WO2000055736A1 - Copy-protection on a storage medium by randomizing locations and keys upon write access - Google Patents
Copy-protection on a storage medium by randomizing locations and keys upon write access Download PDFInfo
- Publication number
- WO2000055736A1 WO2000055736A1 PCT/EP2000/002276 EP0002276W WO0055736A1 WO 2000055736 A1 WO2000055736 A1 WO 2000055736A1 EP 0002276 W EP0002276 W EP 0002276W WO 0055736 A1 WO0055736 A1 WO 0055736A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- block
- storage medium
- copy
- key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00507—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00557—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/10537—Audio or video recording
- G11B2020/10546—Audio or video recording specifically adapted for audio data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
Definitions
- the invention relates to a method for providing copy-protection to a data storage medium, in particular to solid state memory modules.
- a data storage medium in particular to solid state memory modules.
- Arguments in favor are based on weight, power and shockproofness considerations.
- ID unique identification code
- Known anti-copying solutions use a unique identification code (ID) that is 'engraved' in the storage medium. At some point in time, this may be disadvantageous because of privacy considerations. Furthermore, as will be explained below, methods which 5 mainly rely on such an ID do not provide adequate protection against a copying scheme known as a 'replay attack'.
- the present invention is particularly suited for solid state memory modules which provide easy random access to any location in the memory, be it on the basis of a bit, a byte or on some other entity such as a uniform sized sector that relates to the access width of the memory in question.
- the invention is characterized in that the data on the storage medium are encrypted with a key K which depends on the position (Li, L 2 , L 3 ) of the data on the storage medium, and that in each write operation the data is stored in locations on the storage medium that are chosen at random.
- the invention also relates to a system arranged for implementing a method as claimed in claim 1, a player for playing a recording prepared according to a method as claimed in claim 1, and a record carrier prepared according to a method as claimed in claim 1. Further advantageous aspects of the invention are recited in dependent Claims.
- Figure 1 shows a conceptual two-player arrangement
- Figure 2 illustrates the mechanism of 'replay attacks' in the prior art.
- Figure 3 shows a schematic diagram of a storage medium embodiment;
- Figure 4 shows an example of a file structure
- Figures 5A and 5B illustrate an example of a method in accordance with the invention and how this method prevents 'replay attacks'.
- Figures 6A and 6B illustrate a further example for a method in accordance with the invention.
- FIG 1 illustrates a conceptual two-player arrangement, with two players A and B, and a removable module C that may be transposed between the players. As shown, both players have appropriate means for inserting the module. In the rest of the discussion it is assumed that this removable module may be accessed by other means as well (e.g. PC based readers). This poses the risk of unauthorized copying of the data on the module, assuming that the players A and B do not allow unauthorized copying.
- the preferred embodiments are described in relation to a Solid State Audio player and module, although the invention may be used in a broader context. Within a few years, Solid State Audio (SSA) players are expected to become a new standard for portable audio playback devices.
- SSA Solid State Audio
- One of the tools for copy protection of digital content is encryption. While encryption by itself does not prevent illegal copying, it does render such copies useless, as the original content can be retrieved only by decrypting it using the proper key. As a result, playback of the content is limited to those devices that have access to that key. It is an objective of the copy protection system to manage the keys in such a way that illegal copying is prevented, while at the same time not inconveniencing legal and intended use of the content.
- Most of the memory modules for solid state multimedia storage applications comprise a large flash memory and an on-board controller. The controller may or may not be integrated, and multiple separate memory chips may be employed on the module.
- multimedia memory modules are: Memory Stick (Sony), SmartMedia (SSFDC Forum), Miniature Card (MC Forum), Compact Flash (PCMCIA Forum), Multimedia Card (MMC Association).
- these devices can be thought of as block devices, similar to hard disk drives, where memory accesses occur by addressing sectors (typically 512 bytes) on the module.
- sectors typically 512 bytes
- some of the modules listed above employ the ATA interface standard, which is used to connect hard disks and other peripherals to a PC. This enables easy duplication (bit by bit) of the content of such memory modules using a PC.
- Other modules use a proprietary interface and command set, but still are block based, i.e. individual sectors on the module can be addressed and modified.
- a SSA player employs detachable memory modules, which can be accessed by other means as well (e.g. PC based readers).
- One known solution is to embed a unique identification code (ID) in the memory module, which can be read by the application, but which can not be changed. This identification code can then be used to generate an encryption key, which is specific for the module.
- ID unique identification code
- Another known solution is to make use of defects in the memory modules, which naturally occur as a result of the manufacturing processes used to fabricate cheap but high storage capacity flash memories.
- the locations of these natural defects probably will be unique for each module, and as such can act as a 'fingerprint' of that device. Again, a unique key can be generated, which is specific for the module.
- a 'replay attack' is a form of copying in which an unauthorized copy is made from one system (system 1) to another (system 2), where the unauthorized (but unplayable copy) on system 2 can be used to restore a playable copy on system over and over again, even after expiration of the original copy.
- Figure 2 illustrates this in more detail.
- Each system comprises a unique identification code, represented by EDI for system 1 and ED2 for system 2, and contains files in which the content is stored as a sequence of separate blocks.
- the data in respect of rights and usage on the original copy are encrypted with a key that is derived from IDl and a secret S.
- Figure 3 represents a schematic diagram of a memory module embodiment 20.
- the storage area 30 has an access time that is substantially independent of the physical storage location.
- the controller 22 controls the access to the storage proper.
- Various subsystems have been shown therein, the host interface 24, the memory interface 26, and the file system 28. External write and internal selection to the memory are shown as well.
- the Application Programming Interface API the following functionality should be present.
- an optional volume number is outputted that is either uniquely fixed and hard-wired, or a random number that is generated each time the command is executed. This number may only be changed when executing the formatting command, thereby destroying all data on the device.
- the copy protection proper does not expressly need this number.
- a reusable file ID is produced for later referencing the file in question.
- a sector number is produced that is a random choice from the free block list.
- the sector number that is produced can be the actual sector number in which the data proper were stored during the write operation, or it can be the sector number will be stored during the next write operation. This amongst others is possible in solid state audio devices without appreciable loss of time because the flash memory is not hampered by a seek time as is common in disk based systems. Such random choice in addition helps to level wear over the entire device.
- the application may use or discard the sector number returned by the block write command as required.
- the file ID controls outputting the data proper and the sector number of the current or next block to be read.
- Figure 4 illustrates an example of a file structure, that is distributed into blocks, each having the size of a single sector of 512 bytes.
- the first block carries information regarding the file, while the others have the file data proper.
- the above organization will block the making of a bit wise copy of the module, inasmuch as no modification facility for individual sectors has been provided. Copying to an intermediate storage location and subsequently recopying the data on the module (which constitutes the 'replay attack' as explained above) will copy the data to completely different locations. This in itself provides some protection against copying. Copy protection is further provided by encrypting a data block through a key that is derived from a secret and also from the location (for instance and preferably the sector number) where the data in question is stored.
- the latter information may be derived from the block write function that returns the sector number of the next file sector. As this information is not available for the first block, the latter may be used for less sensitive data. This limitation is overcome by letting the file create function return the sector number of the first sector in the file where the data proper (e.g. the file info) will be written. For reading, the present or next sector number is available before reading of the actual data, allowing the application to calculate the proper decryption key in time.
- the encryption key thus combines the location of the storage, and a method that renders it impossible to predict this location. Copying will change the storage location, and in consequence will break the relation between location and decryption key.
- the secret used in the derivation of the key may be a globally shared secret between all players, or may be derived by other methods well known to those skilled in the art.
- Figures 5A and 5B illustrate a method in accordance with the invention. Each time data blocks are written, the controller 22 writes the data in randomly chosen locations. In Figures 5 A and 5B the locations are indicated by Li, L 2 etc. The data are encrypted with a key which is dependent on a secret S and a location L; or a combination of locations L, (for instance the location of the block that is written, or of the previous block, or of the block that is written and the previous block etc). Making a copy of the data of the memory module will (see Figure 5B) change in a irreproducible manner the locations of the data. In fact such will happen twice.
- FIGS. 6A and 6B show an embodiment of the invention in which all data are encrypted with a key K (which may consist of a single key or a block of keys), that itself is stored encrypted with a key K' , which is the output of a hash function having as arguments the locations Li, L 2 , L 3 etc and a secret S. K' thus depends on the positions of the data blocks, in this case on the total sequence in which the data blocks are written.
- K which may consist of a single key or a block of keys
- controller may be provided in the system apart from the memory module, preferably the controller unit by which the random locations are chosen is integrated in the memory module. This makes it difficult to circumvent the method or influence the choice of locations of data.
- the locations where the data, preferably arranged in blocks, are stored are chosen by a (preferably built-in) controller on a random basis.
- a controller preferably built-in controller on a random basis.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000605898A JP2002539557A (en) | 1999-03-15 | 2000-03-14 | Copy protection of storage media by randomizing location and key for write access |
EP00918799A EP1076857A1 (en) | 1999-03-15 | 2000-03-14 | Copy-potection on a storage medium by randomizing locations and keys upon write access |
CA002332008A CA2332008A1 (en) | 1999-03-15 | 2000-03-14 | A method and system for providing copy-protection on a storage medium by randomizing locations upon write access, and a player and a storage medium for use in such a system |
KR1020007012720A KR20010043582A (en) | 1999-03-15 | 2000-03-14 | Copy-protection on a storage medium by randomizing locations and keys upon write access |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99200776.5 | 1999-03-15 | ||
EP99200776 | 1999-03-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000055736A1 true WO2000055736A1 (en) | 2000-09-21 |
Family
ID=8239984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2000/002276 WO2000055736A1 (en) | 1999-03-15 | 2000-03-14 | Copy-protection on a storage medium by randomizing locations and keys upon write access |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1076857A1 (en) |
JP (1) | JP2002539557A (en) |
KR (1) | KR20010043582A (en) |
CA (1) | CA2332008A1 (en) |
WO (1) | WO2000055736A1 (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002025410A2 (en) * | 2000-09-15 | 2002-03-28 | Koninklijke Philips Electronics N.V. | Protect by data chunk address as encryption key |
JP2002132585A (en) * | 2000-10-20 | 2002-05-10 | Sony Corp | Information recording apparatus, information reproducing apparatus, information recording medium, information recording method, information reproducing method, and program providing medium |
WO2002047078A2 (en) * | 2000-12-05 | 2002-06-13 | Koninklijke Philips Electronics N.V. | System and method for protecting digital media |
WO2003034227A2 (en) * | 2001-10-12 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Apparatus and method for reading or writing user data |
WO2002095748A3 (en) * | 2001-05-22 | 2004-02-26 | Koninkl Philips Electronics Nv | Record carrier with hidden channel |
WO2005043396A2 (en) * | 2003-09-30 | 2005-05-12 | Infineon Technologies Ag | Word-individual key generation |
US7042489B2 (en) | 2000-09-08 | 2006-05-09 | Pandora International Limited | Image processing |
JP2006308635A (en) * | 2005-04-26 | 2006-11-09 | Kenwood Corp | Device and method for producing speech database, speech database, device and method for restoring speech segment, speech database, and program |
WO2008063965A2 (en) * | 2006-11-14 | 2008-05-29 | Mcm Portfolio Llc | Method and system to provide security implementation for storage devices |
WO2009088114A1 (en) * | 2008-01-11 | 2009-07-16 | Slim Disc Corp. | Drm method using bad pattern, and digital contents recorder/player and method using that |
US7657031B2 (en) | 2003-07-18 | 2010-02-02 | Oce Printing Systems Gmbh | Method and device for printing sensitive data |
US20100208890A1 (en) * | 2009-02-13 | 2010-08-19 | Tatsuya Igarashi | Content distribution apparatus, content use apparatus, content distribution system, content distribution method and program |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100712498B1 (en) * | 2003-06-21 | 2007-04-27 | 삼성전자주식회사 | Method for generating a random number in hard disc drive |
JP4620518B2 (en) * | 2005-04-26 | 2011-01-26 | 株式会社ケンウッド | Voice database manufacturing apparatus, sound piece restoration apparatus, sound database production method, sound piece restoration method, and program |
CN111847533A (en) * | 2020-05-25 | 2020-10-30 | 安徽普偌森环保科技有限公司 | Integrated domestic sewage treatment engineering management system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63211045A (en) * | 1987-02-27 | 1988-09-01 | Toshiba Corp | Portable electronic equipment |
JPH0278066A (en) * | 1988-09-13 | 1990-03-19 | Nec Corp | Flexible disk medium and its recording system |
EP0899733A1 (en) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | Optical disc copy management system |
-
2000
- 2000-03-14 EP EP00918799A patent/EP1076857A1/en not_active Withdrawn
- 2000-03-14 JP JP2000605898A patent/JP2002539557A/en active Pending
- 2000-03-14 WO PCT/EP2000/002276 patent/WO2000055736A1/en not_active Application Discontinuation
- 2000-03-14 KR KR1020007012720A patent/KR20010043582A/en not_active Application Discontinuation
- 2000-03-14 CA CA002332008A patent/CA2332008A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63211045A (en) * | 1987-02-27 | 1988-09-01 | Toshiba Corp | Portable electronic equipment |
JPH0278066A (en) * | 1988-09-13 | 1990-03-19 | Nec Corp | Flexible disk medium and its recording system |
EP0899733A1 (en) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | Optical disc copy management system |
Non-Patent Citations (2)
Title |
---|
PATENT ABSTRACTS OF JAPAN vol. 013, no. 001 (P - 808) 6 January 1989 (1989-01-06) * |
PATENT ABSTRACTS OF JAPAN vol. 014, no. 272 (P - 1060) 12 June 1990 (1990-06-12) * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7042489B2 (en) | 2000-09-08 | 2006-05-09 | Pandora International Limited | Image processing |
WO2002025410A3 (en) * | 2000-09-15 | 2003-03-20 | Koninkl Philips Electronics Nv | Protect by data chunk address as encryption key |
WO2002025410A2 (en) * | 2000-09-15 | 2002-03-28 | Koninklijke Philips Electronics N.V. | Protect by data chunk address as encryption key |
JP2002132585A (en) * | 2000-10-20 | 2002-05-10 | Sony Corp | Information recording apparatus, information reproducing apparatus, information recording medium, information recording method, information reproducing method, and program providing medium |
US7925017B2 (en) | 2000-10-20 | 2011-04-12 | Sony Corporation | Information recording device, information playback device, information recording medium, information recording method, information playback method, and program providing medium |
WO2002047078A2 (en) * | 2000-12-05 | 2002-06-13 | Koninklijke Philips Electronics N.V. | System and method for protecting digital media |
WO2002047078A3 (en) * | 2000-12-05 | 2002-09-19 | Koninkl Philips Electronics Nv | System and method for protecting digital media |
WO2002095748A3 (en) * | 2001-05-22 | 2004-02-26 | Koninkl Philips Electronics Nv | Record carrier with hidden channel |
KR100926962B1 (en) * | 2001-05-22 | 2009-11-17 | 유큐이, 엘엘씨 | Recording medium for storing digital works |
WO2003034227A2 (en) * | 2001-10-12 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Apparatus and method for reading or writing user data |
CN100364002C (en) * | 2001-10-12 | 2008-01-23 | 皇家飞利浦电子股份有限公司 | Apparatus and method for reading or writing user data |
WO2003034227A3 (en) * | 2001-10-12 | 2004-07-29 | Koninkl Philips Electronics Nv | Apparatus and method for reading or writing user data |
US7657031B2 (en) | 2003-07-18 | 2010-02-02 | Oce Printing Systems Gmbh | Method and device for printing sensitive data |
WO2005043396A3 (en) * | 2003-09-30 | 2005-07-07 | Infineon Technologies Ag | Word-individual key generation |
WO2005043396A2 (en) * | 2003-09-30 | 2005-05-12 | Infineon Technologies Ag | Word-individual key generation |
JP2006308635A (en) * | 2005-04-26 | 2006-11-09 | Kenwood Corp | Device and method for producing speech database, speech database, device and method for restoring speech segment, speech database, and program |
JP4620517B2 (en) * | 2005-04-26 | 2011-01-26 | 株式会社ケンウッド | Voice database manufacturing apparatus, sound piece restoration apparatus, sound database production method, sound piece restoration method, and program |
WO2008063965A2 (en) * | 2006-11-14 | 2008-05-29 | Mcm Portfolio Llc | Method and system to provide security implementation for storage devices |
WO2008063965A3 (en) * | 2006-11-14 | 2008-07-24 | Technology Properties Ltd | Method and system to provide security implementation for storage devices |
US7876894B2 (en) | 2006-11-14 | 2011-01-25 | Mcm Portfolio Llc | Method and system to provide security implementation for storage devices |
WO2009088114A1 (en) * | 2008-01-11 | 2009-07-16 | Slim Disc Corp. | Drm method using bad pattern, and digital contents recorder/player and method using that |
US20100208890A1 (en) * | 2009-02-13 | 2010-08-19 | Tatsuya Igarashi | Content distribution apparatus, content use apparatus, content distribution system, content distribution method and program |
Also Published As
Publication number | Publication date |
---|---|
JP2002539557A (en) | 2002-11-19 |
CA2332008A1 (en) | 2000-09-21 |
KR20010043582A (en) | 2001-05-25 |
EP1076857A1 (en) | 2001-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8296582B2 (en) | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system | |
KR100844998B1 (en) | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media | |
US6615192B1 (en) | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer | |
JP4198060B2 (en) | System for controlling use and copying of digital contents distributed by removable recording media | |
JP5362675B2 (en) | Key distribution by memory device | |
JP2005505873A (en) | Apparatus and method for reading or writing user data stored as blocks | |
US5646993A (en) | Information reproducing method and apparatus having protect function and recording medium used in apparatus | |
EA004199B1 (en) | Recordable storage medium with protected data area | |
RU2494447C2 (en) | Method to code memory stick and assembly for its realisation | |
EP1076857A1 (en) | Copy-potection on a storage medium by randomizing locations and keys upon write access | |
KR20120026974A (en) | Non volatile storage device for copy protection and authentication method thereof | |
RU2297677C2 (en) | Data carrier for digital product storage | |
JP2000298942A (en) | Disk storage device and copy preventing system applied to this device | |
EP1807835B1 (en) | Optical media with control data in wobble | |
MXPA00011207A (en) | Copy-protection on a storage medium by randomizing locations and keys upon write access | |
JP2002208216A (en) | Contents recording and reproducing device | |
EP1585127A2 (en) | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media | |
MXPA00011118A (en) | A method and system for providing copy-protection on a storage medium and storage medium for use in such a system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA JP KR MX US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000918799 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2332008 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007012720 Country of ref document: KR Ref document number: 09700373 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2000/011207 Country of ref document: MX |
|
WWP | Wipo information: published in national office |
Ref document number: 2000918799 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007012720 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000918799 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020007012720 Country of ref document: KR |