CN1632873A - Optical disk data protecting method - Google Patents
Optical disk data protecting method Download PDFInfo
- Publication number
- CN1632873A CN1632873A CN 200310122451 CN200310122451A CN1632873A CN 1632873 A CN1632873 A CN 1632873A CN 200310122451 CN200310122451 CN 200310122451 CN 200310122451 A CN200310122451 A CN 200310122451A CN 1632873 A CN1632873 A CN 1632873A
- Authority
- CN
- China
- Prior art keywords
- data
- optical disk
- guard method
- storage area
- copy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Signal Processing For Digital Recording And Reproducing (AREA)
- Optical Recording Or Reproduction (AREA)
Abstract
It is a compact disc data protection method, which comprises the following steps: first to select multiple data strings from the CD, wherein each data string comprises the material area and the error area; then to put the update material into the material area and to keep the content of the error area; then to code the update material area and to establish one destroy rail to misguide the copy software to copy the error codes of the materials in the memory area.
Description
Technical field
A kind of data protection technology is closed in the present invention, particularly about a kind of guard method that an anti-copy mechanism can be provided the data of depositing on the CD.
Background technology
Under the environment that current pirated CDs prevails and CD burning is very general, the CD that cost plenty of time and expense are made, be easy to suffer that illegal pirate duplicates and improper distribution, in the face of situation like this, relevant dealer constantly drops into great amount of manpower and funds, and the anti-copy technology that can effectively check illegal pirate behavior is developed in expectation.Therefore, between research duplication technology and the anti-copy technology, exist relation intricate, the resentment entanglement always, both also just in this encryption, crack, encrypt, crack again ... under the circulation, technology each other is all at a tremendous pace.Nowadays some more common anti-copy technology are the SecuROM of Sony Corporation research and development and the SafeDisc that developed by Macrovision etc., all are methods of its product information content of the most frequently used protection of general cd resource supplier.Wherein, the SecuROM resist technology of Sony Corporation's research and development; its principle is main to be (Data tracks Sub-Channel) imprinting digital code (Digital-ID) in the data rail subchannel in CD; make every CD that an identification code own all be arranged; when CD moves; can go to check whether identification code exists in the CD, only could trouble-free operation under the situation that this identification code exists.For general imprinting software, when (CD-COPY), most program all can't copy the data of data rail subchannel the inside at the copy CD, the digital code in just can't copy, in other words, the CD after duplicating can't normally be read by computing machine; The protection philosophy of SafeDisc then is first utilization " digital finger-print authentication " technology; imprinting in CD " digital signature " (a digital signature) information; just in CD, set up some bad rails and be used as " digital signature "; making common people document directly can't be copied is used; this resist technology itself has added that also anti-astonished failure mechanism is interior; the method that makes general user can't utilize software to crack is skipped the CD of protection illegal copies; just the SafeDisc resist technology is to pass through digital signature; archives scrambled and anti-astonished cracking are waited three kinds of anti-copy mechanism, reach the purpose of protecting cd resource.Yet the suitable Writing device of only need arranging in pairs or groups; the most of imprinting software that widely uses on the market all can crack the resist technology that above-mentioned cd resource uses at present; the Writing device of the contained data content of data rail subchannel is read in existing support, so the anti-copy mechanism of SecuROM institute construction promptly is cracked.For SafeDisc; because of its when setting up bad rail; usually can be changed setting up the data of depositing in bad rail zone; prevent that with this Writing device from reading this partly content; yet SafeDisc is when setting up bad rail; all related inspection error code in the pairing inspection of the information data area mistaken ideas is changed in the lump; so imprinting software is when running into bad rail part; all directly skip this partly; directly read corresponding thereafter inspection error code; also by the calculation function that its software inhouse had, reduce the original data content of bad rail part, thus but the cd resource content that complete copy SafeDisc is protected.Therefore,, develop and have the anti-copy mechanism that the time of cracking is long or be difficult to crack how at the pirate gimmick of making rapid progress, so continuous and effective prevent the pirate behavior that is becoming increasingly rampant, be technical matters anxious to be solved at present.
Summary of the invention
For overcoming the shortcoming of above-mentioned prior art; fundamental purpose of the present invention is in order to a kind of data of optical disk guard method to be provided; it is with the data enciphering hiding after the change and keeps original inspection error code; produce wrong backup data to mislead imprinting software via the inspection error code, reach the purpose of protection cd resource.
Data of optical disk guard method of the present invention is to comprise: (1) chooses earlier a plurality of sectors in depositing the CD of data; (2) content of the contained data field in sector is changed and kept the more pairing inspection error code of changed information; (3) data after upgrading is given enciphering hiding, and set up one and destroy rail; And (4) interlink the anti-copy mechanism that this guard method constitutes formation one protection chain on CD with a plurality of anti-copy technology.
Accept above-mentioned, the present invention is a kind of data of optical disk guard method, be to prevent that anyone is under the situation without legal authorization, the inner stored data content of any copy, this method at first is on the CD that will protect, the selected part sector is to add the anti-copy mechanism that this method forms of using to the contained partial data field in these sectors; Wherein,, each data field all is made up of information data area and inspection mistaken ideas; Then promptly change the data of depositing in the information data area; but will keep the original stored inspection error code in inspection mistaken ideas; subsequently; again the information data area that modification is finished carry out encipherment protection and and then set up one and destroy rail; directly calculating out the data of depositing the data field by the inspection error code that is kept with misleading imprinting software is also duplicated; can prevent that imprinting software from duplicating obtains correct data field and deposits data; on the other hand; the preventing mechanism that utilizes guard method of the present invention to constitute; can be combined into a protection chain that can pin down each other with other data protection technology; can prolong the robber copier and duplicate the required time; even increase it and crack difficulty, so as to effective protection cd resource under unwarranted situation by artificial illegal use.
Description of drawings
Fig. 1 is a process flow diagram, shows the required every program circuit that carries out when guard method of the present invention is applied in the data of optical disk protection;
Fig. 2 is a data field synoptic diagram;
Process flow diagram shown in Figure 3 is the protection process when guard method of the present invention is described with other anti-copy technical tie-up protection cd resource; And
Shown in Figure 4 is the protection chain synoptic diagram that guard method of the present invention and other anti-copy technology are constituted.
Embodiment
Embodiment
In following examples, data of optical disk guard method of the present invention is to provide an anti-copy mechanism (form of CD can be CD, VCD, DVD etc.) for the data on the CD, unwarranted anyone can't the complete copy optic disc storage data content, prevent that cd resource is by any pirate of people; Fig. 1 is a process flow diagram, shows the required every program circuit that carries out when guard method of the present invention is applied in the protection cd resource; As shown in the figure; data of optical disk guard method of the present invention is that (figure is mark not on the original disc stamper that will be protected in advance; below slightly be called original stamper) put into an erasable device (figure mark); wherein; this erasable device is arranged on one and can carries out in the information equipment of data of optical disk guard method of the present invention, then proceeds to step S2.
In step S2, the sector 1 that makes this erasable device choose in original stamper will adding safeguard measure (can be a plurality of sectors, the way of all the other sectors is all identical, so only sector 1 is narrated herein), also in selected sector 1, select data field 10 as shown in Figure 2 separately; Wherein, this data field 10 includes information data area 11 and inspection mistaken ideas 12 in addition, then proceeds to step S3.
In step S3, the part information value that change information data area 11 is contained for example supposes that data value that original information data area is deposited is 10011001, the inspection error code is 1010, now changes 11111111 into, but still keep the contained original inspection error code 1010 in inspection mistaken ideas 12, then proceed to step S4.
In step S4, the data that information data area 11 is deposited is encrypted, hide to be made safeguard measures such as bad rail, so as to misleading the imprinting software that will carry out the operation of pirate shellfish, read action via what Writing device carried out, then proceed to step S5.
In step S5; the anti-copy mechanism that guard method of the present invention constitutes will be used; choose a plurality of different anti-copy technology by claimed data formats; destroy rail etc. as numeral authentication, super large file, hidden file, entity; be linked into a protection chain that can pin down pirate shellfish progress mutually, form data of optical disk protection with complete copy-proof function.
In sum, single with regard to data of optical disk guard method of the present invention, after it is the data field of in advance choosing in a plurality of sectors, the data of contained information data area in the change data field, kept the original inspection error code of examining mistaken ideas, the information data area that to change is made into a bad rail again, order is used CD of the present invention when unwarranted Writing device bootlegging, when Writing device reads to when being established as the part of bad rail by the present invention, the imprinting software that it cooperated can think that this data partly is damage or non-existent, the inspection error code that makes Writing device directly read being attached to thereafter, to calculate the original data value of this part by imprinting software, but because of the stored data of information data area is changed, but its additional inspection error code is not made amendment synchronously, then imprinting software is through an old information of calculating before the result drawn is to be modified thus, the data of example information data area was that 10011001 inspection error codes are 1010 originally, after be revised as 11111111, the inspection error code still is 1010, so the data of the same information data area that pirate shellfish device duplicates will be still 10011001 rather than 11111111, therefore can't carry out the data content of being duplicated smoothly; Do not extrapolate the imprinting software of bad rail part information in addition with the inspection error code for other, it be with read that the part of thinking bad rail is whole is duplicated, utilize algorithm contained in the imprinting software again and with reference to related data, produce one voluntarily and replace bad rail data partly, common its accuracy as a result that produces by this way, all the result who gets than being calculated by the inspection error code is high, yet this phenomenon also is desirable result for the purpose of the present invention, this is because these softwares are that refinement is true, bragging about is reading district by district of each each sector, sector, yet in fact, for increasing the speed of copy data, the mode that it is still to jump the district reads the data that it will copy.But because of the present invention makes amendment to the data of information data area part; so read the obtained data of mode to jump the district by these softwares; can't comprise the data of having been changed by the present invention fully; adding its employed calculation mode can not handle the data of more correcting one's mistakes as parameter, the cd resource of therefore still can't complete copy being protected by the present invention.
Below cooperate Fig. 3 and Fig. 4, describe the protection chain that anti-copy mechanism provided by the invention and a plurality of anti-copy technology are constituted in detail, at the detailed process that prevents the action of pirate shellfish.Shown in Figure 4 is the protection chain synoptic diagram that guard method of the present invention and other anti-copy technology constitute; as shown in the figure; wherein 5 circles of Xian Shiing are to represent dissimilar anti-copy technology respectively; A is a digital authenticating; B is the super large file; C is that hidden file, D are that entity destroys rail, E then is that (the present invention can form the protection chain with a plurality of anti-copy technology collocation to method of the present invention; only illustrating with 5 anti-copy technology at this, is not in order to limit the attachable anti-copy type of skill of the present invention and quantity).These 5 kinds of protection chains that the link of anti-copy technology forms are to support and to pin down any illegal pirate shellfish action mutually to each other.Process flow diagram as shown in Figure 3 is in order to illustrate that guard method of the present invention is with other anti-copy technology; required protection process during the Combined Protection cd resource; so at first be noted that; the anti-copy technology that guard method of the present invention linked; be can be by claimed data formats (as CD, VCD, DVD); flexibly select suitable guard technology to connect, at this, it is in order to protect a game optical disk that guard method of the present invention links the protection chain that forms with other anti-copy technology.In step S1, when unwarranted robber copier will illegally duplicate the data content of this game optical disk, this CD of depositing Games Software can activate the protection chain that it had immediately, then proceeds to step S2.
In step S2, make this protection chain carry out the corresponding operation that pins down according to the mode that cracks of stealing copier's use, as shown in Figure 3, crack the anti-copy mechanism that the super large file is constituted if steal the copier, then released hidden file anti-copy technology, pind down the reproduction speed of stealing the copier, by that analogy, if the hidden file method is still failed, destroy rail by entity again and create a diversion stealing the copier, then proceed to step S3.
In step S3, be by protection shown in Figure 3 order, continue stealing copier's operation that creates a diversion.
Claims (8)
1. a data of optical disk guard method is characterized in that, this guard method comprises:
Earlier choose a plurality of data fields depositing on the CD sector of data, wherein this data field is made up of first storage area and second storage area;
Change storing data of first storage area; And
In the middle adding safeguard measure of first storage area and keep the source book of second storage area.
2. data of optical disk guard method as claimed in claim 1 is characterized in that, this method can link a plurality of different anti-copy technology by the form of optic disc storage data, forms a protection chain.
3. data of optical disk guard method as claimed in claim 2 is characterized in that, this anti-copy technology can be any one in digital authenticating, super large file, hidden file, the entity destruction rail composition group.
4. data of optical disk guard method as claimed in claim 1 is characterized in that, this safeguard measure is meant enciphering hiding and sets up bad rail.
5. data of optical disk guard method as claimed in claim 2 is characterized in that, this data formats can be DVD, VCD and CD one of them.
6. data of optical disk guard method as claimed in claim 1 is characterized in that, this first storage area is an information data area.
7. data of optical disk guard method as claimed in claim 1 is characterized in that, this second storage area is inspection mistaken ideas.
8. data of optical disk guard method as claimed in claim 1 is characterized in that, the source book of this second storage area is meant original inspection error code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310122451 CN1632873A (en) | 2003-12-22 | 2003-12-22 | Optical disk data protecting method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200310122451 CN1632873A (en) | 2003-12-22 | 2003-12-22 | Optical disk data protecting method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1632873A true CN1632873A (en) | 2005-06-29 |
Family
ID=34844512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200310122451 Pending CN1632873A (en) | 2003-12-22 | 2003-12-22 | Optical disk data protecting method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1632873A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100449559C (en) * | 2006-06-14 | 2009-01-07 | 张敏达 | Data protection system of control supervisor data enter point |
CN101587723B (en) * | 2008-05-19 | 2011-12-28 | 中盾信安科技(北京)有限公司 | Anti-copy optical storage medium and manufacturing method thereof |
CN102110201B (en) * | 2009-12-28 | 2013-01-30 | 北京中讯锐尔科技有限公司 | System for monitoring and auditing compact disc burning |
-
2003
- 2003-12-22 CN CN 200310122451 patent/CN1632873A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100449559C (en) * | 2006-06-14 | 2009-01-07 | 张敏达 | Data protection system of control supervisor data enter point |
CN101587723B (en) * | 2008-05-19 | 2011-12-28 | 中盾信安科技(北京)有限公司 | Anti-copy optical storage medium and manufacturing method thereof |
CN102110201B (en) * | 2009-12-28 | 2013-01-30 | 北京中讯锐尔科技有限公司 | System for monitoring and auditing compact disc burning |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR20040077435A (en) | Data copy-protecting system for creating a copy-secured optical disc and corresponding protecting method | |
CN1222855C (en) | System for ensuring digital data allocation and playback security | |
US6748537B2 (en) | System and method for controlling the use and duplication of digital content distributed on removable media | |
EP1839404B1 (en) | System and method for controlling access to protected digital content by verification of a media key block | |
CN1263026C (en) | Method and device for controlling distribution and use of digital works | |
KR100336253B1 (en) | Method of providing an optical data carrier with identity information | |
US20020067674A1 (en) | Method and system for authenticating an optical disc using purposefully provided data errors | |
US7339869B2 (en) | Optical disk and optical method | |
KR100895377B1 (en) | Information recording medium, usage management method, and usage management apparatus | |
US6101476A (en) | CD-ROM software protection system | |
AU733297B2 (en) | A CD-ROM software protection system | |
KR101164564B1 (en) | Computer enabled method and apparatus to inhibit content and other copying | |
US20090285070A1 (en) | Copy-protected optical storage media and method for producing the same | |
CN1632873A (en) | Optical disk data protecting method | |
CN101317227B (en) | Player equipment and system containing record carrier and player equipment | |
CN101587723B (en) | Anti-copy optical storage medium and manufacturing method thereof | |
Xu et al. | Content protection and usage control for digital music | |
JP4144471B2 (en) | Information processing apparatus, information recording medium, information processing method, and computer program | |
WO2004057580A2 (en) | Copy protected optical media storage device, along with methodologies for manufacturing and authenticating the same | |
CA2436153A1 (en) | Method and system for authenticating an optical disc using purposefully provided data errors | |
Kolata | Scheme to foil software pirates | |
WO2003100556A2 (en) | Cd media anti-piracy generation and management system and process | |
AU2002247036A1 (en) | Method and system for authenticating an optical disc using purposefully provided data errrors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |