TW470933B - Method and apparatus against pirated copy of digital format data - Google Patents
Method and apparatus against pirated copy of digital format data Download PDFInfo
- Publication number
- TW470933B TW470933B TW89108234A TW89108234A TW470933B TW 470933 B TW470933 B TW 470933B TW 89108234 A TW89108234 A TW 89108234A TW 89108234 A TW89108234 A TW 89108234A TW 470933 B TW470933 B TW 470933B
- Authority
- TW
- Taiwan
- Prior art keywords
- data
- read
- memory
- scope
- patent application
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
AiimiAiimi
1 ·發明領域 別是ί:::於數位格式資料之防盜拷方法與裝置,特 盜拷之方法:裝ΐ程中連續讀出之特性以防止數位資料被 2 ·發明背景1 · Field of invention Especially: :: Anti-piracy method and device for digital format data, special method of anti-piracy: continuous reading during installation to prevent digital data from being captured 2 · Background of the invention
Layer近 ί 樂風行,其中又以MP3(MPEG Audi0Layer is almost popular, including MP3 (MPEG Audi0
數位音樂規袼Γ =率及高音質的優點,料下最流行的 # / 1 k Λ . 、種專門用來播放MP3音樂規格的隨身 + $ 口。φμρ^之被發展出來,成為相當受到歡迎的電 聽播:出i。音樂係儲存於-記憶卡中,藉由μρ3隨身 然而由於MP3槽案為數位規格,極為容易複製,且目 前記憶卡並沒有針對防止複製的保護措施,極為容易被盜 拷’ 而造成音樂工作者及發行公司相當大 時也是MP3音樂的推廣一直裹足不前的主要原因。 至於其他各種聲音、影像、影音、資料等數位規格的 貢料,也同樣地面臨容易被盜拷之困擾,因此,有必要針 對此一難題提出較佳之改良,以求完盖。The digital music gauge 袼 Γ = rate and the advantages of high sound quality, the most popular # / 1 k Λ., A portable + $ mouth specially used to play MP3 music specifications. φμρ ^ was developed and became a very popular audiovisual broadcast: i. The music is stored in the memory card, with μρ3, but because the MP3 slot is a digital specification, it is extremely easy to copy, and the current memory card has no protection measures against copying, and it is extremely easy to be stolen. And when the distribution company is quite large, it is also the main reason why the promotion of MP3 music has been stalled. As for other digital specifications such as audio, video, video, and data, they also face the problem of being easily copied. Therefore, it is necessary to propose better improvements to this problem in order to complete the cover.
3 ·發明目的與概述 本發明之主要目的即在提出一種數位袼式資料防盜拷 之方法與裝置,其係利用一監控電路偵測讀出指令或控制 信號,當監測電路辨識資料讀出的過程不同於一般正常的3. Object and summary of the invention The main object of the present invention is to propose a method and device for anti-theft copy of digital data, which uses a monitoring circuit to detect readout instructions or control signals. When the monitoring circuit recognizes the process of reading data, Different from normal
五 發明說明(2) 貝出模式’便主動停止記憶欠 以防止數位格式資料被盜拷。^貝枓或破壞盜拷工作, 本發明之次一目的在提出一 方法與裝置,其根據數位格式 賣料防盜拷之 定判斷條件,,資料讀出的過程的模式預先設 停止資料輪出或破壞盜拷工作不…些預設的條件便 方法本盘發坡明之再一目的在提出—種數位格式資料防盜拷之 方去與裴置,其利用盜拷數位^^之 H皿控項出之指令是否連續讀出,或者每一次讀出動 ::過程中所讀取的資料數據量,或者讀出動作之後3 拷工作。㈣進而决及疋否停止貢料輸出或破壞盜 ,由底下的具體實施例配合所附的圖式詳加說明,去 :: 瞭本發明之㈣、技術内容、特點及其所達成: 4 ·圖式簡單說明 4 · 1圖式說明 第一圖顯示習知技術中MP3記憶卡内部之示意圖。 第二圖顯示第一圖所示裝置在正常播放音樂模式下 作時,其内部電路信號之波形示意圖。 第三圖為第一圖所示裝置在被拷貝時,其内部電路 號之波形示意圖。 ° 第四圖提供根據本發明防止數位格式資料被盜拷之—V. Description of the Invention (2) Baying mode 'will actively stop the memory failure to prevent digital format data from being stolen. ^ Behavior or destruction of piracy, a second object of the present invention is to propose a method and device, which determine the conditions for anti-theft copy sales according to a digital format. The mode of the process of reading data is set in advance to stop data rotation or Do not destroy the pirated work ... Some preset conditions and methods The present purpose of this report is to propose a digital format of anti-piracy methods to Pei Zhi, which uses the control of pirated digital ^^ Whether the command is read continuously, or the amount of data read during each read :: process, or 3 copy jobs after the read operation. ㈣Furthermore, it is determined whether to stop the output of materials or to destroy theft. The specific embodiments below are accompanied by detailed descriptions of the attached drawings to go to :: The invention, the technical content, features and the achievement of the invention: 4 · Brief description of the diagram 4 · 1 diagram description The first diagram shows the schematic diagram of the MP3 memory card in the conventional technology. The second figure shows the waveforms of the internal circuit signals when the device shown in the first figure operates in the normal music playback mode. The third figure is a waveform diagram of the internal circuit number of the device shown in the first figure when it is copied. ° The fourth figure provides protection against digital theft in accordance with the present invention—
Aiimx 五、發明說明(3) ' "--- 實施例。 防卜Ϊ五圖’、第六圖,第七圖及第八圖分別為根據本發明 止數位格式資料被盜拷之方法之實施例的操作流程圖。 12 16 24 26 1圖號說明 輸入/輪出介面 記憶體 解碼及控制電路 記憶體 14 解碼及控制電路 22 輸入/輪出介面 25 監控電路Aiimx V. Invention Description (3) '" --- Examples. The fifth diagram, the sixth diagram, the seventh diagram, and the eighth diagram are the operation flowcharts of the embodiment of the method for preventing stolen data in digital format according to the present invention. 12 16 24 26 1 Description of drawing number Input / wheel-out interface Memory Decoding and control circuit Memory 14 Decoding and control circuit 22 Input / wheel-out interface 25 Supervisory circuit
5 ·詳細說明 本發明之主要特點在於利用數位格式資料,例如 ! + ’或者影音資料,在正常播放與被盜拷時 項出過程的差異以辨別是否被盜拷,進而決定寻 動作中斷或破壞盜拷動作。 、頃出 在介紹本發明詳細的技術内容之前,先以MP3音樂格式、 例簡單的說明習知技術中MP3記憶卡的組成及正^播為 樂時讀出動作的過程。 音5 · Detailed description The main feature of the present invention is to use digital format data, such as! + 'Or audio and video data, to discriminate whether the copy was stolen during normal playback and stolen copy to determine whether the copying was interrupted or destroyed. Robbery. Before the detailed technical content of the present invention is introduced, the MP3 music format and a simple example of the conventional technology are used to explain the composition of the MP3 memory card in the conventional technology and the process of reading when the music is playing. sound
第一圖顯示習知技術中MP3記憶卡之組成,其中勺 一輸入/輸出介面1 2,一解碼及控制電路1 4以及一記^ — 1 6 ’二者相互連接。記憶體1 6係儲存數位音樂資料, /輸出介面1 2接受外部的讀出指令,經由解碼及控制電雨入 1 4解碼並產生控制信號從記憶體1 6讀出音樂資料,最$ 輸入/輸出介面12輸出。 <由The first figure shows the composition of an MP3 memory card in the conventional technology, in which an input / output interface 12, a decoding and control circuit 14 and a record ^ — 16 ′ are connected to each other. Memory 1 6 series stores digital music data, / output interface 12 2 accepts external readout instructions, decodes and controls electrical rain input 1 4 decodes and generates control signals to read music data from memory 16, most $ input / The output interface 12 outputs. < by
記憶卡在正常播放音樂的情況下,其内部各電路信號 的波形係如第二圖所示,其中解碼及控制電路i 4所產生的 頃出致能信號(RE)為低態(1 ow)時,輸入/輸出介面1 2有資 料項出’完成部份讀出的動作後,便停止一段時間,然後 再繼續進行下一部份的讀出動作。 而記憶卡在被拷貝的情況下,其内部各電路信號的波 形則與第二圖不同,請參閱第三圖所示,其中讀出致能信 號是連續的,輸入/輸出介面丨2持續的有資料輸出,這表 示讀出動作是持續的進行。這種現象與記憶卡正常播放音 樂時的讀出過程具有明顯之差異,主要是因為播放音樂時 凟出的數位音樂資料必須經過還原及後續的處理步驟才播 放出來,因此它的過程是讀出一段資料便停止一段時間, 如此反覆的進行。而拷貝記憶卡的過程僅是將數位音樂資 料複製而已,不需要經過轉換或者還原等處理程序,因此 其項出動作是連績進行的。 對於其他聲音,動晝,影像,及影音資料等數位格式 的資料,其正常播放的讀出動作與盜拷動作均具有此上述 之差異,故本發明便根據數位格式資料在正常播放及盜拷 動作之間讀出過程的差異特性,提出一種防止數位格式資 料被盜拷的裝置,如第四圖所示,其利用在輪入/輸出介 面22及解碼及控制電路24與記憶體26之間加入一監控電路 25,用以監控讀出過程是否異常,進而決定停止^ &讀 出。其中如同習知技術一般,解碼及控制電路24係用^將 外部輸入的讀出指令進行解碼,並且產生對應的控制信When the memory card is playing music normally, the waveforms of the internal circuit signals are as shown in the second figure. The enable signal (RE) generated by the decoding and control circuit i 4 is low (1 ow). When there are data items on the input / output interface 12 after the completion of the partial reading operation, it will stop for a period of time, and then continue to the next reading operation. When the memory card is copied, the waveforms of the internal circuit signals are different from those in the second picture. Please refer to the third picture. The read enable signal is continuous, and the input / output interface is continuous. There is data output, which means that the reading operation is continuous. This phenomenon is obviously different from the reading process when the memory card is playing music normally. The main reason is that the digital music data extracted during the music playback must be restored and the subsequent processing steps to be played. Therefore, its process is to read out. A piece of information will be stopped for a while, and iteratively repeated. The process of copying a memory card is only a matter of copying digital music data, and it does not need to go through processing procedures such as conversion or restoration. Therefore, its operation is performed continuously. For other sound, moving day, video, and audio and video data in digital format, the normal playback read action and theft action have the above-mentioned differences. Therefore, the present invention uses the digital format data to play and steal the data normally. The characteristics of the difference in the reading process between actions. A device to prevent digital format data from being stolen, as shown in the fourth figure, is used between the input / output interface 22 and the decoding and control circuit 24 and the memory 26. A monitoring circuit 25 is added to monitor whether the reading process is abnormal, and then decide to stop reading & Among them, as in the conventional technology, the decoding and control circuit 24 uses ^ to decode an externally input read instruction and generate a corresponding control signal.
Α7Π933 五、發明說明(5) 號。在其他的實施例裡,若是不必經過解碼 解碼電路有可能是可以省略的。 、程序’那麼 而根據本發明防止數位格式資料被盜拷 五圖所示,亦可以配合第四圖一同參閱。在牛万法係如第 外部送入一讀出指令經由輸入/輸出介面12,驟中, 制電路14解碼並且產生控制信號由記憶體16取在解喝及控 料。藉由偵測讀出指令或者控制信號以判斷 J應的育 取的動作,即步驟S12,判斷外部所下的 结否為連續讀 否進行盜拷的動作。 項出‘令是 若偵測到讀出指令或控制信號為連續讀取 是在正常讀出的工作模式,因此將讀出動 更表不不 步驟S13,並且停止資料輸出,即步驟S15。中斷,即跳到 續出的1果為$ ’便接著進行步驟5“計算 可以、λ ‘产據里,延個步驟可以藉由計數器進行。直中 如在監控電路25根據正常讀出f ^ 作所項出之數據量預先設定讀出 二明=動 ㈣為憤測讀出的動作是否停止,^里出口理的扼圍。步驟 之前,監控電路25捭择的g舛兮a * 、動作尚未V止 數播旦* 持累计該次讀出過程中讀出的資料 驟4里,ΛΛ控這個計算結果是否超過-臨界值,即步 常盜拷時基於效率以晋,U的最大值’通 界值。的考里 次讀取的數據量會超過該臨 眸田出的數據量累加超過該臨界值,便表示此 S15,將β屮吊 美式’因此便跳至步驟S13及 將續出動作中斷,並且停止資料輸出。當步驟si6的 第8頁Α7Π933 V. Invention Description (5). In other embodiments, the decoding circuit may be omitted if it is not necessary to go through the decoding circuit. , Program 'Then, according to the present invention, the digital format data is prevented from being stolen. As shown in the fifth figure, it can also be referred to in conjunction with the fourth figure. In the NiuWan method system, a read command is input externally via the input / output interface 12. In the step, the control circuit 14 decodes and generates a control signal which is fetched and controlled by the memory 16. By detecting the readout instruction or control signal to judge the action of J should be learned, that is, step S12, it is judged whether the result of the external download is continuous reading or whether the action of copying is stolen. The item ‘order is that if a read command or control signal is detected for continuous reading, it is in the normal read operation mode, so the reading is changed to indicate step S13 and the data output is stopped, that is, step S15. Interruption, that is, jump to the next 1 result is $ ', then proceed to step 5 "calculation is possible, λ' production data, an extension step can be performed by a counter. Straightforward, such as in the monitoring circuit 25 according to the normal read f ^ The amount of data for the project is set in advance to read Erming = every action is to test whether the read action is stopped, or not. Before the step, the monitoring circuit 25 selects g 的 xi a *, action The number of broadcasts has not yet been calculated. * In the 4th step of accumulating the data read during the reading process, ΛΛ controls whether the calculation result exceeds the -critical value, that is, the maximum value of U is based on the efficiency when the stolen copy is stolen. The threshold reads. The amount of data read by the test will exceed the amount of data output by the Linmu Tian. If the cumulative amount exceeds the threshold, it means that this S15, β 屮 hanging American-style 'so it skips to step S13 and will continue The operation is interrupted and the data output is stopped. When page 8 of step si6
據 、知吊碩出模式下的特 先設定合理的工作範圍,以分辨是 珂疋否處於正常讀出的丄 模式。若發現讀出的過程不符合1机aAccording to the knowledge, the reasonable working range is set first in the master mode to distinguish whether it is in the normal read mode. If it is found that the reading process does not meet the 1 machine a
五、發明說明(6) 結果為是,即讀出動 的數據量與前述之合,便將該次讀出動作讀出資料 據量是否在合理範圍内1\圍進行比較,判斷讀出資料之數 至步驟su·,::丄:步驟S20。若結果為否,便跳 若由記憶體26讀出資中•,並且停止資料輪出。 下來便進行步驟S22計算的之據:在預設的合理範圍内,接 根據正常讀出的工作模;可以疋例如在監控電路25内 時間預先設定一停止時^二,郇二次讀出動作之間的間隔 量,讀出停止的時j常盜拷時基於效率的考 係表示此時並非是在—般正常讀 為否,更 步驟,,將讀出動作中斷,止jm 之,當步襲的結果為是’便進 ; 的這份資料是否結束。如果尚未讀到資料社]斷靖出 器及計時器歸零,即步驟S28,並、丰0束便將計數 丄丨a从土 丨/ 並且回到步驟S14 〇如要咨 料已結束’便跳至步驟815,停止果貝 不再輸出資料。 分电路早7L動作, 前述的過程中,依次利用監控電 ,續進行]賣出資料的數據量以及讀出 間疋否正常,來決定是否停止資料輪 内的數位r資料在正常讀出模 設疋合理的工作範圍,以分雜I π # u n 昇叹疋的條件,便將讀 五、發明說明(7) 動作中斷,停止資料繼續輸出,以防止記 資料被盜拷。 ^體26内的數位 « ΐ = ΐ判斷方式亦可以各別獨立或者排列組合運 U ;所示的監控流程具有較佳的防盜拷效 !至:m,能夠將數位格式資料被盜拷的機會 減至最低备然,第五圖中的三種判斷步驟 序,例如將步湖細對調,其流程圖則= 的情裡,亦可以只利用記憶體26輸出資料 以及其讀出過程的停止時間是否符合預設』:=據: 判斷是否記憶體係處於正常讀出 ^去> 則分別如第七圖與第八圖所示。 文所侍出U圖 ί = 前述各項讀出狀態的判態,包括正常 設定-•止時間的人理;圈3乍之間的間⑯時間預先 次讀出動作所讀出^盤^ Ξ, 根據正常讀出資料時一 圍,亦可& μ # ·§*康1預先設定讀出數據量合理的範 圍丌了以利用軟體或軔體程式來進行。 根據本發明若是利用與 電路動作用裢控制器之程式監控及利用既有 ;T則了以大幅地簡化監控電路25。 上述讀取資料的數摅旦 依需要預先設定。而χΐ或了 間的合理範圍,可以 JPEG .· ··、 X η •不同的數位貧料袼式(如MPEG, 5的貝料類別(例如聲音,音樂,影像,影V. Description of the invention (6) The result is yes, that is, the amount of data read out is the same as the foregoing, then the data amount of the readout data in this readout operation is within a reasonable range. Count to steps su ·, :: 丄: step S20. If the result is no, then skip If the data is read from the memory 26, and the data rotation is stopped. Then proceed to the data calculated in step S22: within the preset reasonable range, connect the working mode according to the normal reading; you can, for example, set a time in the monitoring circuit 25 when a stop is set in advance ^ 2, and the second read action The amount of time between readings, when reading is stopped, and j is often stolen. Efficiency-based tests indicate that the reading is not normal at this time. Normally, the reading is interrupted. In addition, the reading operation is interrupted to stop jm. The result of the raid was' will enter; whether this information is over. If you have n’t read the information agency], the breakout timer and the timer are reset to zero, that is, step S28, and the number of beams will be counted 丄 丨 a from the soil 丨 / and return to step S14. Skip to step 815 to stop the fruit from exporting data. The sub-circuit operates as early as 7L. In the foregoing process, the monitoring power is used in sequence and continued.] The data amount of the sold data and whether the reading interval is normal are used to determine whether to stop the digital r data in the data wheel in the normal reading mode.疋 Reasonable working range, according to the conditions of miscellaneous I π # un to raise sigh, we will read V. Invention Description (7) The operation is interrupted, and the data will continue to be output to prevent the data from being stolen. ^ The numbers in the body 26 «ΐ = ΐ can also be judged independently or arranged in a combined manner; the monitoring process shown has a better anti-theft copy effect! To: m, the chance of digital format data being stolen To the minimum, the three judgment steps in the fifth figure, for example, reverse the steps of the lake, the flow chart = =, you can only use the memory 26 to output data and stop the read process. "In line with the preset": = According to: Determine whether the memory system is in normal reading ^ go > as shown in Figure 7 and Figure 8, respectively. The figure shown by the text is U = = Judgment of the foregoing readout states, including the normal setting of the human time; the time between the first three readings is read by the pre-reading action ^ 盘 ^ Ξ According to the normal reading data, you can also set a reasonable range of the read data amount in advance by using software or a body program. According to the present invention, if a program using a circuit controller for circuit operation is used to monitor and utilize existing ones, T is used to greatly simplify the monitoring circuit 25. The number of read data is set in advance as needed. The reasonable range of χΐ or 了 can be JPEG ....., X η • Different digital lean formats (such as MPEG, 5 shell material categories (such as sound, music, video, video
HI 第10頁 ΑΊΜ21_ 五 、發明說明(8) =…··)或者不同的應用,其預設值皆隨之而異,以音樂 單曲為例,不同的單曲亦可以有不同的預設值,換言之預 叹值並非唯一。如此一來根據本發明可以衍生各種不同的 防益拷效果,讓盜拷者捉摸不著防盜拷的破解方式。 至於前述步驟S13主要目的在破壞盜拷的動作,故在 其他實施例裡’也不一定是立即中斷資料讀出,很多其他 :擾的方法也可以適用,例如加入亂碼讀出,或者使讀出 二^不齊全,這些方法可以藉由解碼及控制電路24,或者 1 ,入的控制電路,亦可以是藉由軟體程式進行,如此 /讓盜拷者一時無法查覺其盜拷結果失敗。 訊的推ί的:止數位格式資料被盜拷,有助於各種數位資 或者動查,I凡數位音樂,例如ΜΡ3,MIDI,WAVETABLE, 護而使ΐ知^像,以及各類影音資料都可根據本發明的保 人,抑^二=結晶及創意得到保障。特別對於音樂創作 充份^保^ a影音節目發行者而言,其智慧財產權獲得 而提昇產蚩L使其獲得對等之報酬,將有助於鼓勵創作進 汁產業水準,這同時也是我國專利法立法之目的。HI Page 10 ΑΊΜ21_ V. Description of the Invention (8) =… ··) or different applications, the default values will vary accordingly. Take music singles as an example, different singles can also have different presets. Value, in other words, the sigh value is not unique. In this way, according to the present invention, a variety of different anti-copying effects can be derived, so that copycats can't figure out the cracking methods of anti-theft. As for the foregoing step S13, the main purpose is to destroy the action of copying, so in other embodiments, 'it is not necessarily to immediately interrupt the reading of data. Many other methods of disturbing are also applicable, such as adding garbled reading, or making reading The method is not complete. These methods can be implemented by the decoding and control circuit 24, or the control circuit, or by a software program, so that the pirates cannot detect the failure of the pirate copy for a while. News from the news: Only digital format data is stolen, which is helpful for various digital assets or mobile investigations. All digital music, such as MP3, MIDI, WAVETABLE, etc., can be used to protect the image, as well as various audiovisual materials. According to the guarantor according to the present invention, the crystallization and creativity are guaranteed. Especially for music publishers who have sufficient music creation, their intellectual property rights will increase and increase their production and remuneration, which will help encourage the creation of creative industries. This is also our patent. The purpose of legal legislation.
第11頁Page 11
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW89108234A TW470933B (en) | 2000-04-28 | 2000-04-28 | Method and apparatus against pirated copy of digital format data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW89108234A TW470933B (en) | 2000-04-28 | 2000-04-28 | Method and apparatus against pirated copy of digital format data |
Publications (1)
Publication Number | Publication Date |
---|---|
TW470933B true TW470933B (en) | 2002-01-01 |
Family
ID=21659572
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW89108234A TW470933B (en) | 2000-04-28 | 2000-04-28 | Method and apparatus against pirated copy of digital format data |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW470933B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005086007A1 (en) * | 2004-03-05 | 2005-09-15 | Nextodi Co., Ltd | Data copy device |
-
2000
- 2000-04-28 TW TW89108234A patent/TW470933B/en not_active IP Right Cessation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005086007A1 (en) * | 2004-03-05 | 2005-09-15 | Nextodi Co., Ltd | Data copy device |
US7447853B2 (en) | 2004-03-05 | 2008-11-04 | Nextodi Co., Ltd. | Data copy device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1198959B1 (en) | A scaling independent technique for watermarking images | |
JP4843894B2 (en) | Data recording method, data output method, and data recording and / or reproducing method | |
US20060294382A1 (en) | Detecting a watermark using a subset of available detection methods | |
KR100795059B1 (en) | Method and device for controlling multimedia data watermark | |
US6076165A (en) | Method for authenticating digital recording devices | |
JP4234099B2 (en) | How to extract a watermark | |
TW470933B (en) | Method and apparatus against pirated copy of digital format data | |
US20020144130A1 (en) | Apparatus and methods for detecting illicit content that has been imported into a secure domain | |
EP0915620A1 (en) | Method and apparatus for preventing unauthorized copy of data recorded on recording medium | |
EP1444695B1 (en) | Apparatus for and method of preventing illicit copying of digital content | |
US20080120724A1 (en) | Ensuring the copy protection of digital data | |
CN1185583C (en) | Method and appts. for preventing illegal copying digit, data | |
US20050108535A1 (en) | Collusion-robust watermarking | |
US7117181B1 (en) | Reproduction apparatus and reproduction method of digital video signal or audio signal | |
US20030088773A1 (en) | Method of and apparatus for preventing illicit copying of digital content | |
US20030118181A1 (en) | Method and Apparatus for Controlling Digital Data | |
EP1001625A2 (en) | Method and apparatus for controlling digital data | |
JP2001127988A (en) | Information processor, data reproducing device, data recording device, their methods and program storing medium | |
US20020144132A1 (en) | Apparatus and methods of preventing an adulteration attack on a content screening algorithm | |
WO2003036443A2 (en) | Apparatus and methods for attacking a screening algorithm using digital signal processing | |
CN112911187A (en) | System and method for judging video data tampering | |
Li et al. | Antipiracy technology study on optical disks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent | ||
MM4A | Annulment or lapse of patent due to non-payment of fees |