摘要:
A method and apparatus for restricting the use of a disc are provided. In this method, first, lead-in data is read out from a loaded disc. Then, a user key is read out from a lead-in area of the disc. Thereafter, the user key undergoes authentication based on a user key received from a host. The authentication is performed by comparing a random number produced by a disc drive with a decrypted random number obtained by the disc drive decrypting a random number encrypted by the host. Accordingly, the use of the disc by an unauthorized third person is restricted, thus preventing a leakage of personal information and a protection of the copyrights of data.
摘要:
The process for controlling the use of an information storage medium (103) on a data processing system (100) comprising a magnetic medium containing a software package and a microcircuit (53) integral with said information storage medium (10) but functionally independent, consists of the following steps: a) exclusively connecting the microcircuit (53) to the software package, b) exclusively connecting a data processing system (100), on the one hand, to the software package, and on the other hand, to the microcircuit (53), whereby these steps involving exclusive connection are made specific by transcriptions of the system's identifying code. Once said steps have been concluded, the software package can be used only on this data processing system (100), regardless of any data exchange between the microcircuit (53) and the data processing system (100). Application: for controlling the use of all magnetic or magneto-optic media, such as records, tapes, magnetic cassettes or music, film and recorded data magneto-optics.
摘要:
A method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first sA method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first session including one or more Tracks, each of which includes unique and/or nonstandard data structures. The protected content is then recorded on the CD in a concealed form together with an authentication module capable of determining the existence or non-existence of the unique and/or nonstandard data structures and capable of accessing the concealed content and reveal its content. Whenever attempting to access the CD, the authentication module is activated, and if the unique and/or nonstandard data structures are found on the CD, the concealed content is revealed and accessed.
摘要:
A storage device or drive such as a disk or tape drive including a nonvolatile erasable semiconductor memory which stores parameters which control the operation of the storage device. Through a user interface on a host computer, the user is capable of changing the parameters which are used to control the storage device, allowing the user to configure the operation of the storage device in any manner desired. The parameters which are changeable within the storage device relate to responses to the detection of errors within the storage device, data encryption algorithms, the stopping of a disk from spinning, the caching of the storage device, and data compression algorithms. The storage drive also has the capability to perform a stand-alone formatting operation. After formatting a storage medium with the assistance of the host computer (602), the formatted medium is read by the drive and stored in the nonvolatile memory of the storage drive (606). The next time a medium needs to be formatted, the formatting information is read from the memory of the storage drive to perform the formatting, thus freeing the host computer to perform other tasks.
摘要:
A radio receiver receives FM subcarrier transmissions, and stores the transmitted textual information in a random access memory. The information is typically news, weather, sports, entertainment or other information of interest. A user interface allows selection from the memory of the stored information via a set of menus controlling a hierarchical database, so as to access particular items of information. A speech synthesizer accepts the accessed textual information items and transforms them into spoken speech. The user interface is either by voice or a single or multi-position switch allowing scanning through and selection from the menu items.
摘要:
A system and method for receiving a user's biometric data and decoding encoded biometric embedded digital multimedia data into a multimedia signal based on received biometric data in mechanisms. An example includes a dedicated DVD player with a fingerprint scanner. Alternatively, existing DVD players may be retrofitted for the same function. The fingerprint can be encoded at the beginning of each recorded segment, or only at the beginning of the recorded material on the DVD. The system enables a DVD player to work with a television set, once enabled by matching the biometric data encoded on the medium to be viewed.
摘要:
A system and method for receiving a user's biometric data and decoding encoded biometric embedded digital multimedia data into a multimedia signal based on received biometric data in mechanisms. An example includes a dedicated DVD player with a fingerprint scanner. Alternatively, existing DVD players may be retrofitted for the same function. The fingerprint can be encoded at the beginning of each recorded segment, or only at the beginning of the recorded material on the DVD. The system enables a DVD player to work with a television set, once enabled by matching the biometric data encoded on the medium to be viewed.
摘要:
A method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first sA method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first session including one or more Tracks, each of which includes unique and/or nonstandard data structures. The protected content is then recorded on the CD in a concealed form together with an authentication module capable of determining the existence or non-existence of the unique and/or nonstandard data structures and capable of accessing the concealed content and reveal its content. Whenever attempting to access the CD, the authentication module is activated, and if the unique and/or nonstandard data structures are found on the CD, the concealed content is revealed and accessed.
摘要:
A system and process that provides for the creation of media that contain mechanisms to prevent unauthorized copying, process security, and flexibility of use. In addition, the system provides methods to create/save a media image, read/write information to/from media, incorporate media-based copy protection mechanisms, incorporate file based validation in connection with a logical defect applied to the media, and embed encrypted information within the media. This embedded, encrypted information can be read and interpreted by replicator imaging, mastering, and external validation programs incorporating either the "plug-ins" or directly coded methodologies/algorithms to prevent false "failure" results or inability to produce the disk from the protected copy.