BE900479A - Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying - Google Patents
Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying Download PDFInfo
- Publication number
- BE900479A BE900479A BE0/213575A BE213575A BE900479A BE 900479 A BE900479 A BE 900479A BE 0/213575 A BE0/213575 A BE 0/213575A BE 213575 A BE213575 A BE 213575A BE 900479 A BE900479 A BE 900479A
- Authority
- BE
- Belgium
- Prior art keywords
- sector
- carrier
- magnetic
- change
- mentioned change
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0092—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
- G11B20/00927—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
The disc incorporates at least one sector in which changes have been made to cause any unauthorised copying to fail. A control program on the disc will ensure a 'disc error' message when a read-out of the changed sector is attempted. - The sector can be changed in one or more of the following ways: changes in the physical, chemical or magnetic characteristics; changes brought about by radiation, ionisation or photochemical methods.
Description
<Desc/Clms Page number 1>
EMI1.1
.
Deze uitvinding heef t betrekking op eenmagnetische drager, o. m. een diskette, die tegen ongeoorlooid kopiëren is beveiligd.
Voor de beveiliging van diskettes en gelijkaardige magnetische dragers tegen ongeoorloofd kopiëren hiervan zijn tot nog toe, niettegenstaande veelvuldige pogingen, geen efficiente oplossingen gesuggereerd.
Het beveiligen tegen dit ongeoorloofd kopiëren van magnetische dragers door op de software e ! ementen hiervan in te werken, is tor hiertoe niet gelukt. Here decoderen van op deze wijze beveiligde magnetische dragers blijkt tot hiertoe steeds mogelijk geweest te xi) n.
EMI1.2
Verschil die zowel soft- \ als hardware betreffen en die de beveiliging tegen ongeoorloofd kopier- ren beogen, worden hierna pngesomd. In dit verband moet opgemerkt worden dat de toepassing van minstens een van db volgende oplossingen mogelijk is :
1. Speciale formaten. nl. speciale herkenningspunten die als niet standaard worden beschouwd en uitsluitend door daartoe speciaal aangepaste systemen kunnen worden gelezen ;
2. "Zelf-synchronisatie" velden ter identificane van het aanloopstuk van een track/sector: 3. Speciale sequentie van de tracks waartoe bedoeld wordt dat de volgorde van de tracks verschilt van het stan- clz, araformaat.
EMI1.3
4. Gebruj) 'tucks en op .an: ra die normaal t.
<Desc/Clms Page number 2>
< *'na) < ing \an halve tracks, nl.niet wordt gebruikt cn een controle over de aanwezigheid van deze extra track ;
6. Beveiliging van een magnetische drager nl. van'een diskette, door de omwentelingssnelheid van de diskette aandrijving te wjjzigen zodat de diskette slehm bi) een bepaalde snelheid kan worden afgetezen ;
7. Irdas van een"chip"waarvan de ontcijfering het kopiëren van de diskette natuurlijk mogelijk maakt ;
8. Opname in omgekeerde richting van de informaties op de sector die dan pas na een bepaalde controle kan afgeleze worden.
AI deze beveiligingssystemen garanderen dat de"copier"de diskette niet kan herkennen omwille van de afwezigheid van de standaardnormen of van de afwijking t.-).'.. de standaard- normen. De huidige copieerprogramma's laten toe na te gaan waar en in hoeverre de beveiligde diskette van de standaardnormen of formaten afwijkt. Nadien zal de "copiër" op de "copy diskette/dezelide sijzigingen respectievelijk afwijkingen t.o.v. het standaardformaat aanbrengen zodat de "copy diskette" wel uitvoerbaar wordt.
Door gebruik te maken van twee van de hierbovengenoemde middelen wordt het voor de copier nog lastiger de diskette te ontcijferen.
De uitvinding heeft nu tot doel een magnetische drager, in ?. een diskette, voor te schri ; ven die op zeer eenvoudigc wijze tegen kopieren wordt beveiligd.
Te oien einde wordt het formaat van minstens een sector van de drager ¯althans het gedeelte hiervan dat de herkenningspunten of daarmede gelijk te stellen parameters bevat, zodanig gewijzigd dat bij een poging tot aflezen van deze Rector deze niet meer kan worden geidentificeerd en bevat de drager minstens een controleprogramrna die voor een verdere uitvoering van het programma van de. drager o. a. een foutmelding verwacht, bij een leesin- structie van een sector die als gevolg van de eerste stap van de'werk- wijze niet identificeerbaar werd gemaakt.
<Desc/Clms Page number 3>
D'uitvinding heeft eveneens betrekking op een werkwijze ter behandeling tegen ongeoorloofd kopieren van een rpagnetische drager, zoals o. m. een diskette.
Andere details en voordelen van de uitvinding zullen blijken uit de hiernavolgende beschrijving van een magnetische drager, o. m. een diskette, en van meerdere werkwijzen ter behandeling tegen ongeoorloofd kopiëren van dergelijke magnetische dragers, volgens de uitvinding. Deze beschrijving wordt uitsluitend bij wijze van voorbeeJd gegeven en beperkt de uitvinding niet.
Magnetische dragers volgens de uitvinding worden dank ziJ de toepassing van de uitvinding uniek. De hardware beveiliging bestaat erin dat het formaat van een sector of van meerde- re Sektoren niet meer kan worden geïdentificeerd.
In functie van het type diskette en volgens de normen van de constructeur kunnen op een magnetische drager of diskette verschillende tracks en sectoren per track voorzien z jn.
Kan een sector niet meer werden geldentificeerd, dan zal het controleprogramme hiervan een"disk-error"aangeven bij het uitvocren van een lees-of schrijfroutine.
Het wijzigen van het formaat kan op \'rrchit ! ende manieren plaatsvinden.
Deze verschillende werkwijzen kan, men hoofdzakelijk onderverdelen in mechanische, chemische, magnetische/electromagnetische bewerkingen.
Bij e mechanische handelingen kunnen gerangschikt worden, het aanbrengen van een kras op de drager, ook een micro-perforatie van de drager kan het ingangsstuk van een track onherkenbaar maken.
Bij de mechanische manipulatie kan ook
EMI3.1
- worden genoemd het vernietigen van de magnetische oppervlakte vandedrager.
Bij de chemische behandelingen wordt 1'1 de eerste plaárs gedacht aan een oplossing van de magnetische laag.
EMI3.2
t
<Desc/Clms Page number 4>
Als magnetisch/electro-magnetische behandelingen komen in de eerste plaats het onherkenbaar maken van de magnetische dispositie van de drager in-aanmerking.
Ook andere technieken kunnen gebruik maken van etsing op fyssisch/chemische basis; bestraling door ultra-korte golflengte gaande van zichtbaar licht tot ultra-lange golflengten.
Het ingangsstuk van de track kan ook geioniseerd worden of fotografisch worden behande ! d. Ook de plastiek, meestal vinyl schiji zonder enige magnetische eigenschap kan behandeld worden met'interferentie op de magnetische film, die er later moet op aangebracht worden. Plaatselijke afwezigheid van de magneetfilm is eveneens een te overwegen maatregel.
Tenslotte kan gedacht worden aan software formatingSprogramma's die bepaalde tracks/sectoren van de magnetische drager niet formateren/initialiseren.
Controle van de beveiliging kan als volgt plaatsvinden. Het software gedeelte van de beveiliging zal de drager controleren op zijn unieke eigenschappen. Er zal namelijk worden gecontroleerd of de "gewijzigde" oppervlakken overeenstemmen met de voorafbepaalde eigenschappen. Voot de originele diskette het contro- ! esysteem de eigenschappen van de originele diskette niet zal herkennen of identificeren en een van de daarop volgende vooropgestelde tegenmaatregelen doorvoeren ? oals o. m. : !
1) vernietiging van alle gegevens op de diskette door - opnulstelling - reformateren
2) opnulsteiiing van directory/system tracks ;
3) foutmelding zonder vernietiging van de drager; drager ;
4) speciale toegang via codewoorden met/ zonder vernietiging van de drager na een vooropgesteld aantal mislukte
EMI4.1
pogingen om het codewoord te 5) toegang weigeren tot uitvoering . " de programma's.
<Desc/Clms Page number 5>
EMI5.1
Het software vormen ;constructeur moeten aangepast worden omdat elke constructeur zijn eigen"dialect"heeit inzake standaard ; computertalen. Len absolute vereiste is de mogelijkheid de oppervlakte van de magnetische drager te kunnen herkennen door de mogelijkheid bepaalde tracks/soctoren te lezen, resp. te controleren. Een controleveld zal tenminste bestaan uit een "onherkenbaar stuk" geassocieerd bij meerdere "herkenbare stukken". De beveiliging stoelt hoofdzakeiijk op de haast n : et reprodu- ceerbaarhcid van het controleveld gezien de steeds grotere informatie die op steeds kleinere oppervlakte kan worden gestockeerd. In bepaalde gevallen zullen meerdere controlevelden op een drager kunnen worden aangebracht.
EMI5.2
. 1 I I
<Desc / Clms Page number 1>
EMI1.1
.
This invention relates to a magnetic carrier, including a floppy disk, which is protected against unauthorized copying.
Despite many attempts, no effective solutions have been suggested to protect floppies and similar magnetic media against unauthorized copying.
Protecting against this unauthorized copying of magnetic carriers by pressing the software e! It has not been possible to implement elements of this. Decoding of magnetic carriers secured in this manner has always been possible until now.
EMI1.2
Differences affecting both software and hardware that are designed to protect against unauthorized copying are listed below. In this context it should be noted that the application of at least one of the following solutions is possible:
1. Special formats. namely special landmarks which are not considered standard and which can only be read by specially adapted systems;
2. "Self-sync" fields identifying the track / sector leader: 3. Special sequence of the tracks which means that the order of the tracks differs from the standard, macaw format.
EMI1.3
4. Use tucks and on .an: ra which normally t.
<Desc / Clms Page number 2>
<* 'na) <ing \ an half tracks, ie not used and a control over the presence of this extra track;
6. Protection of a magnetic carrier, namely of a floppy disk, by changing the revolution speed of the diskette drive so that the diskette can only be read at a certain speed;
7. Irdas of a "chip", the deciphering of which, of course, allows the copying of the diskette;
8. Recording in the reverse direction of the information on the sector that can only be read after a certain check.
All these security systems guarantee that the "copier" cannot recognize the diskette due to the absence of the standard standards or the deviation t.-). .. the standard standards. Current copy programs allow to determine where and to what extent the protected diskette deviates from the standard standards or formats. Afterwards, the "copier" will make changes or deviations from the standard format on the "copy diskette", so that the "copy diskette" becomes executable.
Using two of the abovementioned means makes it even more difficult for the copier to decipher the floppy disk.
The object of the invention is now a magnetic carrier, in. a floppy disk, for writing; which is very easy to protect against copying.
In order to do this, the format of at least one sector of the medium, at least the part thereof containing the landmarks or parameters that can be equated with them, is changed in such a way that when an attempt is made to read this Rector it can no longer be identified and the medium contains at least one control program intended for further implementation of the. bearer o. a. Expects an error message, when a sector read instruction was made unidentifiable as a result of the first step of the method.
<Desc / Clms Page number 3>
The invention also relates to a method of treatment against unauthorized copying of a magnetic carrier, such as, inter alia, a floppy disk.
Other details and advantages of the invention will become apparent from the following description of a magnetic carrier, including a floppy disk, and from several methods of treatment against unauthorized copying of such magnetic carriers, according to the invention. This description is made by way of example only and does not limit the invention.
Magnetic carriers according to the invention become unique thanks to the use of the invention. Hardware security consists of the fact that the format of a sector or of several sectors can no longer be identified.
Depending on the type of diskette and according to the manufacturer's standards, different tracks and sectors can be provided per track on a magnetic carrier or diskette.
If a sector can no longer be identified, the control program will indicate a "disk error" when creating a read or write routine.
Resizing can be done at \ 'rrchit! and the ways take place.
These different methods can be mainly subdivided into mechanical, chemical, magnetic / electromagnetic operations.
With the mechanical actions can be arranged, applying a scratch to the carrier, also a micro-perforation of the carrier can make the entry of a track unrecognizable.
It is also possible with mechanical manipulation
EMI3.1
- are called destroying the magnetic surface of the carrier.
In the chemical treatments, 1'1 the first plasers is thought to be a solution of the magnetic layer.
EMI3.2
t
<Desc / Clms Page number 4>
As magnetic / electromagnetic treatments, first consideration is made of rendering the magnetic disposition of the carrier unrecognizable.
Other techniques can also make use of etching on a physical / chemical basis; ultra-short wavelength irradiation ranging from visible light to ultra-long wavelengths.
The input of the track can also be ionized or treated photographically! d. Also the plastic, usually vinyl film without any magnetic property, can be treated with interference on the magnetic film to be applied later. Local absence of the magnetic film is also a measure to be considered.
Finally, think of software formating programs that do not format / initialize certain tracks / sectors of the magnetic carrier.
The security can be checked as follows. The software part of the security will check the wearer for its unique properties. Namely, it will be checked whether the "modified" surfaces correspond to the predetermined properties. Did the original floppy disk check it! system will not recognize or identify the properties of the original floppy disk and implement any of the following countermeasures? as o. m.:!
1) destruction of all data on the floppy disk by - reformatting - reformating
2) replenishment of directory / system tracks;
3) error message without destruction of the carrier; carrier;
4) special access via code words with / without destruction of the bearer after a predetermined number of failed
EMI4.1
attempts to deny the codeword access to execution. " the programs.
<Desc / Clms Page number 5>
EMI5.1
The software forms, constructor must be adapted because each constructor has his own "dialect" regarding standard; computer languages. An absolute requirement is the ability to recognize the surface of the magnetic carrier by the ability to read certain tracks / sensors, respectively. to check. A control field will at least consist of an "unrecognizable piece" associated with several "recognizable pieces". The security is mainly based on the hurry of reproducibility of the control field in view of the increasing information that can be stored on an increasingly smaller surface. In some cases, multiple control fields can be applied to a carrier.
EMI5.2
. 1 I I
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BE0/213575A BE900479A (en) | 1984-08-31 | 1984-08-31 | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
BE0/213575A BE900479A (en) | 1984-08-31 | 1984-08-31 | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying |
BE900479 | 1984-08-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
BE900479A true BE900479A (en) | 1984-12-17 |
Family
ID=25654213
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BE0/213575A BE900479A (en) | 1984-08-31 | 1984-08-31 | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying |
Country Status (1)
Country | Link |
---|---|
BE (1) | BE900479A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1988001408A1 (en) * | 1986-08-16 | 1988-02-25 | Runtime Innovations Limited | System for controlling access to a store of information |
EP0342748A1 (en) * | 1988-05-18 | 1989-11-23 | Koninklijke Philips Electronics N.V. | Recording system as well as record carrier and recording apparatus for use in the system |
EP0294489A4 (en) * | 1986-12-27 | 1992-06-03 | Sony Corporation | Optical disc and optical disc unit |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6434109B2 (en) | 1996-09-16 | 2002-08-13 | Spectradisc Corporation | Machine-readable optical disc with reading-inhibit agent |
US7844835B2 (en) | 1995-02-13 | 2010-11-30 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US8185473B2 (en) | 1995-02-13 | 2012-05-22 | Intertrust Technologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US8751793B2 (en) | 1995-02-13 | 2014-06-10 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
-
1984
- 1984-08-31 BE BE0/213575A patent/BE900479A/en not_active IP Right Cessation
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1988001408A1 (en) * | 1986-08-16 | 1988-02-25 | Runtime Innovations Limited | System for controlling access to a store of information |
US4868736A (en) * | 1986-08-16 | 1989-09-19 | Runtime Innovations Limited | Code operated access control system for electronic data store |
US5410598A (en) * | 1986-10-14 | 1995-04-25 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
EP0294489A4 (en) * | 1986-12-27 | 1992-06-03 | Sony Corporation | Optical disc and optical disc unit |
EP0342748A1 (en) * | 1988-05-18 | 1989-11-23 | Koninklijke Philips Electronics N.V. | Recording system as well as record carrier and recording apparatus for use in the system |
US6237786B1 (en) | 1995-02-13 | 2001-05-29 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7917749B2 (en) | 1995-02-13 | 2011-03-29 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5915019A (en) | 1995-02-13 | 1999-06-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5917912A (en) | 1995-02-13 | 1999-06-29 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronic rights protection |
US8751793B2 (en) | 1995-02-13 | 2014-06-10 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US8543842B2 (en) | 1995-02-13 | 2013-09-24 | Intertrust Technologies Corporation | System and methods for secure transaction management and electronics rights protection |
US5982891A (en) | 1995-02-13 | 1999-11-09 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8185473B2 (en) | 1995-02-13 | 2012-05-22 | Intertrust Technologies Corporation | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management |
US5910987A (en) | 1995-02-13 | 1999-06-08 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7844835B2 (en) | 1995-02-13 | 2010-11-30 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6185683B1 (en) | 1995-02-13 | 2001-02-06 | Intertrust Technologies Corp. | Trusted and secure techniques, systems and methods for item delivery and execution |
US6427140B1 (en) | 1995-02-13 | 2002-07-30 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6389402B1 (en) | 1995-02-13 | 2002-05-14 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6253193B1 (en) | 1995-02-13 | 2001-06-26 | Intertrust Technologies Corporation | Systems and methods for the secure transaction management and electronic rights protection |
US6363488B1 (en) | 1995-02-13 | 2002-03-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US6240185B1 (en) | 1996-08-12 | 2001-05-29 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6292569B1 (en) | 1996-08-12 | 2001-09-18 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US6449367B2 (en) | 1996-08-12 | 2002-09-10 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6618484B2 (en) | 1996-08-12 | 2003-09-09 | Intertrust Technologies Corporation | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US7925898B2 (en) | 1996-08-12 | 2011-04-12 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US8307212B2 (en) | 1996-08-12 | 2012-11-06 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US8533851B2 (en) | 1996-08-30 | 2013-09-10 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US6434109B2 (en) | 1996-09-16 | 2002-08-13 | Spectradisc Corporation | Machine-readable optical disc with reading-inhibit agent |
US6138119A (en) | 1997-02-25 | 2000-10-24 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BE900479A (en) | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying | |
US4858036A (en) | Software protection and identification system | |
EP0149015B1 (en) | Method and apparatus for copy-protecting magnetic storage media | |
US4980782A (en) | Software protection and identification system | |
EP1025560B1 (en) | Copy protectable optical media device and methodology therefor | |
US20040174798A1 (en) | Data copy-protecting system for creating a copy-secured optical disc and corresponding protecting method | |
EP0172439B1 (en) | Copy protected disk | |
US6609203B1 (en) | Secure optically readable memory usable in connection with a limited number of machines | |
US8097324B2 (en) | Enhanced security of optical article | |
US8488428B2 (en) | Enhanced security of optical article | |
US20010024411A1 (en) | Copy-protected optical disk and protection process for such disk | |
US7506178B2 (en) | Tamper-resistant re-writable data storage media | |
US20020057637A1 (en) | Protecting a digital optical disk against copying, by providing a zone having optical properties that are modifiable while it is being read | |
JPH09305396A (en) | Software recording medium, information reader, and system and method for prevention against use of copy | |
JPS62188026A (en) | Information recording device | |
US6452886B1 (en) | Antihacking optical recording disc and method for reading same | |
EP0204154A2 (en) | Software protection and identification system | |
GB2373091A (en) | Copy protection | |
JPS62184630A (en) | Optical disk | |
TW523739B (en) | Method of preventing illegal use of optical disk, optical disk based on the same method, and method of producing the optical disk | |
JP2002175663A (en) | Copyright protecting and recording method for optical disk | |
JPS62184628A (en) | Optical disk driving device | |
RU2109331C1 (en) | Method for protecting information software against unauthorized use | |
CZ20041220A3 (en) | Method and device for protecting user information against manipulations | |
JPH10208238A (en) | Magnetic recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
RE | Patent lapsed |
Owner name: SMETS RAPH Effective date: 19870831 |