MXPA97005402A - System of protection of software (programs) of cd- - Google Patents

System of protection of software (programs) of cd-

Info

Publication number
MXPA97005402A
MXPA97005402A MXPA/A/1997/005402A MX9705402A MXPA97005402A MX PA97005402 A MXPA97005402 A MX PA97005402A MX 9705402 A MX9705402 A MX 9705402A MX PA97005402 A MXPA97005402 A MX PA97005402A
Authority
MX
Mexico
Prior art keywords
ring
protection
rom
programs
application
Prior art date
Application number
MXPA/A/1997/005402A
Other languages
Spanish (es)
Other versions
MX9705402A (en
Inventor
Skalkos Petros
Kamatakis John
Kamatakis Nikolaos
Original Assignee
Mls Laserlock International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GR950100366A external-priority patent/GR1003432B/en
Application filed by Mls Laserlock International Inc filed Critical Mls Laserlock International Inc
Publication of MXPA97005402A publication Critical patent/MXPA97005402A/en
Publication of MX9705402A publication Critical patent/MX9705402A/en

Links

Abstract

This CD-ROM Software Protection System (programs) prevents illegal duplication ("hacking") with a negligible increase in the cost of the protected Application. The same CD-ROM that contains the Application Software (program) serves as a "protection key". The CD-ROM disk undergoes a special treatment during its production phase that results in the generation of the Inspection Ring. The existence of the Inspection Ring together with the use of the authenticity verification procedure makes it impossible to duplicate the CD-ROM disc even with the most advanced recording equipment. This system has many advantages over other protection methods such as: excellent protection, transparency to the end user and very low cost since the "protection key" is the same CD-ROM that contains the Application. This system can be used for the Protection of each Software Application (programs) for compatible PCs, which is stored on a CD-ROM and runs under the environment of DOS or Windo

Description

SYSTEM OF PROTECTION OF SOFTWARE (PROGRAMS) OF CD-ROM BACKGROUND OF THE INVENTION This system is used for the protection of CD-ROM software (programs) (for computers compatible with PC's) against illicit duplication. This method can be used for CDs of any size and any CD-ROM format. This system prevents the illegal duplication of programs that use a specially processed CD-ROM as a "protection key". It provides a high level of protection for the programs, since it is not possible to duplicate said CD-ROM due to the existence of an advanced method for verifying the authenticity of the CD-ROM.
This system is made up of two parts: a) The specially manufactured CD-ROM. b) The System Program that verifies the authenticity of the CD-ROM.
DESCRIPTION OF THE INVENTION Modification of the Protected Application Program.
The Protected Application Program (hereinafter "Application Code") in conjunction with the Special Protection Program (hereinafter "Protection Code") forms a new Compound Application Code. The Protection Code precedes the Application Code for the purpose of carrying out the initial verification of the authenticity of the CD-ROM before executing the Application Code.
The integration of the Protection Code into the Application Code can be carried out in the form of an objective code or an executable code.
Production of "Glass Master".
The Compound Application Code resulting from the procedure established in the Modification of the Protected Application Program, along with the other Application files, is duplicated in the "Glass Master" with the use of special CAD / CAM tools that control said process. Special attention is given to the distribution of the programs to the "Glass Master". As can be seen in drawing 1 that shows the "Glass Master", a specific ring (3) of a few millimeters in width is reserved, in order to mechanically process the central region (4) in a subsequent step, while the adjacent areas on both sides contain the Encrypted Special Information and Protection Code verified by the Protection Code. In the following said area will be called Protection Ring (3). The Application Code and Information are stored in areas (1) and (2) of the "Glass Master".
Mechanical processing of the "Glass Master".
In this stage a special mechanical treatment is given to the "Glass Master" with the use of special equipment used in its manufacture. Thus, a homocentric ring (4) of 10 μm wide is produced within the central part of the Protection Ring. This ring marks the specific region and it is revised with the Protection Code in order to verify the authenticity of the CD-ROM disc, which will be called Inspection Ring (4). The polar coordinates of the Inspection Ring are extremely important for verification of the authenticity of the CD-ROM. These parameters are included in the Protection Code Information, because the polar coordinates of the Inspection Ring are predetermined.
This special treatment can only be carried out with the special use of the CAD / CAM package that controls the "Glass Master" production machine. In Drawing 1 you can see the Inspection Ring (4) that shows the special "Glass Master" that contains the Software Protection System (programs). The Application Code Compound with the Information is stored in the adjacent areas (1) and (2) to the Protection Ring (3) on both sides. The Inspection Ring (4) is located in the center of the Protection Ring (3). The "Glass Master" (Drawing 1) is subsequently used for the production of CD-ROMs with special machines ("stampers" Although this special processing refers to the "Glass Master" CD-ROM, and it can be applied to any type of optical disc without taking into account the size and format of it.
The Operation of the Software Protection System (programs).
The Protection Code.
The Protection Code is created in Assembler language for Intel 80 x 86 microprocessors and was developed with the use of the "Borland Turbo" Assembler. The "Microsoft Linker" was also used in the "linking" process. The Protection Code is combined with the Application Code in an objective or executable way.
Functional Operation of the Protection System.
The Software Protection System (programs) requires the presence of the original CD-ROM disc in the CD drive, regardless of the duplication of the Application on the hard disk or the execution of the CD disc. In the execution of the Application, the Protection Code is initially executed for inspection purposes of the Protection Ring, as well as the decoding of the polar coordinates of the Inspection Ring. Subsequently, it is checked that the Inspection Ring is in the predefined position, verifying the authenticity of the CD-ROM. If the CD-ROM is not original, the execution is terminated and the user receives the corresponding message. Special attention should be given during the program development stage to avoid that the verification process causes conflict with the operation of the driver of the CD-ROM drive.
After verifying the authenticity of the CD-ROM, the execution of the application in DOS or Windows environment is allowed. In case of absence of the original CD-ROM, the application is not executed, for which the respective message appears on the user's screen.
A high level of protection can be achieved due to the impossibility of duplicating the original CD-ROM. This is due to the existence of the Inspection Ring on the disk, CD-ROM. The most common ways to illegally duplicate CD-ROMs are as follows: a) Duplication of CD-ROM by means of CDR equipment. b) Duplication of the "Glass Master" and its reproduction. c) Duplication of applications on hard disk. d) Decoding of the Protection Code through the use of a "Debugger" of Equipment or Programs.
Cases (a), (b) & (c) are prevented with the help of the Inspection Ring that as a destroyed area results in the failure of each possible recording procedure. The case (d) is prevented due to the unique integration of the authenticity verification procedure to the Application Program in such a way that decoding by programmers or pirates is impossible. In particular, the Protection Code prevents the introduction of stop marks with the use of a "Debugger" of equipment and programs, thus resulting in the impossibility of decoding the protected program.

Claims (17)

CLAIMS Having described the invention, it is considered a novelty and therefore the content of the following clauses is claimed:
1. System for the protection of DOS and Windows applications of illegal duplication, based on the use of a specially processed CD-ROM disk that can not be duplicated due to the special treatment given in a small area of the surface of said disk with the use of "Glass Master" equipment. Said treatment results in the permanent destruction of the optical properties of said special area.
2. Software Protection System (programs), according to claim I, characterized by the treatment given to a predefined position, inside a homocentric ring of a specific width (Ring of Inspection).
3. Software Protection System (programs), according to claims I and II, that the special region reserved on the disk of the CD-ROM (Inspection Ring) has predefined polar coordinates that are stored as encrypted information in a reserved area of the disc (Protection Ring).
4. Software Protection System (programs), according to claims I and III, which during its operation, the position of the Inspection Ring is detected and the polar coordinates are compared with the predefined coordinates stored in the disk during the production stage . If the identified coordinates turn out to be the same, the authenticity of the disk is verified, and otherwise the disk is considered an illegal copy and the installation and execution operations are canceled. Software Protection System (programs), according to claims I and IV, which is characterized by the fact that the verification of authenticity is carried out before the implementation of the Protected Application, thus avoiding the requirement of the presence of an original CD-ROM disc in the unit for verification purposes. AMENDED CLAIMS [received by the International Bureau on January 28, 1997 (28.01.97); original claims 1-5 replaced by amended claims 1-17 (3 pages)] 1. A method for the protection of DOS and Windows applications of illegal duplication based on the use of a CD-ROM or specially processed DVD-ROM disc that can not be duplicated by any CD-ROM recording equipment due to the special treatment that It is given to a small area of the surface of the disk with the use of "Glass Master" equipment. 2. A CD-ROM disc according to claim 1, in which one or more areas (Protection Rings) are reserved that are homocentric rings for a special treatment with "Glass Master" equipment and storage of encrypted information. 3. A CD-ROM disc according to claim 2, wherein the permanent destruction of the optical properties of one or more specific areas of the ring in the center of the reserved areas (Inspection Rings) of the "Glass Master" is achieved with the use of "Master" equipment, creating a continuous spiral down in the form of a continuous "abyss". . A mark according to claim 3 which is a ring of non-standardized format (Inspection Ring) that can only be accessed by special methods of programs.
5. A mark according to claim 3 in which any attempt to access said ring (Inspection Ring) with special programs will result in the issuance of a specific error code message by the operating system.
6. A CD-ROM disc according to claim 3, wherein the reserved areas of the Protection Ring adjacent to the Inspection Ring contain coded information that includes the precise polar coordinates of the Inspection Ring and encrypted information about the program of Protected application.
7. A method according to claim 3, in which the specially processed ring (s) is reproduced by means of the CD manufacturing process in successive order from the original "Glass Master" to that of the "Father Stamper CD", from "Mother Stamper CD", to "Production Stamper CD" and to the CDs finally produced and distributed in the market.
8. A CD-ROM disc according to claim 2; in which the CD area to which no special treatment is given (Application Rings) has a standard CD-ROM or DVD-ROM format and may be used for information storage. This disc contains the Code and Application Information.
. A CD-ROM disc according to claim 3 characterized by the treatment given to a predefined position, in a homocentric ring of a specific width (Inspection Ring).
10. A CD-ROM disk according to claim 8; in which the CD, following the radial direction towards the circumference, contains an area that has an Application and Information Code (Application Ring), followed by one or several Protection Rings in alternative succession with the Application Rings. Each Protection Ring has a precise width and a specific place on the CD-ROM. According to this model, the external and internal rings are in any case Application Rings that contain the Application and Information Code.
11. A Software Protection System (programs) according to claims 1; in which the "Algorithm" (Protection Code) is implemented at the beginning of the Application Code, thus forming a Compound Application Code that is distributed to the areas of the Application Ring.
12. A Software Protection System (programs) according to claim 11, in which the information encrypted and stored in the Protection Ring indicating the precise polar coordinates of the Inspection Ring are also found in the Protection Code part of the Application Code Compound.
A Software Protection System (programs) according to claims 1 and 10; in which the operation of the same follows the steps mentioned below: Check the position of the Inspection Ring (or Rings in the case of using several) and measure the polar coordinates of it. Compare the polar coordinates measured with the predefined coordinates stored in the disk during the production stage in the Ring of Protection (or Rings). Compare the polar coordinates measured with those predefined in the Protection Code. If both comparisons agree, the authenticity of the disk is verified, and otherwise the disk will be considered as an illegal copy and the installation and / or execution will be canceled.
A Software Protection System (programs) according to claim 13; in which the Protection Code accesses the Ring area of Inspection and verifies the completion of a predefined error code message.
5. A Software Protection System (programs) according to claim 13; in which the operation of the same follows the steps mentioned below. Check the position of the Protection Ring (or Rings if several are used) and measure the polar coordinates and width of it. Compare the polar coordinates measured with those predefined in the Protection Code. If both comparisons agree, the authenticity of the disk is verified, and otherwise the disk will be considered as an illegal copy and the installation and / or execution will be canceled.
16. A Software Protection System (programs) according to claim 13 characterized by authenticity verification that is carried out before the execution of the Protected Application, thus avoiding the need to have the original CD-ROM disk in the CD unit for verification purposes.
17. A Software Protection System (programs) according to claims 1 and 13, in which the Protection Code is transparent to the user and has an autonomous operation that does not require the provision of special codes by authorized dealers of the program of protected application.
MX9705402A 1995-10-16 1996-05-28 A cd-rom software protection system. MX9705402A (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
GR950100366 1995-10-16
GR950100366A GR1003432B (en) 1995-10-16 1995-10-16 System for the protection of the software of an optical disk
PCT/GR1996/000013 WO1997015051A1 (en) 1995-10-16 1996-05-28 A cd-rom software protection system

Publications (2)

Publication Number Publication Date
MXPA97005402A true MXPA97005402A (en) 1998-02-01
MX9705402A MX9705402A (en) 1998-02-28

Family

ID=10941975

Family Applications (1)

Application Number Title Priority Date Filing Date
MX9705402A MX9705402A (en) 1995-10-16 1996-05-28 A cd-rom software protection system.

Country Status (13)

Country Link
EP (1) EP0804791B1 (en)
CN (1) CN1173945A (en)
AT (1) ATE237180T1 (en)
AU (1) AU733297B2 (en)
BG (1) BG63441B1 (en)
CA (1) CA2210735A1 (en)
DE (1) DE69627303T2 (en)
EA (1) EA001371B1 (en)
ES (1) ES2197237T3 (en)
GR (1) GR1003432B (en)
HU (1) HUP0101371A2 (en)
MX (1) MX9705402A (en)
WO (1) WO1997015051A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6957341B2 (en) 1998-05-14 2005-10-18 Purdue Research Foundation Method and system for secure computational outsourcing and disguise
FR2787232B1 (en) * 1998-12-15 2001-02-23 Thomson Csf ANTI-HACK OPTICAL RECORDING DISC AND METHOD FOR PLAYING SUCH A DISC
GB9827831D0 (en) 1998-12-17 1999-02-10 Tribeka Ltd Method and apparatus for the distribution of digitised information on demand
ES2151452B1 (en) * 1999-04-20 2001-07-16 Sonopress Ibermemory S A CD-ROM RECORDING AND READING PROCEDURE TO AVOID YOUR COPY.
US7287166B1 (en) 1999-09-03 2007-10-23 Purdue Research Foundation Guards for application in software tamperproofing
US7757097B2 (en) 1999-09-03 2010-07-13 Purdue Research Foundation Method and system for tamperproofing software
ES2180411B1 (en) * 2001-02-23 2004-06-01 Mpo Iberica, S.A. ANTI-COPY PROTECTION SYSTEM FOR CD ROM AND / OR DVD ROM.
US8510571B1 (en) 2003-03-24 2013-08-13 Hoi Chang System and method for inserting security mechanisms into a software program
CN100362465C (en) * 2004-10-08 2008-01-16 日本胜利株式会社 Information recording method and optical disk
ES2288432B1 (en) * 2007-02-15 2009-04-01 Sonopress Ibermemory S.A. RECORDING PROCEDURE

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3720233A1 (en) * 1987-06-12 1988-12-22 Thomas Keese Copy protection for data processing programs
EP0711479A4 (en) * 1993-07-26 1996-10-02 Elonex Technologies Inc Cd prom encryption system
US5400319A (en) * 1993-10-06 1995-03-21 Digital Audio Disc Corporation CD-ROM with machine-readable I.D. code

Similar Documents

Publication Publication Date Title
CA2245232C (en) Optical disc copy management system
US5703858A (en) System for encoding a glass master to enable detection of a counterfeit optical CD-ROM
TW399200B (en) Method for copy protecting a record carrier, copy protected record carrier and means for detecting access control information
KR20040077435A (en) Data copy-protecting system for creating a copy-secured optical disc and corresponding protecting method
US6076165A (en) Method for authenticating digital recording devices
US6101476A (en) CD-ROM software protection system
WO2002043065A3 (en) A copy protected dvd disc and method for producing and validating same
US20020067674A1 (en) Method and system for authenticating an optical disc using purposefully provided data errors
US20060123483A1 (en) Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media
MXPA97005402A (en) System of protection of software (programs) of cd-
KR20000023570A (en) Method of providing an optical data carrier with identity information
EP0804791B1 (en) A cd-rom software protection system
JP2002304809A (en) Copy protection using a preformed id and a unique id on a programmable cd-rom
US20090285070A1 (en) Copy-protected optical storage media and method for producing the same
CN101849239A (en) Computer enabled method and apparatus to inhibit content and other copying
CN101587723B (en) Anti-copy optical storage medium and manufacturing method thereof
US20060136746A1 (en) Security system for preventing unauthorized copying of digital data
US20030018907A1 (en) Content protection for digital media
US6452886B1 (en) Antihacking optical recording disc and method for reading same
JP4597651B2 (en) Information processing unit, method and program for controlling ripping of data in media
US20060253722A1 (en) Uncopyable optical media through sector errors
WO2002059881A9 (en) Method and system for authenticating an optical disc using purposefully provided data errors
JP2001034539A (en) Floppy disk, system and method for illegal use prevention, and medium
CA2267516A1 (en) Method for preventing unauthorized copying of digital media
JPH0449423A (en) Method for preventing software from being illegally copied