Computer Software protection schemes
; Dongle : Hardware key containing electronic serial number required to run the software; relatively expensive and has no recovery when the hardware breaks. ; Product Activation : Requiring user to verify the license, often by entering aCommercial CD/DVD protection schemes
Commercial Blu-ray Disc protection schemes
; AACS : The encrypted content can only be decrypted using combination of media key (obtained from Media Key Block by one of device keys available for each reproduction devices) and the Volume ID (unique identifiers stored on each disk) of the media. ; BD+ : The BD+ virtual machine embedded in authorized players will execute programs included in Blu-ray discs, allowing to verify the player's keys, transform the output so that content is unscrambled, and/or execute native code to patch the system against vulnerabilities. Based on concept of self-protecting digital content. ; ROM-Mark : Recorders will check for watermark that cannot be duplicated by consumer-level recorders, allowing authentic media for movies, musics and games.Digital Audio/Video Transmission protection schemes
; DTCP : Encrypts interconnection between devices so "digital home" technologies such as DVD players and televisions are restricted. ; HDCP : Transmitting device checks before sending that receiver is authorized to receive the data. The data is encrypted during transmission to prevent eavesdropping. ; Serial Copy Management System : Records in the sub code data bits that expresses whether the media is copy allowed(00), copy once(10) or copy prohibited(11). ; Traitor Tracing : Rather than directly preventing copying, embeds user information into files so if they are uploaded, the copyright holder could find out exactly who uploaded the file.Protection Schemes for Other Media
; CGMS-A (Analog Television Signals) : Inserts a waveform into the non-picture Vertical Blanking Interval (VBI) of the analog video signal so compatible device can block or restrict recording when the waveform is detected. ; Spiradisc (Floppy Disk) : Writes data on spiraling paths rather than in concentric circles. ; USB-Cops (USB-stick) : Using a normal USB-stick as a key.References
{{Reflist Digital rights management Compact Disc and DVD copy protection Copy protection