EP1966795A2 - Verfahren zum schreiben von daten mit einem charakteristischen merkmal - Google Patents
Verfahren zum schreiben von daten mit einem charakteristischen merkmalInfo
- Publication number
- EP1966795A2 EP1966795A2 EP06842519A EP06842519A EP1966795A2 EP 1966795 A2 EP1966795 A2 EP 1966795A2 EP 06842519 A EP06842519 A EP 06842519A EP 06842519 A EP06842519 A EP 06842519A EP 1966795 A2 EP1966795 A2 EP 1966795A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- fingerprint data
- written pattern
- record carrier
- recording track
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 88
- 230000008569 process Effects 0.000 abstract description 13
- 238000007796 conventional method Methods 0.000 abstract 1
- 238000000605 extraction Methods 0.000 description 9
- 230000003287 optical effect Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000006073 displacement reaction Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 238000013075 data extraction Methods 0.000 description 3
- 238000009795 derivation Methods 0.000 description 3
- 238000005070 sampling Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000001228 spectrum Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000005415 magnetization Effects 0.000 description 1
- 238000002310 reflectometry Methods 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
- 230000003595 spectral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B19/00—Driving, starting, stopping record carriers not specifically of filamentary or web form, or of supports therefor; Control thereof; Control of operating function ; Driving both disc and head
- G11B19/02—Control of operating function, e.g. switching from recording to reproducing
- G11B19/12—Control of operating function, e.g. switching from recording to reproducing by sensing distinguishing features of or on records, e.g. diameter end mark
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00369—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier wherein a first key, which is usually stored on a hidden channel, e.g. in the lead-in of a BD-R, unlocks a key locker containing a second
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00572—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
- G11B20/00586—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00572—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
- G11B20/00586—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
- G11B20/00594—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium wherein the shape of recording marks is altered, e.g. the depth, width, or length of pits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00572—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
- G11B20/00586—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium
- G11B20/00601—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the physical format of the recording medium wherein properties of tracks are altered, e.g., by changing the wobble pattern or the track pitch, or by adding interruptions or eccentricity
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00731—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction
- G11B20/00746—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number
- G11B20/00797—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a digital rights management system for enforcing a usage restriction wherein the usage restriction can be expressed as a specific number wherein the usage restriction limits the number of times a content can be reproduced, e.g. using playback counters
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B23/00—Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
- G11B23/28—Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs
Definitions
- the invention relates to a method of writing data on a record carrier and to a corresponding method of extracting fingerprint data.
- the invention further relates to an apparatus for writing data on a record carrier and to a corresponding apparatus for extracting fingerprint data.
- the invention further relates to a record carrier having data recorded thereon from which data fingerprint data can be extracted.
- DRM Windows-Media Digital Rights Management
- Network-centric the rights are stored securely on a dedicated server in a network. Devices wanting to access content consult the server to obtain (and if necessary update) the rights.
- the server might reside somewhere on the Internet (e.g. at the content owner's), or in a home network. This DRM category requires devices to be (almost) always on-line when accessing content.
- Device-centric the rights are stored securely inside a fixed playback or storage device (e.g. a PC on which the content resides).
- a device wanting to access content administers the rights itself.
- the consequence of this DRM category is that content is always locked to a single device.
- the MusicMatch- and the original Windows DRM service are examples of such systems.
- consumable rights are rights which typically get more restrictive every time the content is consumed, e.g. play 4x, or record 3x.
- the save-and-restore attack goes as follows: content with corresponding digital rights is purchased and legitimately downloaded onto the storage medium; the attacker makes a temporary bit-copy of the storage medium ("image") onto some other storage medium, such as a hard-disc drive (HDD); - the original storage medium is "consumed", i.e. used normally, which means that the rights decrement in some sense; at any given moment the attacker can restore the original rights by copying back the image from the alternate storage (HDD).
- a method to resolve this hack is disclosed in WO02/015184 Al.
- a hidden channel (HC) as a side-channel is introduced.
- a side-channel is a method to store additional information on a recording medium by exploiting the fact that multiple read-out signals represent the same user-data pattern (data available to the user).
- E.g. an additional message may be coded in the error-correction parities.
- the error-correction mechanism will remove these parities, so the user does not see any difference, but dedicated circuitry preceding the error-correction mechanism does.
- the information capacity of the medium has been increased at the expense of decreasing the system's error-correcting capacity.
- the HC is a side-channel on the storage medium containing information which observes the constraint that it cannot be written by the user but only by some compliant DRM application, and is therefore lost in bit-copies.
- Simple examples are data stored in sector headers and certain parts of the lead-in area.
- More sophisticated examples are redundancies in the standard for the storage medium, in which information is stored by making a particular choice for such a redundancy, e.g. selecting certain merging bit patterns on CD, or specific trends in the DSV (digital sum value, the running sum of channel-bits) on a DVD as, for instance, described in US 5,828,754, or intentional errors in sector data (which can be corrected by the redundant ECC-symbols).
- Yet another example is information stored in slow variations of the channel-bit clock as, for instance, described in US 5,737,286.
- the HC is used as follows: 1. when the digital rights are updated (created or overwritten), a new random data-string is chosen and recorded into the HC;
- the new values of the digital rights are cryptographically bound to (amongst other things) the data- string written into the HC.
- An example would be constructing a key which depends on the HC-payload, and applying a digital signature to the digital rights with this key; or alternatively to encrypt the digital rights with this key.
- the signature could be either based on symmetric key cryptography (a so-called Message Authentication Code, or MAC), or public key cryptography (e.g. DSA-, or RSA-based signatures).
- the following check is performed using the HC: (i) when the digital rights are read, the data-string is retrieved from the HC; (ii) the key from step 2 above which depends on the HC data- string is re-created and used to verify the cryptographic relationship between the digital rights and the HC (either check the signature on the digital-rights, or decrypt the digital rights).
- Step (ii) prevents the save-and-restore attack: the image, including the original digital rights may be restored by the attacker, but the HC cannot, therefore the check in step (ii) fails.
- Rights and content keys can be protected in a Key Locker which in turn is protected by a Key Locker Key, which depends (partially) on the payload of a HC.
- a Key Locker Key which depends (partially) on the payload of a HC.
- the system known from WO 02/015184 suffers from a disadvantage: because this known system relies on a universal secret present in every consumer device, viz. the algorithm by which bits are stored in the hidden channel.
- a distinctive feature of a written pattern can be represented by channel-bit errors of predetermined data recorded on said record carrier, or from the positions of the zero-crossings of a read-out signal with respect to channel bit boundaries of predetermined data recorded on said record carrier, or from the highest or lowest values, respectively, at a predetermined position of predetermined data recorded on said record carrier.
- the "fingerprint" of a written pattern is a feature by which the written pattern can be distinguished from any other written pattern, even when representing the same data.
- the fingerprint is obtained as result of some non-controlled process, in this case is inherent to the writing process, so that it is either impossible or unfeasible to record a pattern having a desired fingerprint. It is a first object of the present invention to provide a method of writing data on a record carrier, by which fingerprint data can be extracted in an alternative manner, and a corresponding method of extracting fingerprint data.
- the first object is achieved by a method of writing data as claimed in claim 1 , and by a corresponding method for extracting fingerprint data as claimed in claim 7.
- the distinctive feature of the written pattern from which the fingerprint data is extracted is its radial offset from the recording track. While according to the prior art the distinctive feature is found in unavoidable differences between written patterns, resulting as a side effect of the writing process, in the method according to the invention instead, the distinctive feature is purposely created. This has the advantage of making more robust and reliable the extraction of the fingerprint data, since the writing process can be adapted to creating a written pattern where the distinctive feature is sufficiently easy to detect, i.e. a radial offset having a sufficiently high amplitude, or in other words where the distinctive feature can be detected with a sufficiently high signal- to-noise ratio.
- the distinctive feature is created with an uncontrollable and substantially random process, so that it will be generally not possible to record a pattern with a predetermined fingerprint.
- the fingerprint data can then be extracted from this irreproducible feature, for example by measuring the radial displacement at a plurality of fixed sampling positions.
- Fig. 1 shows a schematic diagram of a known method of writing data, a corresponding written pattern, and a known method of extracting fingerprint data
- Fig. 2 shows a schematic diagram of a method of writing data, a corresponding written pattern, and method of extracting fingerprint data according to the invention
- Fig. 3 shows an embodiment of the method of extracting fingerprint according the invention
- Fig. 4 shows an embodiment of the method of writing data according to the invention
- Fig. 5 shows a schematic diagram of a method of authentication making use of the invention
- Fig. 6 shows a method of accessing a record carrier where DRM data are protected using the invention
- Fig. 7 shows an alternative method of protecting data recorded on a record carrier making use of the invention
- Fig. 8 shows a schematic diagram of a tracking control loop in a known apparatus
- Fig. 9 shows an embodiment of a tracking control loop in an apparatus according to the invention
- Fig. 10 shows a further embodiment of a tracking control loop in an apparatus according to the invention.
- Fig. 1 shows a schematic diagram of a known method of writing data, a corresponding written pattern, and a known method of extracting fingerprint data.
- Data 10 are the input of a writing process 11, by which a written pattern 12 is formed on a record carrier.
- the written pattern 12 consists of a sequence of first areas 13 , interleaved by second areas 14, distinguishable from the first areas 13 on the basis of a physical parameter like for example reflectivity, state of magnetization, or electrical charge.
- the first areas 13 and the second areas 14 are present along a recording track 15, and correspond respectively to the logical values 1 and 0, or vice- versa, according to which of the two conventions is adopted.
- the written pattern 12 has to respect some standard specifications given for the relevant type of record carrier, like for instance affecting the width or length of the areas, the steepness of the transition from a first area to a second area and vice- versa, etc..
- some properties can for example refer to: one or more parameters for which there is no standard specification, or one or more parameters for which there is a standard specification, but observed at a level of resolution higher than the one used in the standard specification.
- These properties can be used as distinctive feature or "fingerprint" of the written pattern 12 in a fingerprint extraction process 16 to extract fingerprint data 17, as known from the prior art.
- Fig. 2 shows a schematic diagram of a method of writing data, a corresponding written pattern, and method of extracting fingerprint data according to the invention.
- the writing process 21 is different from the known writing process 11 in that it comprises a perturbation step 23 for imposing an uncontrollable perturbation so as to cause the written pattern 22 which is formed on the record carrier, to have a radial offset 25 from the recording track 15.
- the dimensions shown in the Fig. are chosen merely for comprehension purposes and do not realistically reflect e.g. the proportions involved between the size of first areas 13 and second areas 14, and the entity of the radial offset 25 and its rate of variation. This radial offset 25 shall still remain within the boundary of a maximum radial offset, if any such specification is given.
- the overall trend of the radial offset 25 can thus be used as "fingerprint" of the written pattern 22 in a complementary fingerprint extraction process 26, different from the known fingerprint extraction process 16 in that the fingerprint data 17 are derived in a step of determining the fingerprint data from the radial offset 24 from the recording track 15 of the written pattern 22.
- the fingerprint data 17 may consist for example of a collection of samples of the amplitude of the radial offset 25, measured at predetermined sampling points. These predetermined sampling points may be determined upon a timing and/or synchronization information present in the recording track 15, like in the case of recordable optical discs, where timing and/or synchronization information are present in the recording track 15 in the form of wobble frequency of the track and/or information encoded therein.
- Fig. 3 shows an embodiment of the method of extracting fingerprint data according the invention.
- the method of extracting fingerprint data 17, shown in Fig. 2 is enhanced by a subsequent authentication data derivation step 30 in which authentication data 31 are generated upon the fingerprint data 17; in particular, the authentication data 31 are generated in dependence of the data 10 as well.
- a one-way function like for example a hash function or a cryptographic summary is suitable for use in this authentication data derivation step 30.
- Fig. 4 shows an embodiment of the method of writing data according to the invention.
- the written pattern 22 created with the writing process 21 is used in a subsequent fingerprint extraction process 26 to extract fingerprint data 17.
- These fingerprint data 17 are then stored in a storing step 40 as reference fingerprint data 41, for subsequent use for authentication of the data 10.
- the reference fingerprint data 41 may be recorded as well on the record carrier.
- the reference fingerprint data 41 can be subsequently used in a method of authentication, like schematically shown in Fig. 5, which aim is to establish if data 10 recorded on the record carrier in the form of the written pattern 22 have been manipulated, possibly against the intention of a party involved, for example an owner of the data 10, or an authority which controls the content of the data 10.
- fingerprint data 17, extracted from the written pattern 22 in the fingerprint extraction process 26 are checked for consistency with the reference fingerprint data 41 in a consistency checking step 50.
- the method continues for example with allowing use or full access to the data 10 if these are confirmed to be authentic.
- This method relies on the fact that data 10 recorded on the record carrier may easily be overwritten, but there is at least a technical barrier to overcome in updating the reference fingerprint data 41. Therefore, while the data 10 can easily have been manipulated, the reference fingerprint data 41, which derive from the original data 10, cannot. Therefore, by checking the consistency of the reference fingerprint data 41 and the fingerprint data 17 extracted from the written pattern 22 it can be established if the data 10 are original or not.
- the method can be enhanced by use of a helper data, by use of which the comparison is done on those parts of the fingerprint data 17 that are more reliably consistent at each instance of the fingerprint extraction step 26.
- the method of extracting fingerprint data comprises an authentication data derivation step 30 as shown in Fig. 3, the consistency checking step 50 must be intended as involving the authentication data 31 and reference authentication data.
- Fig. 6 shows a method of accessing a record carrier where DRM data are protected using the invention.
- a record carrier is accessed wherein are recorded a Digital Work (DW), like for example a film which is subject to copyright, and Digital Rights Management (DRM) information, specifying the extent and the conditions under which the DW can be exploited.
- the DRM information may comprise a condition like for example view max. 3 times, view for one month, copy once, etc..
- the original DRM information is protected by writing the DRM information as the data 10 with the method according to the invention, and by having stored reference fingerprint data 41, extracted according to the invention from the written pattern 22 corresponding to the DRM information, for subsequent authentication.
- the method starts with a DRM accessing step 60, for accessing the written pattern 22 corresponding to the DRM information. Subsequently, the DRM information is authenticated in authentication step 61, with the method described in Fig. 5; if the authentication step 61 is not successful the method is terminated, otherwise the method continues with a DRM checking step 62, in which it is verified if the DRM information, which at this point is considered to be authentic, allows access to the DW. If the access to the DW is not allowed the method is terminated, otherwise the method continues with a DW accessing step 63.
- the method may continue with a DRM updating step 64, in which the DRM information is updated, and the DRM information originally written on the record carrier is overwritten with the updated DRM information with the method of writing according to the invention, thereby creating a new written pattern 22'.
- a new fingerprint data 17' is extracted from the new written pattern 22' in the fingerprint data extraction step 26, and the new fingerprint data 17' is stored in the storing step 40 as new reference fingerprint data 41' for authentication during a subsequent instance of this method of accessing the record carrier.
- the DRM updating step 64, the fingerprint data extraction step 26 and the storing step 40 should take place indissolubly together with the DW accessing step 63.
- the invention can also be exploited in an alternative method of protecting data recorded on a record carrier as shown in Fig. 7.
- the fingerprint data 17 are used in a key extraction step 70 to derive an encryption key 71, which is then used in an encryption step 72 to encrypt the DW 73, thereby obtaining and encrypted DW 74.
- the data 10 may be random data having the sole purpose of being used for generating the written pattern 22, however any auxiliary data, for example the DRM information, could be used as the data 10.
- a one-way function is used to obtain the encryption key 71 from the fingerprint data 17.
- the fingerprint data extraction step 26 has inherently the nature of a one-way function, the fingerprint data 17 can be used directly as encryption key 71, clearly subject to considerations on the size of the fingerprint data 17.
- Fig. 8 shows a schematic diagram of a tracking control loop in a known apparatus for writing data on a record carrier.
- a tracking signal 86 reflecting the displacement of writing means from the recording track 15 is compared with a setpoint 80; the resulting tracking error 81 is fed into a controller 82, operating according to some control parameters 83, which generates a control signal 84.
- the control signal 84 is fed into an actuator 85, which physically positions the writing means.
- the tracking signal 86 may be for example the Push-Pull signal.
- Fig. 9 shows how the control loop shown in Fig. 8 is modified in an embodiment of an apparatus according to the invention.
- a disturbance 90 is added to the control signal.
- This disturbance can be generated by use of a noise generator 91, particularly a white noise generator.
- a Band Pass filter 92 may also be present, although in general this Band Pass filter 92 is not necessary because the actuator 85 already effects a spectral shaping of the noise.
- the disturbance 90 will preferably comprise frequency components outside the bandwidth of the control loop.
- the disturbance 90 is preferably designed so that the radial offset 25 has a spectrum distinguished from the spectrum of the wobble.
- FIG. 10 An alternative embodiment of the apparatus according to the invention is shown in Fig. 10.
- the displacement of the writing means is caused by manipulating the control parameters 83 of the controller 82 with a control parameters variation unit 100.
- This manipulation effected may comprise any combination of the following: deliberately using non optimal values for the control parameters 83, - temporarily changing the value of the control parameters 83, and adding to the value of the control parameters 83 a variable component pseudo- randomly generated.
- the invention can be summarized as follows.
- DRM Digital Rights information
- the protection is implemented by linking the DRM to some physical distinctive feature of the corresponding written pattern. From this distinctive feature fingerprint data can be extracted with some agreed method, and used for the authentication of the DRM.
- the invention proposes a method of writing data wherein the formed written pattern has a radial offset, which is formed during writing as result of a non-controllable substantially random process.
- a corresponding apparatus for writing data, a method and an apparatus for extracting fingerprint data and a record carrier are also described.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Storage Device Security (AREA)
- Optical Recording Or Reproduction (AREA)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP06842519A EP1966795A2 (de) | 2005-12-19 | 2006-12-14 | Verfahren zum schreiben von daten mit einem charakteristischen merkmal |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05111999 | 2005-12-19 | ||
EP06842519A EP1966795A2 (de) | 2005-12-19 | 2006-12-14 | Verfahren zum schreiben von daten mit einem charakteristischen merkmal |
PCT/IB2006/054848 WO2007072351A2 (en) | 2005-12-19 | 2006-12-14 | Method for writing data having a distinctive feature |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1966795A2 true EP1966795A2 (de) | 2008-09-10 |
Family
ID=38189051
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP06842519A Withdrawn EP1966795A2 (de) | 2005-12-19 | 2006-12-14 | Verfahren zum schreiben von daten mit einem charakteristischen merkmal |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1966795A2 (de) |
JP (1) | JP2009520309A (de) |
KR (1) | KR20080078726A (de) |
CN (1) | CN101341538A (de) |
TW (1) | TW200802313A (de) |
WO (1) | WO2007072351A2 (de) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8467278B2 (en) | 2008-10-06 | 2013-06-18 | Microsoft Corporation | Protecting optical media using random, moving radio frequency scatterers |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69230168T2 (de) * | 1991-12-02 | 2000-04-20 | Koninklijke Philips Electronics N.V. | Geschlossenes Informationssystem mit Kopierschutz |
JPH08147704A (ja) * | 1994-11-18 | 1996-06-07 | Sony Corp | ディスク状記録媒体、ディスク再生方法及び再生装置 |
US5699434A (en) * | 1995-12-12 | 1997-12-16 | Hewlett-Packard Company | Method of inhibiting copying of digital data |
US6029259A (en) * | 1998-06-15 | 2000-02-22 | T.T.R. Technologies Ltd. | Method and system for authenticating digital optical media |
KR20020042868A (ko) * | 2000-08-16 | 2002-06-07 | 요트.게.아. 롤페즈 | 디지털 저작물의 배포 및 사용을 규제하는 방법 및 장치 |
CA2318310A1 (en) * | 2000-09-01 | 2002-03-01 | Oleg Saliahov | Cd-disk identification through a pattern analysis |
WO2003015088A1 (en) * | 2001-08-10 | 2003-02-20 | Durand Technology Limited | Method of authenticating cds |
JP2003228284A (ja) * | 2002-01-31 | 2003-08-15 | Fujitsu Ltd | データ保存装置、データ保存方法、データ検証装置、データアクセス許可装置、プログラム、記録媒体 |
US7649824B2 (en) * | 2002-07-01 | 2010-01-19 | Panasonic Corporation | Optical storage medium control data region |
-
2006
- 2006-12-14 JP JP2008545233A patent/JP2009520309A/ja not_active Withdrawn
- 2006-12-14 EP EP06842519A patent/EP1966795A2/de not_active Withdrawn
- 2006-12-14 KR KR1020087017509A patent/KR20080078726A/ko not_active Application Discontinuation
- 2006-12-14 CN CNA2006800481081A patent/CN101341538A/zh active Pending
- 2006-12-14 WO PCT/IB2006/054848 patent/WO2007072351A2/en active Application Filing
- 2006-12-15 TW TW095147377A patent/TW200802313A/zh unknown
Non-Patent Citations (1)
Title |
---|
See references of WO2007072351A2 * |
Also Published As
Publication number | Publication date |
---|---|
TW200802313A (en) | 2008-01-01 |
WO2007072351A2 (en) | 2007-06-28 |
KR20080078726A (ko) | 2008-08-27 |
JP2009520309A (ja) | 2009-05-21 |
WO2007072351A3 (en) | 2007-10-25 |
CN101341538A (zh) | 2009-01-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6957343B2 (en) | Validating keying material by using a validation area of read-only media to prevent playback of unauthorized copies of content stored on the media | |
US7057993B2 (en) | Copy protection using multiple security levels on a programmable CD-ROM | |
US20090276635A1 (en) | Controlling distribution and use of digital works | |
KR101305639B1 (ko) | 복제 방지를 위한 비휘발성 저장 장치 및 그 저장 장치의 인증 방법 | |
EA004199B1 (ru) | Носитель данных с возможностью записи информации, имеющий участок защищенных данных | |
EP1590804B1 (de) | Verfahren und vorrichtung zur zuverlässigen zugangskontrolle zu einem speichermedium | |
KR20060056852A (ko) | 저작권 관리 방법, 정보 기록 재생 방법 및 장치, 및 정보기록 매체 및 그 제조 방법 | |
US20050076225A1 (en) | Method and apparatus for verifying the intergrity of system data | |
US20060123483A1 (en) | Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media | |
US20020141583A1 (en) | Copy protection using a preformed ID and a unique ID on a programmable CD-ROM | |
US20080304389A1 (en) | Method for Recording Data Having a Distinctive Feature | |
JP2008527892A (ja) | セキュアホストインタフェース | |
US20120066513A1 (en) | Method and apparatus for authenticating a non-volatile memory device | |
EP1966795A2 (de) | Verfahren zum schreiben von daten mit einem charakteristischen merkmal | |
US20060253722A1 (en) | Uncopyable optical media through sector errors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20080721 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN |
|
18W | Application withdrawn |
Effective date: 20081204 |