GB2131580A - Frustrating the unauthorized copying of recorded data - Google Patents

Frustrating the unauthorized copying of recorded data Download PDF

Info

Publication number
GB2131580A
GB2131580A GB08329177A GB8329177A GB2131580A GB 2131580 A GB2131580 A GB 2131580A GB 08329177 A GB08329177 A GB 08329177A GB 8329177 A GB8329177 A GB 8329177A GB 2131580 A GB2131580 A GB 2131580A
Authority
GB
United Kingdom
Prior art keywords
medium
read
data
file
recorded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB08329177A
Other versions
GB2131580B (en
GB8329177D0 (en
Inventor
William Krag Brotby
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VAULT CORP
Original Assignee
VAULT CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=23746629&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=GB2131580(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by VAULT CORP filed Critical VAULT CORP
Publication of GB8329177D0 publication Critical patent/GB8329177D0/en
Publication of GB2131580A publication Critical patent/GB2131580A/en
Application granted granted Critical
Publication of GB2131580B publication Critical patent/GB2131580B/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00659Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a control step which is implemented as an executable file stored on the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00586Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00681Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access
    • G11B20/00695Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which prevent a specific kind of data access said measures preventing that data are read from the recording medium
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

The authorized recorded disc 16 has a dedicated security track 14 associated with incrementing apparatus 12 in the jacket of the disc and which on a first revolution reads out a stored number N0 and increments it to N1 and in a second revolution writes N1 over N0 on track 14. When reading into computer 18 from disc 16 an initializing routine terminates with a security check in which a stored number N0 is incremented to N1 and compared with N1 on track 14. If the numbers are unequal because an unauthorized disc lacks the apparatus 12 or the latter has been tampered with, the security procedure destroys the main programme record. In another embodiment authorized discs are identified by a localized permanent defective area whose presence in the appropriate location is checked by determining whether it is possible to write on the area and read back what has been written. A blank disc which allows this triggers the obliteration of the record. A further embodiment uses tracks having a harder magnetic medium which constitute a read-only memory which cannot be erased by a copying device. <IMAGE>

Description

SPECIFICATION Frustrating the unauthorized copying of recorded data The present invention is in the field of computer memory devices and more specifically relates to a combination of method and apparatus that frustrates the unauthorized copying of protected data that has been recorded on a floppy disk or other memory medium.
Billions of dollars are spent each year for computer software. Typically the software is sold in recorded form on a floppy disk. Once the consumer has read the program into the core of his computer from the floppy disk, it is conceivable that the consumer might read the program out of the core and record it on a second floppy disk, thereby creating an unauthorized copy of the program. It has been estimated that 50 percent of all software has been copied without authorization.
The proprietor of the software that has been recorded on an authorized copy and sold to a consumer wishes to prevent the consumer from making and selling unauthorized copies.
The present invention permits copies to be made, but with the present invention the copies are unusable and therefore of no value.
Typically, the instructions and other data recorded on the disk at the factory include an initializing procedure and a main application program. The initializing procedure takes care of formatting and other operational formalities, including the setting up of an operating system directory that tells the computer the actual location, within the hardware, at which certain files will be found.
The Prior Art In U.S. Patent No. 4,214,280 issued July 22, 1980 to Halfhill, et al., there is disclosed a method and apparatus for recording data on a disk having defective areas. The method involves locating the defective area so that the data can be written on the parts of the disk that are not defective. The invention is directed, not to securing the recorded data against copying, but instead, toward permitting defective disks to be used. The defects are not introduced intentionally, and no attempt is made to write data on the defective areas.
In an article entitled "Recorded Data Security Device" by A. F. Shugart in the IBM Technical Disclosure Bulletin, Vol. 4, No. 10 of March 1962, there is described a device that prevents certain protected data from being read out of a disk memory. The disk memory in this instance consists of at least two disks mounted for rotation on a common shaft. One of the disks contains recorded control signals that control the operation of the read/write heads of the remaining disks.
In reponse to security signals on the first disk, the read/write heads of the remaining disks are electrically disconnected from their amplifiers, thereby preventing read-out of the protected data. Although this invention makes use of a special channel for security purposes, the use made of that channel is completely different from the techniques employed in the present invention.
In U.S. Patent No. 4,086,634, issued April 25, 1978, Cook discloses a method and apparatus for preventing unauthorized duplication of magnetic tapes. The method involves recording a high-frequency modulated signal together with audible program material on a magnetic tape so that subsequent copying of the program material and modulated signal onto an unauthorized magnetic tape with conventional high frequency bias recording will produce on the copied tape detectable and identifiable interference signals which will produce an audible playback noise that spoils the copied tape. Although Cook's invention is directed toward preventing unauthorized duplication of recorded material, his method is entirely different from the technique used in the present invention.
The present invention is intended primarily for use with floppy disks on which software has been recorded and which are mass distributed to consumers. A major objective of the invention is to prevent the consumer from making an unauthorized copy of the authorized copy which he has purchased.
The consumer certainly has the right to use his authorized copy for its intended purpose, and for this reason, inventions which deny access to the recorded data are not applicable to the problem at hand. In contrast, the present invention falls into the class of techniques for preventing unauthorized duplication of the protected material, i.e. the production of an unauthorized disk. At the same time the present invention does not impair the consumer's right to read the protected material.
As will be seen below, the present invention cannot prevent the consumer from attempting to transcribe the protected material onto an unauthorized disk, but the present invention does guarantee that the unauthorized copy will be unusable.
The present invention requires a combination of apparatus and method for its practice.
Authorized disks made in accordance with the present invention are physically distinguishable from the blank disks which consumers would use for making unauthorized copies. In some embodiments of the present invention, the modifications which characterize the authorized disks are relatively simple and not readily detected. The physical features (indicia) which distinguish the authorized disks may be thought of as an identifying fingerprint for that disk.
The method aspect of the present invention is centered about a security check procedure that is incorporated into the initializing routine, that is recorded on the authorized disk and that is executed prior to the reading out of any of the protected data. The protected data may typically be an application program, but in other circumstances the protected material may comprise data in various forms, including, (without limitation) binary signals and analog signals.
The initializing routine must be executed before the protected material can read out of the disk, and the read/write head of the computer is under control of the initializingroutine.
The security check procedure involves a test to determine whether the disk on which- it has been recorded has or does not have the physical fingerprint that is the hallmark of an authorized disk. If the fingerprint is present the security check procedure enables the read/write head to read out the protected material; however, if the fingerprint is absent, as it would be from an unauthorized disk, the security check procedure prevents the read/write head from reading out the protected material.
In a preferred embodiment, if the fingerprint is not present, the security check procedure instructs the read/write head to obliterate or to erase the protected material.
Thus, the material recorded on a disk, including the initializing routine as well as the protected material, may be-transcribed to an unauthorized disk. The recorded, material will be identical on the authorized disk and on the unauthorized disk.
However, upon attempted use of the unauthorized disk, the security check procedure will determine that the distinguishing finger print that characterizes an authorized disk is absent, and at that juncture the security check procedure will prohibit read-out of the protected material or will obliterate it.
The invention will now be described in more detail with the aid of examples, one of which is illustrated in the accompanying drawing, which is a block diagram showing the apparatus used in a third embodiment of the invention.
In a first embodiment of the invention, which is preferred for its simplicity, a localized permanent defective area is intentionally created at the factory on the unrecorded disk at a random location on the recording surface, on the portion of the recording surface res- - erved for the material to be protected. The effect of the defect is to render the affected portion of the disk incapable of accurately reading out a piece of data that previously a write head had attempted to record on the defect.
Thereafter, at the factory, the exact location of the defect on the disk is determined. In one embodiment this is accomplished by recording 1 's at all locations and then reading back the data. Those locations from which 1's are not read back constitute the defective area.
The locations constituting the defect are collectively regarded by the computer as a file (call it File D), and the location of this file is stored in the initializing procedure that is recorded on the disk. The initializing routine includes instructions which prevent any part of the main application program being recorded in the defect locations. These instructions are similar to those conventionally used to permit the addition of new material to a partially filled disk without recording upon the pre-existing material. The initializing procedure also includes steps which constitute the security check.
At this point the main application program or other data to be protected may be recorded on the disk at the factory. Alternatively, at this point the disk may be sold to someone who wants to record a secure program on the disk.
Thereafter, every time the disk is played, the initializing procedure including the security check is executed. The security check procedure includes the steps of opening File D, writing a particular piece of data there, closing the file, re-opening File D, reading out the contents, and comparing the contents with the particular piece of data that was written.
If the read-out data is identical to the written data (as would be the case if the disk were an unauthorized copy not containing a defect) the, security check procedure orders the files in which the protected data is stored to be- opened and the contents to be obliterated.
If the read-out data differs from the data that was written (as is normal for an, authorized disk since it contains a defect) the security check procedure enables the protected data to be read. Thus, an unauthorized copy of the disk will not yield the protected data, thereby frustrating unauthorized copying.
Second Embodiment In a second embodiment, which permits a higher level of security than the first embodiment, a special recording medium is used on one band of the disk. This band may include several tracks.
The special recording medium is a material that can be recorded on by a special recording head at the factory where the disk is produced, but which cannot be written on by the read/write head of any computer with which the disk might be used.
In one embodiment, the special recording medium is a ferromagnetic material having such large domains that the domains can only be magnetized by application of a magnetic field greater than that produced by the read/write heads of existing computers.
In another expression, the special recording medium is a "harder" magnetic material than the material used on ordinary floppy disks so that the limited magnetic field produced by the write heads of existing computers cannot write on the special recording medium. Also, the special recording medium should have a coercivity that is large compared to the mag netic field produced by the write/erase heads of existing computers so that data written in the special recording medium cannot be erased by the computer.
The tracks on which the special recording medium are used thus constitute a read-only memory which the computer's read/write head can read but cannot write on or alter.
When the disk is produced at the factory, the special recording head there writes a per manent "fingerprint" number (such as a string of 1 's) onto the tracks of the special recording medium.
An initializing procedure of the program commands that the file located at the special tracks be opened and that the file be filled with O's.
Now, if the disk is a normal disk onto which the program has been copied without authorization, this command will be carried out, and the file at the location of the special tracks will be filled with O's.
But, if an authorized disk (one which includes the special tracks) is the one being played, the computer s recording head will be unable to affect the special tracks, which will continue to hold the "fingerprint" number.
The security check then calls for reading the file. If only O's are read, the security routine commands that all files, including the main application program, be opened and be filled with meaningless numbers, thereby rendering the copy useless. If the "fingerprint" number is read, the security check routine will enable read-out of the main application program.
Third Embodiment A third embodiment, shown in Fig. 1, permits a higher degree of security to be attained than is possible with the first and second embodiments. However, the third embodiment requires special apparatus 12 that is an integral part of the jacket of the disk.
In the third embodiment, one track 14 of the disk 16 is dedicated for exclusive use with the security check procedure. When the disk 16 leaves the factory and before it has been used, this dedicated track contains a sync signal followed by a File X that contains a definite number NoB The same number No is contained in the security check routine in machine language in a File Y.
When the disk 16 is inserted in the computer, the computer first executes the initializing routine, before the main application program or other data to be protected is read into the computer's core (from which it could be read onto another disk for the purpose of making an unauthorized copy). The security check procedure concludes the initializing routine.
The security check procedure includes in structions that increment the number No initially contained in File Y to obtain a new number N1, which is then stored in File Y.
Thereafter, the number in File Y is compared with the number then in File X. If the num bers are equal, the computer is enabled to read the main application program into the core. If the numbers are not equal, the com puter is instructed to obliterate all files including those containing the main application program.
Clearly, the latter result will obtain unless the number No initially stored in File X has previously been incremented by the same amount that the number No initially stored in File Y was incremented.
A special apparatus 12 is incorporated into the jacket of the disk as an integral part of the jacket. The purpose of this special apparatus is to increment the number in File X each time the disk 16 is played. The incrementing occurs within the first two revolutions of the disk 16 and thus is completed before the security check procedure is executed. In normal use, the special apparatus 12 causes the number in File X to equal the number in File Y so that the main application program can be read into the core of the computer by the computer's read/write 1 8 head under control of the initializing routine.
If an unauthorized copy is made of the protected data once it has been read into the core of the computer, and if this copy is recorded on a conventional disk, rather than a secure disk like that of the present invention, the copy will be unusable simply because the conventional disk lacks the special apparatus 12 for incrementing the number in File X.
Thus, the apparatus and procedure of the present invention frustrate unauthorized copying.
Further, if the special apparatus 12 is tampered with and thereby rendered inoperative, the original disk will become unusable, since File X cannot be incremented without the use of the special apparatus.
As shown in Fig. 1, the special apparatus 12 comprises, in this illustrative embodiment, a read/write head 20, and amplifier 22, and incrementing and storing system 24, and a battery 26 which powers the other components. All of this special apparatus 12 is mounted in the jacket of the disk. The read/write head 20 is extremely thin and is positioned on the jacket in such a fixed position that it has access to only the special dedicated security track 14 on- the disk 16.
It is assumed for purposes of illustration that the track 15 of the disk 16 that is dedicated to security is Track 3. The special apparatus of Fig. 1 operates as follows.
Upon being commanded to read in the program from the disk 16 the computer starts the disk 16 to rotate. During the first revolution, the disk's read/write head 20 senses an initial sync pulse on Track 3, the dedicated track 14. This sync pulse is used to turn on the amplifier 22 and the incrementing and storing system 24.
As the disk 16 continues to turn, the disk's read/write head 20 reads a number No that follows the first sync pulse on Track 3. That number, Not is incremented by a number stored in the incrementing and storing system 24 to obtain an incremented number Nl.
During the second revolution of the disk 16, the sync pulse is again sensed by the disk's read/write head 20. This second sync pulse switches the amplifier 22 to pass the number N to the disk 16 where N, is written over No on Track 3. The incrementing and storing system 24 causes the amplifier 22 to ignore further sync pulses that may subsequently be read. The operating system directory assigns a name to Track 3: Track 3 is File X.
As described above, the program includes a security check procedure in which a number Not stored in machine language in the initializing routine, is incremented in the same manner as before, to produce in a File Y the number N,. The initializing routine then compares the number in File X with the number in File Y. If the number in File X equals the number in File Y, then the protected data is transferred by the computer's read/write head 18 into the computer's core. If the number in File X does not equal the number in File Y, then the security check procedure commands the computer s read/write head 18 to fill all files, including those containing the protected data, with meaningless numbers.
In the simplest form of this embodiment the number in the Files X and Y are incremented by the same amount each time the disk is played. In a slightly more complicated variation, the incremental amount changes each time the disk is played. This can be accomplished by altering a number stored in a special increment file each time the disk is played.
Conclusion Thus, three embodiments have been described of a method and apparatus for frustrating the unauthorized copying of protected data that has been recorded on a floppy disk.
Clearly the method and apparatus are adaptable to other recording media.
In each embodiment, a fingerprint is imparted to an authorized disk, which permits the authorized disk to be distinguished physically from an ordinary disk on which an unauthorized copy would be made.
In the first embodiment the fingerprint is an intentionally introduced defective area having a random location. In the second embodiment the fingerprint is an unalterable magnetic signature recorded on a special read-only portion of the disk. In the third embodiment, the fingerprint is a magnetic signature that is recorded on a dedicated track of the disk and that is altered each time the disk is used.
In each embodiment, the initializing routine recorded on the disk contains a security check procedure that tests for the presence of the known fingerprint, and that prevents read-out of the protected data if the fingerprint is absent, as it would be from an unauthorized copy.
The foregoing detailed description is illustrative of several embodiments of the invention, and it is to be understood that additional embodiments thereof will be obvious to those skilled in the art. the embodiments described herein together with those additional embodiments are considered to be within the scope of the invention.

Claims (9)

1. A method for frustrating the unauthorized copy of protected data that has been recorded in a medium and that is read out of the medium by an apparatus that is controlled by instructions recorded in the medium, said instructions being included in an initializing routine that is executed before any of the protected data is read out of the medium, said method comprising the steps of: a) placing distinguishing indicia in the medium of authorized copies, said distinguishing indicia known to be absent from the media in which unauthorized copies are recorded; b) testing to determine whether said distinguishing indicia are present in a copy being used, and which may be an authorized copy or an unauthorized copy; c) preventing read-out of the protected data if the test indicates that said distinguishing indicia are absent from the copy being used.
2. The method of Claim 1 wherein step c) further comprises obliterating the protected data if the test indicates that said distinguishing indicia are absent from the copy being used.
3. A method for frustrating the unauthorized copying of protected data that has been recorded in a medium and that is read out of the medium by an apparatus that is controlled by instructions recorded in the medium, said instructions being included in an initializing routine that is executed before any of the protected data is read out of the medium, said method comprising the steps of:: a) intentionally creating a localized perma nent defective area in the medium before the protected data have been recorded, the defective area being incapable of recording data and the defective area being located at a random location on a part of the medium reserved for the protected data; b) determining the location in the medium of the defective area; c) storing the location of the defective area in the initializing routine; d) writing particular data at the location of the defective area; e) reading back whatever data might be recorded at the location of the defective area; f) comparing the data read back in step e) with the data written in step d); g) preventing read-out of the protected data if the data read back in step e) is identical with the data written in step d).
4. In a medium for recording protected data, said medium also including an initializing routine that is executed before any of the protected data is read out of the medium and that controls an apparatus to read data out of the medium and to write data in the medium, the improvement comprising: an intentionally produced localized permanent defect located in a part of the medium reserved for receiving the protected data at a random location recorded in the initializing routine, whereby an unauthorized copy is recognized if the initializing routine is successful in reading back identically data that the initializing routine commanded to be written at the recorded location of the defect.
5. A method for frustrating the unauthorized copying of protected data recorded in a medium that includes a special read-only portion in which a permanent fingerprint number has been unalterably stored, said medium also including an initializing routine that is executed before any of the protected data is read out of the medium and that controls the operation of the read/write head that services the medium, said method comprising the steps of: a) setting up a file in the location where the special read-only portion of an authorized copy is located; b) commanding the read/write head to write in the file a test number that is different from the fingerprint number; then, c) reading back the contents of the file; d) comparing the contents of the file with the test number; and e) preventing read-out of the protected data if the contents of the file are identical with the test number.
6. In a medium for recording data, said medium normally used in conjunction with a standard apparatus than can selectively read, write and erase data into and out of the medium, the improvement comprising: a portion of the medium into which special data can be read by a special apparatus and from which the special data cannot be erased by the standard apparatus.
7. A recording medium carrying protected recorded data and the recorded program for an initializing routine which is carried out before any of the protected data can be read from the medium, the medium having in a special location identifying physical characteristics and the initializing routine including a security check procedure comprising instructions to control a read/write apparatus to interact with the identifying characteristics at the said location and use the result of such interaction to check the presence of the identifying characteristics before permitting read out of the protected data.
8. A method for frustrating the unauthorized copying of protected data that has been recorded in an authorized medium that includes an initializing routine that is executed before any of the protected data is read out of the authorized medium, said method comprising the steps of: a) establishing a File X; b) initially storing in File X a particular number No; c) providing an incrementing apparatus that is present only when an authorized medium is used, for generating a series of increments and for successively incrementing the number in File X each time the medium is read, said incrementing apparatus not being present when an unauthorized medium is used and being rendered inoperative when an authorized medium has been tempered with; d) establishing a File Y as part of the initializing routine; e) initially storing in File Y the number No used in step b);; f) incrementing the number in File Y successively each time the medium is read, in accordance with the same series of increments that was generated in step c); g) testing to determine whether the number in File X equals the number in File Y; h) preventing read-out of the protected data when the number in File X does not equal the number in File Y.
9. Apparatus for frustrating the unauthorized copying of protected data that has been recorded therein along with an initializing routine that is executed before the protected data can be read out, said initializing routine including instructions for generating a first series of increments and for successively incrementing a first number stored in said initializing routine each time said apparatus is used, said apparatus comprising: a medium; and, incrementing means associated with said medium for generating a second series of increments identical to said first series of increments and for successively incrementing a second number equal to said first number and stored in a particular file in said medium each time said medium is read, whereby an unauthorized copy, which lacks said incrementing means, can be recognized by said initializing routine in time to prevent read-out of the protected data by any inequality between successive increments of said first number and corresponding successive increments of said second number.
GB08329177A 1982-11-08 1983-11-01 Frustrating the unauthorized copying of recorded data Expired GB2131580B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US43990782A 1982-11-08 1982-11-08

Publications (3)

Publication Number Publication Date
GB8329177D0 GB8329177D0 (en) 1983-12-07
GB2131580A true GB2131580A (en) 1984-06-20
GB2131580B GB2131580B (en) 1987-06-24

Family

ID=23746629

Family Applications (1)

Application Number Title Priority Date Filing Date
GB08329177A Expired GB2131580B (en) 1982-11-08 1983-11-01 Frustrating the unauthorized copying of recorded data

Country Status (7)

Country Link
JP (1) JPS5987571A (en)
CH (1) CH666363A5 (en)
DE (1) DE3319343A1 (en)
FR (1) FR2535885B1 (en)
GB (1) GB2131580B (en)
IL (1) IL69999A (en)
NL (1) NL8303773A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2162992A (en) * 1984-08-09 1986-02-12 Edward Peter Campbell Sington A method of recording a computer program
GB2173327A (en) * 1985-03-15 1986-10-08 David Allan Phillips Copy protecting computer programs
US4751667A (en) * 1985-05-11 1988-06-14 National Research Development Corporation Method and apparatus for verifying the identity of dynamic memory
GB2204970A (en) * 1987-05-19 1988-11-23 Gen Electric Co Plc Data storage system
US4823210A (en) * 1984-08-13 1989-04-18 Verbatim Corporation Copy protected disk
US4849836A (en) * 1985-06-07 1989-07-18 Software Heaven, Inc. Copy protection for computer discs
US4858036A (en) * 1986-08-04 1989-08-15 Peter Ginkel Software protection and identification system
US4935835A (en) * 1988-11-10 1990-06-19 Insite Peripherals, Inc. Magnetic media containing reference feature and methods for referencing magnetic head position to the reference feature
US4975898A (en) * 1986-12-27 1990-12-04 Sony Corporation Method and apparatus for preventing copying of an optical disk
US4980782A (en) * 1985-06-03 1990-12-25 Peter Ginkel Software protection and identification system
EP0987705A2 (en) * 1998-09-16 2000-03-22 OK Media Disc Service GmbH & Co. KG Copy protection method
WO2001088921A1 (en) * 2000-05-18 2001-11-22 3Lfants Limited Security device and article incorporating same
GB2373091A (en) * 2002-05-29 2002-09-11 Donald Eric Butterfield Copy protection

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3375854D1 (en) * 1982-11-22 1988-04-07 Dysan Corp Method and apparatus for authenticating memory disk
IL68989A (en) * 1983-06-15 1985-03-31 Amiran Grynberg Diskette protection
US4577289A (en) * 1983-12-30 1986-03-18 International Business Machines Corporation Hardware key-on-disk system for copy-protecting magnetic storage media
US4644493A (en) * 1984-09-14 1987-02-17 International Business Machines Corporation Implementing a shared higher level of privilege on personal computers for copy protection of software
NL8801275A (en) * 1988-05-18 1989-12-18 Philips Nv RECORDING SYSTEM AND REGISTRATION CARRIER AND WRITING DEVICE FOR APPLICATION IN THE SYSTEM.
DE3810276A1 (en) * 1988-03-25 1989-10-05 Peter Bodinet Method of identifying EDP programs which have been duplicated without authorisation
JPH0244448A (en) * 1988-08-05 1990-02-14 Nec Corp Floppy disk
DE4009103A1 (en) * 1990-03-21 1991-09-26 Innomed Megabrain Entspannungs KNOWLEDGE METHOD
US5418852A (en) * 1992-03-18 1995-05-23 Fujitsu Limited Unauthorized use prevention method for optical disks, optical disk having unauthorized use prevention function, and optical disk apparatus
JP3980706B2 (en) * 1997-05-23 2007-09-26 危機管理株式会社 IC card and authentication device thereof
DE10217551A1 (en) * 2002-04-19 2003-11-06 Helmut Alexander Lotze Device and method for preventing unauthorized use of software
WO2011009139A1 (en) * 2009-07-17 2011-01-20 Aaron Marking Simple nonautonomous peering media clone detection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1525292A (en) * 1976-04-30 1978-09-20 Emi Ltd Identification of records
GB1529939A (en) * 1975-10-06 1978-10-25 Emi Ltd Method of verification of magnetic records

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1529566A (en) * 1974-10-16 1978-10-25 Emi Ltd Magnetic recording
US4214280A (en) * 1978-05-30 1980-07-22 Xerox Corporation Method and apparatus for recording data without recording on defective areas of a data recording medium
US4337659A (en) * 1979-06-29 1982-07-06 Burroughs Corporation Computer tape and reel signature for computer data file security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB1529939A (en) * 1975-10-06 1978-10-25 Emi Ltd Method of verification of magnetic records
GB1525292A (en) * 1976-04-30 1978-09-20 Emi Ltd Identification of records

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2162992A (en) * 1984-08-09 1986-02-12 Edward Peter Campbell Sington A method of recording a computer program
US4823210A (en) * 1984-08-13 1989-04-18 Verbatim Corporation Copy protected disk
GB2173327A (en) * 1985-03-15 1986-10-08 David Allan Phillips Copy protecting computer programs
US4751667A (en) * 1985-05-11 1988-06-14 National Research Development Corporation Method and apparatus for verifying the identity of dynamic memory
US4980782A (en) * 1985-06-03 1990-12-25 Peter Ginkel Software protection and identification system
US4849836A (en) * 1985-06-07 1989-07-18 Software Heaven, Inc. Copy protection for computer discs
US4858036A (en) * 1986-08-04 1989-08-15 Peter Ginkel Software protection and identification system
US4975898A (en) * 1986-12-27 1990-12-04 Sony Corporation Method and apparatus for preventing copying of an optical disk
GB2204970A (en) * 1987-05-19 1988-11-23 Gen Electric Co Plc Data storage system
US4935835A (en) * 1988-11-10 1990-06-19 Insite Peripherals, Inc. Magnetic media containing reference feature and methods for referencing magnetic head position to the reference feature
EP0987705A2 (en) * 1998-09-16 2000-03-22 OK Media Disc Service GmbH & Co. KG Copy protection method
EP0987705A3 (en) * 1998-09-16 2001-03-07 OK Media Disc Service GmbH & Co. KG Copy protection method
WO2001088921A1 (en) * 2000-05-18 2001-11-22 3Lfants Limited Security device and article incorporating same
GB2373091A (en) * 2002-05-29 2002-09-11 Donald Eric Butterfield Copy protection

Also Published As

Publication number Publication date
NL8303773A (en) 1984-06-01
JPS5987571A (en) 1984-05-21
DE3319343A1 (en) 1984-05-10
FR2535885B1 (en) 1993-07-23
FR2535885A1 (en) 1984-05-11
IL69999A (en) 1985-07-31
GB2131580B (en) 1987-06-24
IL69999A0 (en) 1984-01-31
CH666363A5 (en) 1988-07-15
GB8329177D0 (en) 1983-12-07

Similar Documents

Publication Publication Date Title
US4785361A (en) Method and apparatus for frustrating the unauthorized copying of recorded data
GB2131580A (en) Frustrating the unauthorized copying of recorded data
EP0149015B1 (en) Method and apparatus for copy-protecting magnetic storage media
US4980782A (en) Software protection and identification system
US4734796A (en) Technique for preventing unauthorized copying of information recorded on a recording medium and a protected recording medium
US4823210A (en) Copy protected disk
US4858036A (en) Software protection and identification system
US5233576A (en) Multi-function optical disk drive and media
EP0174472A2 (en) Implementing a shared higher level of privilege on personal computers for copy protection of software
JP2001507849A (en) Record carrier copy protection method, copy protected record carrier and method of detecting access control information
US6738331B2 (en) Copy-protected optical disk and protection process for such disk
JP2575988B2 (en) Optical disk copy prevention method, optical disk and optical disk apparatus
KR950033851A (en) Method and apparatus for protecting data written to partial read-only memory (ROM) from unauthorized copying
KR20010076729A (en) Optical recording medium with a duplication preventing function, method for manufacturing and reproducing the same
EP0129427A2 (en) Diskette protection
JPS60175254A (en) Dead copy preventing method for software recording medium
EP0130843A2 (en) Recording information on magnetic recording means
NL8703032A (en) Marking magnetic recording discs to prevent copying - using physical modifications to discs, e.g. punched holes, to make discs unique
EP0204154A2 (en) Software protection and identification system
US20050007911A1 (en) Method for recording data on a data storage medium enabling data identification
JPH04215153A (en) Information recording and reproducing device
JP2582507B2 (en) Apparatus and method for preventing program copy
JP3765702B2 (en) Recording apparatus, recording control method, and recording medium
JP2001023299A (en) Method for preventing illicit copying of program and information recording medium subjected to the countermeasure
JPS61137291A (en) Floppy magnetic disk medium

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 19921101