks based on modified digital watermark
  • according to a strategy of escalation rights holders claims information and
  • unauthorized copies unusable . Make

The following table summarizes the aforementioned technical protection mechanisms for intellectual property. It also includes examples of selected examples that are absorbed selectively in the further analysis. prevent


0 comments:

Post a Comment