US20030169878A1 - Data protection system - Google Patents

Data protection system Download PDF

Info

Publication number
US20030169878A1
US20030169878A1 US10/217,994 US21799402A US2003169878A1 US 20030169878 A1 US20030169878 A1 US 20030169878A1 US 21799402 A US21799402 A US 21799402A US 2003169878 A1 US2003169878 A1 US 2003169878A1
Authority
US
United States
Prior art keywords
disc
sector
data
storage medium
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/217,994
Inventor
Anthony Miles
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
First 4 Internet Ltd
Original Assignee
First 4 Internet Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by First 4 Internet Ltd filed Critical First 4 Internet Ltd
Publication of US20030169878A1 publication Critical patent/US20030169878A1/en
Assigned to FIRST 4 INTERNET LIMITED, A CORPORATION OF UNITED KINGDOM reassignment FIRST 4 INTERNET LIMITED, A CORPORATION OF UNITED KINGDOM ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MILES, ANTHONY
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00188Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier
    • G11B20/00202Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised devices recording or reproducing contents to/from a record carrier wherein the copy protection scheme builds on multi-session recording, e.g. defective table of contents [TOC] in the 2nd session
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00253Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
    • G11B20/00333Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored in header data, e.g. in sector headers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00507Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00615Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the logical format of the recording medium, e.g. the structure of sectors, blocks, or frames
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00731Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
    • G11B20/00746Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
    • G11B20/00753Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of copies that can be made, e.g. CGMS, SCMS, or CCI flags
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • G11B20/00956Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches said intentional errors occurring due to an invalid TOC
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10527Audio or video recording; Data buffering arrangements
    • G11B2020/10537Audio or video recording
    • G11B2020/10546Audio or video recording specifically adapted for audio data

Definitions

  • optical disc media is intended to include not only CDs, CD-ROMs and DVDs, but also similar media that may be read using electromagnetic radiation outside of the visible range; for example, infra-red, ultra-violet or X-rays.
  • CD-R recordable CDs
  • U.S. Pat. No. 5,513,260 (Ryan) and U.S. Pat. No. 5,659,613 (Copeland) disclose a method of placing an authenticating signature on a legitimate copy that cannot easily be detected, and hence transferred to an illicit copy. New CD players would need a subsystem that searched for such a signature and if the signature should be there, but was not found, refuse to play the disc.
  • US 2002003880 A1 discloses a system where a recording of copyright material is encrypted and also has a digital watermark which is read by apparatus according to the invention, thereby allowing the replay apparatus to obtain a disk key and so decrypt the material.
  • US 20020001690 A1 discloses a method of manufacturing optical discs that includes areas on the disc with light-sensitive material. During the first pass of a conventional optical reader the digital information on such light sensitive areas is read correctly, but on a second pass the data is read differently due to the activation of the light sensitive material by the optical reader As most optical disc readers and players are pre-programmed to re-sample data areas to assure correct copying such discs will fail to copy correctly. While this method will work with many existing players, the inclusion of light sensitive areas at precise locations on the disc is expected to significantly increase disc production costs.
  • US 20010053979 A1 (Kori) describes an encryption protection system that encrypts copyright material, requiring the user to have the decrypting key, and also keeps a record of the number of copies made, so that a pre-determined limit can be placed on this.
  • determined copyists can with sufficient effort break such a single or double key systems. Further, this system appears unsuitable for replaying discs in most currently available players.
  • An object of some aspects of the present invention is to provide improved methods of protecting copyright digital data recorded on a data storage medium, particularly optical discs such as CDs. It is a further object of some aspects of the invention to provide a method of producing optical discs that provide such improved protection. It is also an object of some aspects of the present invention to provide an optical disc with such improved protection. A further object of some aspects of the invention is to provide a system that is effective when used with most players and computers presently available.
  • CD audio discs contain at least a first session formatted in compliance with the well known “Red Book”, also known as standard 908 of the International Electrotechnical Commission (IEC) entitled “Compact Disc Digital Audio System” (Geneva, Switzerland, 1987).
  • IEC International Electrotechnical Commission
  • the first session on the disc will normally contain audio tracks.
  • the Q-channel information contains the Table of Contents (TOC).
  • TOC Table of Contents
  • Each audio track on the first session is described in the TOC including where the track is located on the disc and the type of track.
  • the tracks are described as audio tracks.
  • such audio tracks are described as data tracks in the TOC.
  • a normal CD player does not reference this TOC but rather looks at Q-channel data in each sector within the session. This track area data is unaltered and conforms entirely to “Red Book” standard.
  • a further important aspect of the invention is the ability to play the optical disc on a computer. This is achieved by first compressing the audio tracks, then encrypting this data and recording this resulting data in a second session on to the optical disc, known as a data session.
  • this data is recorded in the following manner; the data is first split into logical block that will fit into a “Yellow Book” (IEC) standard CD sector (also known as a logical block). Each of these blocks is then encrypted using an encryption key derived from its logical block address (LBA) or position on the CD. The data resulting from this process is then written to the disc at this position (LBA) using conventional mastering and recording methods.
  • LBA logical block address
  • This compressed audio data is not visible to the host computer under normal circumstances.
  • the data is played on a personal computer, by including in this second session a “CD player application program” that is visible to the host computer. This player has built into it the ability to locate, decrypt and play the compressed and encrypted audio data.
  • At least one further data session is included on the disc.
  • operating systems such as Windows 95, 98, NT-4, 2000ME, 2000 Professional, 2000 Server, 2000 Server Professional, XP Home Edition, XP Professional, Linux 6.2 and higher, Apple Macintosh OS9 and higher, Sun Unix OS8; hereafter referred to as PCs.
  • This further session is located after the first “Red Book” compliant session and conforms to the IEC “Yellow Book” standard and the IEC “Orange Book” standard for multi-sessions.
  • This session contains the player application program and any associated files, which are visible to the computer operating system and also encrypted data files containing the audio tracks; these latter files not being visible to the computer operating system or playable, except by using the CD player application program provided on the disc.
  • Each sector on the disc normally contains 2048 bytes of consecutive encrypted digital data, each sector being encrypted with a different unlocking key.
  • This block size is dictated by the “Yellow Book” standard, but in principle data may be encrypted using any convenient block size. Obviously using too large a block size is undesirable as it would result in less variation in the encryption, this should be avoided.
  • the logical sector address (LBA) corresponding to the start of each audio track (LBA-tra) is known to the player application program this data being hidden within the player application program code or at a location on the disc known to the player application program, (hidden within the player code), if the data is located on the disc then the data will its self be encrypted, the information may also be spread over several consecutive or randomly addressed sectors.
  • a particular audio track will normally comprise many thousand consecutive sectors on the disc.
  • the audio data in each of these sectors will be encrypted with a different unlocking key.
  • the player application program contains an algorithm for deriving this unique key from the LBA corresponding to the start of each sector (LBA sec ).
  • LBA sec the start of each sector
  • this algorithm may take a variety of forms, as long as it generates a unique key from the LBA,
  • the player application program knows the LBA-tra, this is the same as LBA-sec for the first sector of the track and can derive the key from that LBA-sec to allow data from that first sector to be decrypted.
  • the player application program Having read the first sector the player application program knows that the next sector starts at the (LBA-sec) consecutive to the last LBA of the first sector. Knowing LBA-sec the player application program can use the said algorithm to derive the new key and so decrypt data in the second sector. In this way the player application program can decrypt consecutive sectors, each time deriving a new key. This is referred to below as a dynamic key code system.
  • the dynamic key code system has a number of advantages over known systems. If an unauthorised copier discovers both the LBA-tra and the first key it only allows the first sector (block) of digital audio data to be recovered. The key to the next consecutive sector will normally be completely different. Further, if by some means the consecutive encrypted sectors corresponding to a audio track are copied, for example to a PC hard disc and the player application program is run and directed to the first sector, it will generate wrong keys for each sector because it would need to know original the LBA-sec of the copied material. The sectors occupied on the PC hard disc will almost certainly differ from those on the original disc. Hence, the copied material will not be decrypted by the player software.
  • this data Prior to segmentation and encryption of the audio data, this data is preferably compressed using an appropriate compression algorithm.
  • a disc produced according to the invention contains hidden software that is activated when the PC operating system first accesses the storage medium; for example a CD, by reading the directory table of contents data, whereby a memory resident program, hereinafter called “the supervisory program” monitors access to the protected disc.
  • the supervisory program monitors access to the protected disc.
  • the supervisory program is removed from the memory of the PC.
  • the supervisory program is also designed to monitor the activity of the disc, including disc speed, disc access type (digital or audio) and also ensures reliable playback of the disc content.
  • the supervisory program In order to be able to monitor the disc activity, the supervisory program must insert its self or part of its self into the operating systems driver chain. Also the supervisory program will be in communication with the player application program that is allowed to “Play” the disc.
  • a driver chain is a computer operating system feature, where an application will communicate with the top part of the chain. This top part of the chain will communicate with the next layer down etc. Until finally the communication will reach, for example, the CD-ROM drive. Information from the CD-ROM drive will travel long the chain in the opposite direction. This mechanism is in place in the operating system in order to present to an application program, a standard way of communicating with a large variety of hardware devices.
  • the supervisory program inserts its self into this driver chain and can therefore monitor all communications from the application program to the CD-ROM drive.
  • the supervisory program can, for example calculate the average data transfer rate, the type of read operation that is being attempted etc, it also has the ability to identify the disc that is the target of this communication and as a result allow normal operation on a disc that is not protected by the system.
  • the supervisory program will simply not pass the communication on and will send a fictitious reply to the next higher part of the driver chain and therefore eventually to the application. It may for example chose to simply report an error to the application program or even supply blank or incorrect information. In this way any unauthorized access to a protected disc is blocked.
  • Storage medium according to the invention is only designed to be accessed in one way by a PC; that is using the player application program on the data session to read and decrypt data therein. If the disc is accessed in any other way the activity will be judged illegal and interventionary action will be taken by the supervisory program. Normally, the supervisory program will stop such activity and the disc will be ejected from the computer drive. This role of the supervisory program will not prevent the copying of an ordinary disc and will not interfere with the general performance and/or activities of the computer.
  • Access to the first session on the disc by for example a CD copying utility, will not be allowed by the supervisory program which monitors the position of the read head and can thus identify if data other than session data is being accessed.
  • This method monitors the current average disc speed. If the average speed is outside given acceptable parameters then disc access is blocked. Speed monitoring is accomplished by the supervisory program.
  • the present invention requires special software to control the disc mastering machine or alternatively a CD-R, CD-RW, DVD-R or DVD-RW disc drive.
  • This will be referred to below as CD Production Software (or CDPS).
  • CDPS needs to pre-determine the LBA (LBA-tra and LBA-sec) of each sector of data corresponding to any data sessions on the disc. It then selects a particular algorithm and derives the unique encryption key for each sector. Following compression of the audio files and division of the digital data into consecutive segments of audio data, each of these segments is encrypted within a data sector.
  • LBA LBA-tra and LBA-sec
  • the system of the invention also allows the algorithm that derives a key from a LBA-tra or LBA-sec to be varied if desired for each master disc produced.
  • routine variations in the algorithm used for manufacturing a given master disc can result in completely different keys being derived for a given LBA.
  • the CDPS will modify the code of the player application program that is also placed on the disc so that it contains the correct algorithm; that is the algorithm used in the encryption step, thus allowing the player application program to decrypt the data session.

Abstract

A method of manufacturing digital data storage medium comprising the steps of: segmenting copyright material in digital form into consecutive segments, allocating each segment to a sector of the storage medium, pre-determining the position of each sector on the storage medium and using an algorithm to derive a unique encryption key for each sector according to the logical block address corresponding to the start of each sector, encrypting each sector using its unique key, and writing the encrypted data sectors to the said storage medium.

Description

    BACKGROUND OF THE INVENTION
  • This invention concerns apparatus, methods and articles manufactured thereby for preventing theft of copyright material, particularly as recorded in digital form on carrier means such as optical disc media. In this description optical disc media is intended to include not only CDs, CD-ROMs and DVDs, but also similar media that may be read using electromagnetic radiation outside of the visible range; for example, infra-red, ultra-violet or X-rays. [0001]
  • The advent of recordable CDs (CD-R) has made it generally easy and inexpensive to make unauthorised copies of Audio CDs and CD-ROMs; for example by copying the entire contents of a audio CD to a computer hard disc and then writing this to a CD-R. The potential loss of revenue to recording companies from such activities is considerable, and indeed its impact has already been felt. Consequently, there has been much interest in techniques that prevent such unauthorised copying. [0002]
  • U.S. Pat. No. 5,513,260 (Ryan) and U.S. Pat. No. 5,659,613 (Copeland) disclose a method of placing an authenticating signature on a legitimate copy that cannot easily be detected, and hence transferred to an illicit copy. New CD players would need a subsystem that searched for such a signature and if the signature should be there, but was not found, refuse to play the disc. [0003]
  • US 20010054028 A1 (Kuroda) describes the addition of copy control information to copyright material, such that when an attempt is made to copy this material using reproduction and recording apparatus according to the invention such copying is prevented, if appropriate, on the basis of the copy control and information and also attribution information generated by the reproduction apparatus. [0004]
  • US 2002003880 A1 (Kato) discloses a system where a recording of copyright material is encrypted and also has a digital watermark which is read by apparatus according to the invention, thereby allowing the replay apparatus to obtain a disk key and so decrypt the material. [0005]
  • All of the above methods and systems suffer from the disadvantage that they do not prevent unauthorised copying of a CD and replay of that copy on most existing CD players; that is they require new players equipped with appropriate hardware. [0006]
  • US 20020001690 A1 (Selinfreund) discloses a method of manufacturing optical discs that includes areas on the disc with light-sensitive material. During the first pass of a conventional optical reader the digital information on such light sensitive areas is read correctly, but on a second pass the data is read differently due to the activation of the light sensitive material by the optical reader As most optical disc readers and players are pre-programmed to re-sample data areas to assure correct copying such discs will fail to copy correctly. While this method will work with many existing players, the inclusion of light sensitive areas at precise locations on the disc is expected to significantly increase disc production costs. [0007]
  • US 20010053979 A1 (Kori) describes an encryption protection system that encrypts copyright material, requiring the user to have the decrypting key, and also keeps a record of the number of copies made, so that a pre-determined limit can be placed on this. However, determined copyists can with sufficient effort break such a single or double key systems. Further, this system appears unsuitable for replaying discs in most currently available players. [0008]
  • SUMMARY OF THE INVENTION
  • An object of some aspects of the present invention is to provide improved methods of protecting copyright digital data recorded on a data storage medium, particularly optical discs such as CDs. It is a further object of some aspects of the invention to provide a method of producing optical discs that provide such improved protection. It is also an object of some aspects of the present invention to provide an optical disc with such improved protection. A further object of some aspects of the invention is to provide a system that is effective when used with most players and computers presently available.[0009]
  • DETAILED DESCRIPTION OF THE INVENTION
  • CD audio discs contain at least a first session formatted in compliance with the well known “Red Book”, also known as standard 908 of the International Electrotechnical Commission (IEC) entitled “Compact Disc Digital Audio System” (Geneva, Switzerland, 1987). [0010]
  • According to one aspect of the invention slight deviations from strict “Red Book” compliance are introduced into this first session to prevent most CD-ROM drives reading the data. Thus, the first session on the disc will normally contain audio tracks. In the lead in area of the disc, the Q-channel information contains the Table of Contents (TOC). Each audio track on the first session is described in the TOC including where the track is located on the disc and the type of track. In a conventional CD the tracks are described as audio tracks. In a disc according to the invention such audio tracks are described as data tracks in the TOC. A normal CD player does not reference this TOC but rather looks at Q-channel data in each sector within the session. This track area data is unaltered and conforms entirely to “Red Book” standard. Hence, such a disc will play normally in a standard “Red Book” audio CD player. However, when such a disc is read by a CD-ROM drive the drive will reference the TOC and will then recognise a discrepancy between the TOC data and that Q-channel data within each sector of the track. This contradiction normally results in an “illegal mode for this track”, that prevents the CD-ROM drive reading the track. [0011]
  • Specifically, the TOC describes the tracks in the audio session as data tracks, control=4 (0100 binary). Normally they would be described as audio tracks, control=0 (0000 binary) (see “Red Book”, p41). [0012]
  • No amendments are made to the well known Cross Interleave Reed-Solomon Code (CIRC) error protection data on the protected disc. [0013]
  • A further important aspect of the invention is the ability to play the optical disc on a computer. This is achieved by first compressing the audio tracks, then encrypting this data and recording this resulting data in a second session on to the optical disc, known as a data session. [0014]
  • For a CD this data is recorded in the following manner; the data is first split into logical block that will fit into a “Yellow Book” (IEC) standard CD sector (also known as a logical block). Each of these blocks is then encrypted using an encryption key derived from its logical block address (LBA) or position on the CD. The data resulting from this process is then written to the disc at this position (LBA) using conventional mastering and recording methods. This compressed audio data is not visible to the host computer under normal circumstances. The data is played on a personal computer, by including in this second session a “CD player application program” that is visible to the host computer. This player has built into it the ability to locate, decrypt and play the compressed and encrypted audio data. [0015]
  • To enable protected discs to be played on computers using operating systems such as Windows 95, 98, NT-4, 2000ME, 2000 Professional, 2000 Server, 2000 Server Professional, XP Home Edition, XP Professional, Linux 6.2 and higher, Apple Macintosh OS9 and higher, Sun Unix OS8; hereafter referred to as PCs, at least one further data session is included on the disc. [0016]
  • This further session is located after the first “Red Book” compliant session and conforms to the IEC “Yellow Book” standard and the IEC “Orange Book” standard for multi-sessions. This session contains the player application program and any associated files, which are visible to the computer operating system and also encrypted data files containing the audio tracks; these latter files not being visible to the computer operating system or playable, except by using the CD player application program provided on the disc. [0017]
  • Thus, when a protected disc is viewed by a PC file manager only the player application program and any files directly associated with the program will be visible. [0018]
  • Each sector on the disc normally contains 2048 bytes of consecutive encrypted digital data, each sector being encrypted with a different unlocking key. This block size is dictated by the “Yellow Book” standard, but in principle data may be encrypted using any convenient block size. Obviously using too large a block size is undesirable as it would result in less variation in the encryption, this should be avoided. The logical sector address (LBA) corresponding to the start of each audio track (LBA-tra) is known to the player application program this data being hidden within the player application program code or at a location on the disc known to the player application program, (hidden within the player code), if the data is located on the disc then the data will its self be encrypted, the information may also be spread over several consecutive or randomly addressed sectors. A particular audio track will normally comprise many thousand consecutive sectors on the disc. The audio data in each of these sectors will be encrypted with a different unlocking key. The player application program contains an algorithm for deriving this unique key from the LBA corresponding to the start of each sector (LBA[0019] sec). The skilled person will realize that this algorithm may take a variety of forms, as long as it generates a unique key from the LBA, Thus, when a track is selected the player application program knows the LBA-tra, this is the same as LBA-sec for the first sector of the track and can derive the key from that LBA-sec to allow data from that first sector to be decrypted. Having read the first sector the player application program knows that the next sector starts at the (LBA-sec) consecutive to the last LBA of the first sector. Knowing LBA-sec the player application program can use the said algorithm to derive the new key and so decrypt data in the second sector. In this way the player application program can decrypt consecutive sectors, each time deriving a new key. This is referred to below as a dynamic key code system.
  • The dynamic key code system has a number of advantages over known systems. If an unauthorised copier discovers both the LBA-tra and the first key it only allows the first sector (block) of digital audio data to be recovered. The key to the next consecutive sector will normally be completely different. Further, if by some means the consecutive encrypted sectors corresponding to a audio track are copied, for example to a PC hard disc and the player application program is run and directed to the first sector, it will generate wrong keys for each sector because it would need to know original the LBA-sec of the copied material. The sectors occupied on the PC hard disc will almost certainly differ from those on the original disc. Hence, the copied material will not be decrypted by the player software. [0020]
  • Prior to segmentation and encryption of the audio data, this data is preferably compressed using an appropriate compression algorithm. [0021]
  • Preferably, a disc produced according to the invention contains hidden software that is activated when the PC operating system first accesses the storage medium; for example a CD, by reading the directory table of contents data, whereby a memory resident program, hereinafter called “the supervisory program” monitors access to the protected disc. When the disc is removed the supervisory program is removed from the memory of the PC. The supervisory program is also designed to monitor the activity of the disc, including disc speed, disc access type (digital or audio) and also ensures reliable playback of the disc content. [0022]
  • In order to be able to monitor the disc activity, the supervisory program must insert its self or part of its self into the operating systems driver chain. Also the supervisory program will be in communication with the player application program that is allowed to “Play” the disc. A driver chain is a computer operating system feature, where an application will communicate with the top part of the chain. This top part of the chain will communicate with the next layer down etc. Until finally the communication will reach, for example, the CD-ROM drive. Information from the CD-ROM drive will travel long the chain in the opposite direction. This mechanism is in place in the operating system in order to present to an application program, a standard way of communicating with a large variety of hardware devices. [0023]
  • The supervisory program inserts its self into this driver chain and can therefore monitor all communications from the application program to the CD-ROM drive. The supervisory program can, for example calculate the average data transfer rate, the type of read operation that is being attempted etc, it also has the ability to identify the disc that is the target of this communication and as a result allow normal operation on a disc that is not protected by the system. [0024]
  • If an operation that is not allowed is attempted then the supervisory program will simply not pass the communication on and will send a fictitious reply to the next higher part of the driver chain and therefore eventually to the application. It may for example chose to simply report an error to the application program or even supply blank or incorrect information. In this way any unauthorized access to a protected disc is blocked. [0025]
  • Storage medium according to the invention is only designed to be accessed in one way by a PC; that is using the player application program on the data session to read and decrypt data therein. If the disc is accessed in any other way the activity will be judged illegal and interventionary action will be taken by the supervisory program. Normally, the supervisory program will stop such activity and the disc will be ejected from the computer drive. This role of the supervisory program will not prevent the copying of an ordinary disc and will not interfere with the general performance and/or activities of the computer. [0026]
  • Thus, if an “illegal” activity such as the digital extraction of disc data to hard disk drive, is detected by the supervisory program that command will be blocked. Likewise, if the player application program is not open, or is closed by the user while the disc is still in the CD-ROM drive then an eject command is sent to the drive. [0027]
  • Access to the first session on the disc, by for example a CD copying utility, will not be allowed by the supervisory program which monitors the position of the read head and can thus identify if data other than session data is being accessed. [0028]
  • If in the unlikely event that a disk copying utility is able to read the first (audio) session of the disc, then the supervisory program will not permit the digital extraction command used by ASPI, ATAPI and other disk command control drivers to be used. [0029]
  • This method monitors the current average disc speed. If the average speed is outside given acceptable parameters then disc access is blocked. Speed monitoring is accomplished by the supervisory program. [0030]
  • When a disc is being played in a PC using the player software the average playback speed of the disc will be very low, since compressed data is being read at real time. Typically data is compressed at a ratio of about 10 to 1, i.e. ten times smaller than the un compressed data; normal playback of the original data would result in a disc speed of one, therefore the average disc speed when playing the compressed data over the same period of time will be about {fraction (1/10)} speed in this case. [0031]
  • Because the compressed data is read from the disc in blocks at a high speed (Burst speed), followed by a much longer period of inactivity, speed monitoring will need to measure the average disc speed. The burst speed could in fact be anything up to and including the maximum read speed of the disc, but for very short periods. So called “ripping software” typically will try to copy at the highest speed possible for a sustained period of time. If disc is moving at a high speed on average then access will be blocked (average speeds will need to be calculated over periods in the order of ten seconds). If player application program is not playing the disc then all access to the disc is blocked. [0032]
  • The present invention requires special software to control the disc mastering machine or alternatively a CD-R, CD-RW, DVD-R or DVD-RW disc drive. This will be referred to below as CD Production Software (or CDPS). The CDPS needs to pre-determine the LBA (LBA-tra and LBA-sec) of each sector of data corresponding to any data sessions on the disc. It then selects a particular algorithm and derives the unique encryption key for each sector. Following compression of the audio files and division of the digital data into consecutive segments of audio data, each of these segments is encrypted within a data sector. Thus, when the master disc is produced each sector of data in the data session or sessions, is uniquely encrypted and placed at the pre-determined LBA, so allowing the LBA-sec to be used by a player application program to decrypt and play that sector. [0033]
  • The system of the invention also allows the algorithm that derives a key from a LBA-tra or LBA-sec to be varied if desired for each master disc produced. Advantageously, routine variations in the algorithm used for manufacturing a given master disc can result in completely different keys being derived for a given LBA. The CDPS will modify the code of the player application program that is also placed on the disc so that it contains the correct algorithm; that is the algorithm used in the encryption step, thus allowing the player application program to decrypt the data session. [0034]

Claims (14)

We claim:
1. A method of manufacturing an optical disc for storing digital data comprising the steps of: (a) segmenting copyright material in digital form into consecutive segments (b) allocating each segment to a sector of the disc (c) pre-determining the position of each sector on the disc and using an algorithm to derive a unique encryption key for each sector according to the logical block address corresponding to the start of each sector (d) encrypting each sector using its unique key, and (d) writing the encrypted data sectors to a disc.
2. Recorded material on an optical disc comprising digital data segmented into consecutive sectors each containing encrypted data, the data in each sector being encrypted using a unique key, the unique key for each sector being dependent upon the logical block address on the disc corresponding to the start of each sector.
3. Optical disc player software containing embedded within its code the logical block address on the disc of the first sector corresponding to a file or track, decryption software operated by a key and an algorithm for determining the unique key for each sector from the logical block address corresponding to the start of that sector.
4. A method of reading encrypting digital data from a disc comprising the steps of (a) decrypting data in consecutive sectors each using a unique key (b) the unique key for each sector being dependent upon the logical block address on the disc corresponding to the start of that sector.
5. A method of preventing a computer copying audio sessions on an optical disc including the steps of (a) describing the audio session as data tracks in the Table of Contents contained within the Q-channel information in the lead in area of the disc, (b) describing the audio session in the Q-channel data in each sector within the session as audio tracks.
6. A method of monitoring whether a disc according to the invention is being accessed in an authorized way comprising the steps of (a) including software for a supervisory program on the said disc (b) activating this supervisory program when the computer operating system first accesses the disc, (b) insertion of all or part of the supervisory program into the operating systems driver chain that allows two way communication between an application program accessing the disc and the disc drive (d) using the supervisory program to monitor communications between the said application program and the disc drive.
7. A method according to claim 6 comprising (e) describing an audio session as data tracks in the Table of Contents contained within the Q-channel information in the lead in area of the disc, (f) describing the audio session in the Q-channel data in each sector within the session as audio tracks.
8. A method according to claim 6 wherein any application attempting to access data other than the data session or sessions on the disc will be judged illegal and blocked by the supervisory program.
9. A method according to claim 6 wherein any program other than the player application program accessing the disc will be judged illegal and blocked by the supervisory program.
10. A method according to claim 6 wherein the current average disc speed is monitored by the supervisory program and if this average speed does not fall within a range determined by the supervisory program blocking access of the application program to the disc by the supervisory program.
11. A method according to claim 6 where access is blocked by the supervisory program not relaying the communication along the driver chain or relaying a fictitious communication.
12. A method of manufacturing digital data storage medium comprising the steps of: (a) segmenting copyright material in digital form into consecutive segments (b) allocating each segment to a sector of the storage medium (c) pre-determining the position of each sector on the storage medium and using an algorithm to derive a unique encryption key for each sector according to the logical block address corresponding to the start of each sector (d) encrypting each sector using its unique key, and (d) writing the encrypted data sectors to the said storage medium.
13. A method of reading encrypting digital data from a storage medium comprising the steps of (a) decrypting data in consecutive sectors each using a unique key (b) the unique key for each sector being dependent upon the logical block address on the storage medium corresponding to the start of that sector.
14. A method of monitoring whether a storage medium according to the invention is being accessed in an authorized way comprising the steps of (a) including software for a supervisory program on the storage medium (b) activating this supervisory program when the computer operating system first accesses the storage medium, (b) insertion of all or part of the supervisory program into the operating systems driver chain that allows two way communication between an application program accessing the storage medium and a storage medium read/write unit (d) using the supervisory program to monitor communications between the said application program and the storage medium read/write unit.
US10/217,994 2002-03-08 2002-08-12 Data protection system Abandoned US20030169878A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0205459A GB2386245B (en) 2002-03-08 2002-03-08 Data protection system
GB0205459.1 2002-03-08

Publications (1)

Publication Number Publication Date
US20030169878A1 true US20030169878A1 (en) 2003-09-11

Family

ID=9932566

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/217,994 Abandoned US20030169878A1 (en) 2002-03-08 2002-08-12 Data protection system
US10/506,964 Expired - Fee Related US7774850B2 (en) 2002-03-08 2003-03-10 Copy protection system for data carriers

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/506,964 Expired - Fee Related US7774850B2 (en) 2002-03-08 2003-03-10 Copy protection system for data carriers

Country Status (12)

Country Link
US (2) US20030169878A1 (en)
EP (1) EP1493156B1 (en)
JP (1) JP4711628B2 (en)
KR (1) KR20040104491A (en)
CN (1) CN100489987C (en)
AT (1) ATE398328T1 (en)
AU (1) AU2003215740B2 (en)
CA (1) CA2478372A1 (en)
DE (1) DE60321555D1 (en)
GB (2) GB2386245B (en)
NZ (1) NZ535110A (en)
WO (1) WO2003077246A2 (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020126597A1 (en) * 2001-03-09 2002-09-12 Lg Electronics Inc. Read-only recording medium and reproducing method thereof
US20030133386A1 (en) * 2001-12-06 2003-07-17 Ttr Technologies Inc. Copy-protected compact disc and method for producing same
US20030172295A1 (en) * 2002-03-01 2003-09-11 Onspec Electronics, Inc. Device and system for allowing secure identification of an individual when accessing information and a method of use
US20040109393A1 (en) * 2002-12-06 2004-06-10 Yehuda Hahn Copy-protected compact disc and method for producing same
US20040151320A1 (en) * 2002-11-11 2004-08-05 Sony Corporation Authoring apparatus, authoring program, authoring program, and recording medium on which authoring program has been recorded
US20040184611A1 (en) * 2003-01-10 2004-09-23 Heylen Richard A. A. Copy protection of digital data
US20040199855A1 (en) * 2001-07-03 2004-10-07 Heylen Richard A. A. Copy-protected digital audio compact disc, and method and system for producing same
US20050015706A1 (en) * 1997-12-01 2005-01-20 Macrovision Europe Limited Codeword for use in digital optical media and a method of generating therefor
US20050078822A1 (en) * 2003-10-08 2005-04-14 Eyal Shavit Secure access and copy protection management system
US20050099921A1 (en) * 2003-11-07 2005-05-12 Macrovision Corporation Copy protection of optical discs
US20060101283A1 (en) * 2002-06-05 2006-05-11 Kim Jin Y High-density optical disc, method for recording and reproducing encrypted data thereon
US20080114994A1 (en) * 2006-11-14 2008-05-15 Sree Mambakkam Iyer Method and system to provide security implementation for storage devices
US20080181406A1 (en) * 2007-01-30 2008-07-31 Technology Properties Limited System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key
US20080184035A1 (en) * 2007-01-30 2008-07-31 Technology Properties Limited System and Method of Storage Device Data Encryption and Data Access
US20090077284A1 (en) * 2006-06-30 2009-03-19 Mcm Portfolio Llc System and Method for Enhancing External Storage
US20090196427A1 (en) * 2008-01-31 2009-08-06 International Business Machines Corporation System and computer program product for protecting audio content
US20090198932A1 (en) * 2008-02-01 2009-08-06 Seagate Technology Llc Secure direct platter access
US20090196417A1 (en) * 2008-02-01 2009-08-06 Seagate Technology Llc Secure disposal of storage data
US20090199015A1 (en) * 2008-01-31 2009-08-06 International Business Machines Corporation Method for protecting audio content
US20090207706A1 (en) * 2002-06-05 2009-08-20 Jin Yong Kim Recording medium with a Linking area including dummy data thereon and apparatus and methods for forming, recording,and reproducing the recording medium
US20100031057A1 (en) * 2008-02-01 2010-02-04 Seagate Technology Llc Traffic analysis resistant storage encryption using implicit and explicit data
US7685646B1 (en) * 2003-09-10 2010-03-23 Realnetworks, Inc. System and method for distributing protected audio content on optical media
US20130305046A1 (en) * 2012-05-14 2013-11-14 Computer Associates Think, Inc. System and Method for Virtual Machine Data Protection in a Public Cloud
US8891773B2 (en) * 2013-02-11 2014-11-18 Lsi Corporation System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
US10504550B2 (en) 2018-03-06 2019-12-10 Kabushiki Kaisha Toshiba Magnetic disk device configured to write parity data that is based on data being written to a parity sector when no error is detected in writing the data being written

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7065506B1 (en) 1999-11-19 2006-06-20 Macrovision Corporation Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
US7281273B2 (en) * 2002-06-28 2007-10-09 Microsoft Corporation Protecting content on medium from unfettered distribution
GB0216142D0 (en) * 2002-07-11 2002-08-21 Knox Alistair J Method and apparatus for optical disc access control
GB2402802B (en) * 2003-06-09 2007-05-30 First 4 Internet Ltd Copy protection system for data carriers
GB2433157B (en) * 2003-06-09 2007-11-21 First 4 Internet Ltd Copy protection system for data carriers
US7584353B2 (en) * 2003-09-12 2009-09-01 Trimble Navigation Limited Preventing unauthorized distribution of media content within a global network
US8006313B1 (en) * 2004-01-23 2011-08-23 The Math Works, Inc. Non-machine specific optical-media based copy protection
WO2005076138A1 (en) * 2004-02-03 2005-08-18 Sydney Gordon Low A content player
US8059937B2 (en) 2004-02-19 2011-11-15 Rovi Solutions Corporation Relating to the copy protection of optical discs
GB0403719D0 (en) 2004-02-19 2004-03-24 Macrovision Europ Ltd Improvements in or relating to the defeat of the copy protection of optical discs
US8087091B2 (en) * 2004-07-08 2011-12-27 Media Rights Technologies Method and system for preventing unauthorized reproduction of electronic media
JP4715233B2 (en) * 2005-02-25 2011-07-06 ソニー株式会社 Information processing apparatus, information recording medium manufacturing method, and computer program
EP1875651A4 (en) * 2005-04-01 2011-11-23 Ged I Ltd A method for data storage protection and encryption
KR100717060B1 (en) * 2005-12-05 2007-05-10 삼성전자주식회사 Method and apparatus for utilizing dvd contents through home network
US20070147612A1 (en) * 2005-12-22 2007-06-28 Simon Forrest Deriving cryptographic keys
US8595794B1 (en) 2006-04-13 2013-11-26 Xceedium, Inc. Auditing communications
US20080279077A1 (en) * 2007-05-09 2008-11-13 Macrovision Corporation Apparatus for and a method of enabling copying a copy-protected recording medium
GB2449647B (en) 2007-05-29 2010-01-13 Fortium Technologies Ltd Optical discs
GB2457482B (en) * 2008-02-14 2012-10-03 Fortium Technologys Ltd Copy protection system for optical discs
CA2961191A1 (en) 2013-11-13 2015-05-21 Ivan Sutovsky A method of protection of optical media, such as cds and dvds against unauthorised copying and a non-standard optical audio disc and video disc with protection against loading andplaying in personal computers and matrices for making thereof
US10177912B2 (en) 2014-05-09 2019-01-08 Sony Corporation Content individualization

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5661800A (en) * 1994-03-18 1997-08-26 Fujitsu, Limited Method and manufacture for preventing unauthorized use by judging the corresponding relationship between logical and physical addresses
US5717535A (en) * 1995-01-25 1998-02-10 Seagate Technology, Inc. Block address integrity check for storage medium
US20020073326A1 (en) * 2000-09-15 2002-06-13 Fontijn Wilhelmus Franciscus Johannes Protect by data chunk address as encryption key
US6687828B1 (en) * 1995-08-11 2004-02-03 Sony Corporation Method and apparatus for ciphering playback mode information for recording on record medium
US6865431B1 (en) * 1999-05-28 2005-03-08 Matsushita Electric Industrial Co., Ltd. Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5596639A (en) * 1993-07-26 1997-01-21 Elonex Ip Holdings Ltd. Cd-prom
JP3473135B2 (en) 1993-11-10 2003-12-02 松下電器産業株式会社 Digital information transmission system
KR100375494B1 (en) * 1993-12-28 2003-03-10 마쯔시다덴기산교 가부시키가이샤 Optical disk, system for reproducing optical disk, and system for recording information
JPH07235130A (en) 1994-02-21 1995-09-05 Sanyo Electric Co Ltd Recording medium provided with copy protection and its reproducing apparatus
JP3449804B2 (en) 1994-10-31 2003-09-22 株式会社ソニー・ディスクテクノロジー Data recording method, data recording device, data reproducing method, and data recording medium
JP3467964B2 (en) 1995-08-10 2003-11-17 ソニー株式会社 Data recording device and method, data reproducing device and method, recording medium, and data transmission method
SE514352C2 (en) 1996-07-05 2001-02-12 Ifunga Test Equipment Bv Ways to provide an optical data carrier with identity information
JP3220387B2 (en) 1996-09-30 2001-10-22 日立ソフトウエアエンジニアリング株式会社 Disk copy protection method, disk reading mechanism, and disk recording medium
WO1998052194A1 (en) * 1997-05-16 1998-11-19 Imation Corp. Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information
JP2000105970A (en) 1998-09-29 2000-04-11 Nec Home Electronics Ltd Copy preventing method for cd-rom
US6425098B1 (en) * 1998-10-20 2002-07-23 Midbar Tech (1998) Ltd. Prevention of disk piracy
US6988206B1 (en) * 1998-10-20 2006-01-17 Macrovision Europe Limited Prevention of CD-audio piracy using sub-code channels
US6665489B2 (en) * 1999-04-21 2003-12-16 Research Investment Network, Inc. System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server
GB9912312D0 (en) 1999-05-26 1999-07-28 Dilla Limited C The copy protection of digital audio compact discs
WO2001080546A2 (en) * 1999-08-09 2001-10-25 Midbar Tech Ltd. Prevention of cd-audio piracy using sub-code channels
WO2001046952A2 (en) * 1999-12-21 2001-06-28 Lockstream Corp. Digital content security
JP2000348435A (en) 2000-01-01 2000-12-15 Ii D Kontoraibu Kk Method of recording information, information-recording apparatus, information recording medium and illegal replica thereof
GB0003530D0 (en) * 2000-02-15 2000-04-05 Dilla Limited C The copy protection of digital audio compact discs
JP3508680B2 (en) * 2000-02-24 2004-03-22 日本電気株式会社 Content illegal copy prevention method and system
CA2441817A1 (en) * 2001-03-19 2002-09-26 Sunncomm, Inc. Apparatus and method for digital content concealment
US6952479B2 (en) * 2001-11-27 2005-10-04 Macrovision Europe Limited Dynamic copy protection of optical media
JP3389989B2 (en) 2001-12-28 2003-03-24 日本ビクター株式会社 Information recording medium, information recording medium reproducing method, and information recording medium recording method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5661800A (en) * 1994-03-18 1997-08-26 Fujitsu, Limited Method and manufacture for preventing unauthorized use by judging the corresponding relationship between logical and physical addresses
US5717535A (en) * 1995-01-25 1998-02-10 Seagate Technology, Inc. Block address integrity check for storage medium
US6687828B1 (en) * 1995-08-11 2004-02-03 Sony Corporation Method and apparatus for ciphering playback mode information for recording on record medium
US6865431B1 (en) * 1999-05-28 2005-03-08 Matsushita Electric Industrial Co., Ltd. Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium
US20020073326A1 (en) * 2000-09-15 2002-06-13 Fontijn Wilhelmus Franciscus Johannes Protect by data chunk address as encryption key

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015706A1 (en) * 1997-12-01 2005-01-20 Macrovision Europe Limited Codeword for use in digital optical media and a method of generating therefor
US7181673B2 (en) 1997-12-01 2007-02-20 Macrovision Europe Limited Codeword for use in digital optical media and a method of generating therefor
US7619961B2 (en) 2001-03-09 2009-11-17 Lg Electronics Inc. Read-only recording medium and reproducing method thereof
US20020126597A1 (en) * 2001-03-09 2002-09-12 Lg Electronics Inc. Read-only recording medium and reproducing method thereof
US20080205222A1 (en) * 2001-03-09 2008-08-28 Jin Yong Kim Read-only recording medium and reproducing method thereof
US7656778B2 (en) 2001-03-09 2010-02-02 Lg Electronics, Inc. Apparatus and method of reproducing data stored in a read-only recording medium
US20040199855A1 (en) * 2001-07-03 2004-10-07 Heylen Richard A. A. Copy-protected digital audio compact disc, and method and system for producing same
US7151730B2 (en) 2001-12-06 2006-12-19 Macrovision Europe Limited Copy-protected compact disc and method for producing same
US20030133386A1 (en) * 2001-12-06 2003-07-17 Ttr Technologies Inc. Copy-protected compact disc and method for producing same
US20030172295A1 (en) * 2002-03-01 2003-09-11 Onspec Electronics, Inc. Device and system for allowing secure identification of an individual when accessing information and a method of use
US20090303862A1 (en) * 2002-06-05 2009-12-10 Jin Yong Kim Recording medium with a linking area including a synch pattern thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US20090303863A1 (en) * 2002-06-05 2009-12-10 Jin Yong Kim Recording medium with a linking area thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US20090207706A1 (en) * 2002-06-05 2009-08-20 Jin Yong Kim Recording medium with a Linking area including dummy data thereon and apparatus and methods for forming, recording,and reproducing the recording medium
US8351315B2 (en) 2002-06-05 2013-01-08 Lg Electronics Inc. Recording medium with a linking area including a synch pattern thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US8014248B2 (en) 2002-06-05 2011-09-06 Lg Electronics Inc. Recording medium with a linking area including dummy data thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US7872960B2 (en) 2002-06-05 2011-01-18 Lg Electronics Inc. Recording medium with a linking area thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US20100008210A1 (en) * 2002-06-05 2010-01-14 Jin Yong Kim Recording medium with a linking area thereon and apparatus and methods for forming, recording, and reproducing the recording medium
US20060101283A1 (en) * 2002-06-05 2006-05-11 Kim Jin Y High-density optical disc, method for recording and reproducing encrypted data thereon
US7599279B2 (en) 2002-06-05 2009-10-06 Lg Electronics Inc. High-density optical disc, method for recording and reproducing encrypted data thereon
US20040151320A1 (en) * 2002-11-11 2004-08-05 Sony Corporation Authoring apparatus, authoring program, authoring program, and recording medium on which authoring program has been recorded
US20040109393A1 (en) * 2002-12-06 2004-06-10 Yehuda Hahn Copy-protected compact disc and method for producing same
US7161885B2 (en) 2002-12-06 2007-01-09 Macrovision Corporation Copy-protected compact disc and method for producing same
US20040184611A1 (en) * 2003-01-10 2004-09-23 Heylen Richard A. A. Copy protection of digital data
US7685646B1 (en) * 2003-09-10 2010-03-23 Realnetworks, Inc. System and method for distributing protected audio content on optical media
US20050078822A1 (en) * 2003-10-08 2005-04-14 Eyal Shavit Secure access and copy protection management system
US20050099921A1 (en) * 2003-11-07 2005-05-12 Macrovision Corporation Copy protection of optical discs
US20090077284A1 (en) * 2006-06-30 2009-03-19 Mcm Portfolio Llc System and Method for Enhancing External Storage
US20080114994A1 (en) * 2006-11-14 2008-05-15 Sree Mambakkam Iyer Method and system to provide security implementation for storage devices
US7876894B2 (en) * 2006-11-14 2011-01-25 Mcm Portfolio Llc Method and system to provide security implementation for storage devices
US20080184035A1 (en) * 2007-01-30 2008-07-31 Technology Properties Limited System and Method of Storage Device Data Encryption and Data Access
US20080181406A1 (en) * 2007-01-30 2008-07-31 Technology Properties Limited System and Method of Storage Device Data Encryption and Data Access Via a Hardware Key
US20090199015A1 (en) * 2008-01-31 2009-08-06 International Business Machines Corporation Method for protecting audio content
US20090196427A1 (en) * 2008-01-31 2009-08-06 International Business Machines Corporation System and computer program product for protecting audio content
US7978853B2 (en) * 2008-01-31 2011-07-12 International Business Machines Corporation System and computer program product for protecting audio content
US7974411B2 (en) * 2008-01-31 2011-07-05 International Business Machines Corporation Method for protecting audio content
US20090198932A1 (en) * 2008-02-01 2009-08-06 Seagate Technology Llc Secure direct platter access
US20100031057A1 (en) * 2008-02-01 2010-02-04 Seagate Technology Llc Traffic analysis resistant storage encryption using implicit and explicit data
US8103844B2 (en) 2008-02-01 2012-01-24 Donald Rozinak Beaver Secure direct platter access
US20090196417A1 (en) * 2008-02-01 2009-08-06 Seagate Technology Llc Secure disposal of storage data
US20130305046A1 (en) * 2012-05-14 2013-11-14 Computer Associates Think, Inc. System and Method for Virtual Machine Data Protection in a Public Cloud
US8838968B2 (en) * 2012-05-14 2014-09-16 Ca, Inc. System and method for virtual machine data protection in a public cloud
US8891773B2 (en) * 2013-02-11 2014-11-18 Lsi Corporation System and method for key wrapping to allow secure access to media by multiple authorities with modifiable permissions
US10504550B2 (en) 2018-03-06 2019-12-10 Kabushiki Kaisha Toshiba Magnetic disk device configured to write parity data that is based on data being written to a parity sector when no error is detected in writing the data being written

Also Published As

Publication number Publication date
US20050223240A1 (en) 2005-10-06
CN100489987C (en) 2009-05-20
GB2415826B (en) 2006-06-07
US7774850B2 (en) 2010-08-10
EP1493156B1 (en) 2008-06-11
JP4711628B2 (en) 2011-06-29
EP1493156A2 (en) 2005-01-05
WO2003077246A3 (en) 2004-09-02
ATE398328T1 (en) 2008-07-15
WO2003077246A2 (en) 2003-09-18
GB2415826A (en) 2006-01-04
KR20040104491A (en) 2004-12-10
CA2478372A1 (en) 2003-09-18
CN1647188A (en) 2005-07-27
GB0205459D0 (en) 2002-04-24
GB0519281D0 (en) 2005-11-02
DE60321555D1 (en) 2008-07-24
JP2005519421A (en) 2005-06-30
AU2003215740A1 (en) 2003-09-22
NZ535110A (en) 2007-07-27
GB2386245A (en) 2003-09-10
AU2003215740B2 (en) 2009-06-04
GB2386245B (en) 2005-12-07

Similar Documents

Publication Publication Date Title
US20030169878A1 (en) Data protection system
US7792001B2 (en) Copy protection system for optical disc having a confusion pattern
US6070799A (en) Copy protection for a recordable medium and for controlling a recorder
JP5007243B2 (en) Method for controlling the use and copying of digital content distributed by removable recording media
JP3888473B2 (en) Copy protection method for record carrier, copy protected record carrier and method for detecting access control information
JP2005519421A5 (en)
EA004199B1 (en) Recordable storage medium with protected data area
US20130064055A1 (en) Copy Protection System for Data Carriers
US20060123483A1 (en) Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media
KR100912097B1 (en) Processing copy protection signals
EP2120236B1 (en) Optical media with control data in wobble
KR100530172B1 (en) Encryption method using of optical disk recording and reproducing method and apparatus
US7624285B2 (en) Method and device for protecting user information against manipulations
KR100419432B1 (en) Copy Protected Optical Disc Manufacturing Method and Copy Protected Optical Disc
JP2003228909A (en) Optical disk recording and reproducing system, drive unit, recording and reproducing method, and optical disk

Legal Events

Date Code Title Description
AS Assignment

Owner name: FIRST 4 INTERNET LIMITED, A CORPORATION OF UNITED

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MILES, ANTHONY;REEL/FRAME:014834/0088

Effective date: 20030404

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION