TW470933B - Method and apparatus against pirated copy of digital format data - Google Patents

Method and apparatus against pirated copy of digital format data Download PDF

Info

Publication number
TW470933B
TW470933B TW89108234A TW89108234A TW470933B TW 470933 B TW470933 B TW 470933B TW 89108234 A TW89108234 A TW 89108234A TW 89108234 A TW89108234 A TW 89108234A TW 470933 B TW470933 B TW 470933B
Authority
TW
Taiwan
Prior art keywords
data
read
memory
scope
patent application
Prior art date
Application number
TW89108234A
Other languages
Chinese (zh)
Inventor
Yueh-O Yu
Chung-Kuang Chen
Original Assignee
Agc Technology Inc
Elan Microelectronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agc Technology Inc, Elan Microelectronics Corp filed Critical Agc Technology Inc
Priority to TW89108234A priority Critical patent/TW470933B/en
Application granted granted Critical
Publication of TW470933B publication Critical patent/TW470933B/en

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a method and apparatus against pirated copy of digital format data. The apparatus includes an input/output interface, a control circuit, and a memory, in which digital format data files are stored in the memory. A monitoring circuit between memory as well as input/output interface and the control circuit detects whether the received command is continuously read by using the continuous reading characteristics during the process of pirated copy for the digital format data stored in memory. The quantity of data read during the process of each reading action, or the stop time after the reading action is used to determine whether it is in the operation mode of normal reading so as to decide if data output is terminated and prevent data in the memory from been stolen and copied.

Description

AiimiAiimi

1 ·發明領域 別是ί:::於數位格式資料之防盜拷方法與裝置,特 盜拷之方法:裝ΐ程中連續讀出之特性以防止數位資料被 2 ·發明背景1 · Field of invention Especially: :: Anti-piracy method and device for digital format data, special method of anti-piracy: continuous reading during installation to prevent digital data from being captured 2 · Background of the invention

Layer近 ί 樂風行,其中又以MP3(MPEG Audi0Layer is almost popular, including MP3 (MPEG Audi0

數位音樂規袼Γ =率及高音質的優點,料下最流行的 # / 1 k Λ . 、種專門用來播放MP3音樂規格的隨身 + $ 口。φμρ^之被發展出來,成為相當受到歡迎的電 聽播:出i。音樂係儲存於-記憶卡中,藉由μρ3隨身 然而由於MP3槽案為數位規格,極為容易複製,且目 前記憶卡並沒有針對防止複製的保護措施,極為容易被盜 拷’ 而造成音樂工作者及發行公司相當大 時也是MP3音樂的推廣一直裹足不前的主要原因。 至於其他各種聲音、影像、影音、資料等數位規格的 貢料,也同樣地面臨容易被盜拷之困擾,因此,有必要針 對此一難題提出較佳之改良,以求完盖。The digital music gauge 袼 Γ = rate and the advantages of high sound quality, the most popular # / 1 k Λ., A portable + $ mouth specially used to play MP3 music specifications. φμρ ^ was developed and became a very popular audiovisual broadcast: i. The music is stored in the memory card, with μρ3, but because the MP3 slot is a digital specification, it is extremely easy to copy, and the current memory card has no protection measures against copying, and it is extremely easy to be stolen. And when the distribution company is quite large, it is also the main reason why the promotion of MP3 music has been stalled. As for other digital specifications such as audio, video, video, and data, they also face the problem of being easily copied. Therefore, it is necessary to propose better improvements to this problem in order to complete the cover.

3 ·發明目的與概述 本發明之主要目的即在提出一種數位袼式資料防盜拷 之方法與裝置,其係利用一監控電路偵測讀出指令或控制 信號,當監測電路辨識資料讀出的過程不同於一般正常的3. Object and summary of the invention The main object of the present invention is to propose a method and device for anti-theft copy of digital data, which uses a monitoring circuit to detect readout instructions or control signals. When the monitoring circuit recognizes the process of reading data, Different from normal

五 發明說明(2) 貝出模式’便主動停止記憶欠 以防止數位格式資料被盜拷。^貝枓或破壞盜拷工作, 本發明之次一目的在提出一 方法與裝置,其根據數位格式 賣料防盜拷之 定判斷條件,,資料讀出的過程的模式預先設 停止資料輪出或破壞盜拷工作不…些預設的條件便 方法本盘發坡明之再一目的在提出—種數位格式資料防盜拷之 方去與裴置,其利用盜拷數位^^之 H皿控項出之指令是否連續讀出,或者每一次讀出動 ::過程中所讀取的資料數據量,或者讀出動作之後3 拷工作。㈣進而决及疋否停止貢料輸出或破壞盜 ,由底下的具體實施例配合所附的圖式詳加說明,去 :: 瞭本發明之㈣、技術内容、特點及其所達成: 4 ·圖式簡單說明 4 · 1圖式說明 第一圖顯示習知技術中MP3記憶卡内部之示意圖。 第二圖顯示第一圖所示裝置在正常播放音樂模式下 作時,其内部電路信號之波形示意圖。 第三圖為第一圖所示裝置在被拷貝時,其内部電路 號之波形示意圖。 ° 第四圖提供根據本發明防止數位格式資料被盜拷之—V. Description of the Invention (2) Baying mode 'will actively stop the memory failure to prevent digital format data from being stolen. ^ Behavior or destruction of piracy, a second object of the present invention is to propose a method and device, which determine the conditions for anti-theft copy sales according to a digital format. The mode of the process of reading data is set in advance to stop data rotation or Do not destroy the pirated work ... Some preset conditions and methods The present purpose of this report is to propose a digital format of anti-piracy methods to Pei Zhi, which uses the control of pirated digital ^^ Whether the command is read continuously, or the amount of data read during each read :: process, or 3 copy jobs after the read operation. ㈣Furthermore, it is determined whether to stop the output of materials or to destroy theft. The specific embodiments below are accompanied by detailed descriptions of the attached drawings to go to :: The invention, the technical content, features and the achievement of the invention: 4 · Brief description of the diagram 4 · 1 diagram description The first diagram shows the schematic diagram of the MP3 memory card in the conventional technology. The second figure shows the waveforms of the internal circuit signals when the device shown in the first figure operates in the normal music playback mode. The third figure is a waveform diagram of the internal circuit number of the device shown in the first figure when it is copied. ° The fourth figure provides protection against digital theft in accordance with the present invention—

Aiimx 五、發明說明(3) ' "--- 實施例。 防卜Ϊ五圖’、第六圖,第七圖及第八圖分別為根據本發明 止數位格式資料被盜拷之方法之實施例的操作流程圖。 12 16 24 26 1圖號說明 輸入/輪出介面 記憶體 解碼及控制電路 記憶體 14 解碼及控制電路 22 輸入/輪出介面 25 監控電路Aiimx V. Invention Description (3) '" --- Examples. The fifth diagram, the sixth diagram, the seventh diagram, and the eighth diagram are the operation flowcharts of the embodiment of the method for preventing stolen data in digital format according to the present invention. 12 16 24 26 1 Description of drawing number Input / wheel-out interface Memory Decoding and control circuit Memory 14 Decoding and control circuit 22 Input / wheel-out interface 25 Supervisory circuit

5 ·詳細說明 本發明之主要特點在於利用數位格式資料,例如 ! + ’或者影音資料,在正常播放與被盜拷時 項出過程的差異以辨別是否被盜拷,進而決定寻 動作中斷或破壞盜拷動作。 、頃出 在介紹本發明詳細的技術内容之前,先以MP3音樂格式、 例簡單的說明習知技術中MP3記憶卡的組成及正^播為 樂時讀出動作的過程。 音5 · Detailed description The main feature of the present invention is to use digital format data, such as! + 'Or audio and video data, to discriminate whether the copy was stolen during normal playback and stolen copy to determine whether the copying was interrupted or destroyed. Robbery. Before the detailed technical content of the present invention is introduced, the MP3 music format and a simple example of the conventional technology are used to explain the composition of the MP3 memory card in the conventional technology and the process of reading when the music is playing. sound

第一圖顯示習知技術中MP3記憶卡之組成,其中勺 一輸入/輸出介面1 2,一解碼及控制電路1 4以及一記^ — 1 6 ’二者相互連接。記憶體1 6係儲存數位音樂資料, /輸出介面1 2接受外部的讀出指令,經由解碼及控制電雨入 1 4解碼並產生控制信號從記憶體1 6讀出音樂資料,最$ 輸入/輸出介面12輸出。 <由The first figure shows the composition of an MP3 memory card in the conventional technology, in which an input / output interface 12, a decoding and control circuit 14 and a record ^ — 16 ′ are connected to each other. Memory 1 6 series stores digital music data, / output interface 12 2 accepts external readout instructions, decodes and controls electrical rain input 1 4 decodes and generates control signals to read music data from memory 16, most $ input / The output interface 12 outputs. < by

記憶卡在正常播放音樂的情況下,其内部各電路信號 的波形係如第二圖所示,其中解碼及控制電路i 4所產生的 頃出致能信號(RE)為低態(1 ow)時,輸入/輸出介面1 2有資 料項出’完成部份讀出的動作後,便停止一段時間,然後 再繼續進行下一部份的讀出動作。 而記憶卡在被拷貝的情況下,其内部各電路信號的波 形則與第二圖不同,請參閱第三圖所示,其中讀出致能信 號是連續的,輸入/輸出介面丨2持續的有資料輸出,這表 示讀出動作是持續的進行。這種現象與記憶卡正常播放音 樂時的讀出過程具有明顯之差異,主要是因為播放音樂時 凟出的數位音樂資料必須經過還原及後續的處理步驟才播 放出來,因此它的過程是讀出一段資料便停止一段時間, 如此反覆的進行。而拷貝記憶卡的過程僅是將數位音樂資 料複製而已,不需要經過轉換或者還原等處理程序,因此 其項出動作是連績進行的。 對於其他聲音,動晝,影像,及影音資料等數位格式 的資料,其正常播放的讀出動作與盜拷動作均具有此上述 之差異,故本發明便根據數位格式資料在正常播放及盜拷 動作之間讀出過程的差異特性,提出一種防止數位格式資 料被盜拷的裝置,如第四圖所示,其利用在輪入/輸出介 面22及解碼及控制電路24與記憶體26之間加入一監控電路 25,用以監控讀出過程是否異常,進而決定停止^ &讀 出。其中如同習知技術一般,解碼及控制電路24係用^將 外部輸入的讀出指令進行解碼,並且產生對應的控制信When the memory card is playing music normally, the waveforms of the internal circuit signals are as shown in the second figure. The enable signal (RE) generated by the decoding and control circuit i 4 is low (1 ow). When there are data items on the input / output interface 12 after the completion of the partial reading operation, it will stop for a period of time, and then continue to the next reading operation. When the memory card is copied, the waveforms of the internal circuit signals are different from those in the second picture. Please refer to the third picture. The read enable signal is continuous, and the input / output interface is continuous. There is data output, which means that the reading operation is continuous. This phenomenon is obviously different from the reading process when the memory card is playing music normally. The main reason is that the digital music data extracted during the music playback must be restored and the subsequent processing steps to be played. Therefore, its process is to read out. A piece of information will be stopped for a while, and iteratively repeated. The process of copying a memory card is only a matter of copying digital music data, and it does not need to go through processing procedures such as conversion or restoration. Therefore, its operation is performed continuously. For other sound, moving day, video, and audio and video data in digital format, the normal playback read action and theft action have the above-mentioned differences. Therefore, the present invention uses the digital format data to play and steal the data normally. The characteristics of the difference in the reading process between actions. A device to prevent digital format data from being stolen, as shown in the fourth figure, is used between the input / output interface 22 and the decoding and control circuit 24 and the memory 26. A monitoring circuit 25 is added to monitor whether the reading process is abnormal, and then decide to stop reading & Among them, as in the conventional technology, the decoding and control circuit 24 uses ^ to decode an externally input read instruction and generate a corresponding control signal.

Α7Π933 五、發明說明(5) 號。在其他的實施例裡,若是不必經過解碼 解碼電路有可能是可以省略的。 、程序’那麼 而根據本發明防止數位格式資料被盜拷 五圖所示,亦可以配合第四圖一同參閱。在牛万法係如第 外部送入一讀出指令經由輸入/輸出介面12,驟中, 制電路14解碼並且產生控制信號由記憶體16取在解喝及控 料。藉由偵測讀出指令或者控制信號以判斷 J應的育 取的動作,即步驟S12,判斷外部所下的 结否為連續讀 否進行盜拷的動作。 項出‘令是 若偵測到讀出指令或控制信號為連續讀取 是在正常讀出的工作模式,因此將讀出動 更表不不 步驟S13,並且停止資料輸出,即步驟S15。中斷,即跳到 續出的1果為$ ’便接著進行步驟5“計算 可以、λ ‘产據里,延個步驟可以藉由計數器進行。直中 如在監控電路25根據正常讀出f ^ 作所項出之數據量預先設定讀出 二明=動 ㈣為憤測讀出的動作是否停止,^里出口理的扼圍。步驟 之前,監控電路25捭择的g舛兮a * 、動作尚未V止 數播旦* 持累计該次讀出過程中讀出的資料 驟4里,ΛΛ控這個計算結果是否超過-臨界值,即步 常盜拷時基於效率以晋,U的最大值’通 界值。的考里 次讀取的數據量會超過該臨 眸田出的數據量累加超過該臨界值,便表示此 S15,將β屮吊 美式’因此便跳至步驟S13及 將續出動作中斷,並且停止資料輸出。當步驟si6的 第8頁Α7Π933 V. Invention Description (5). In other embodiments, the decoding circuit may be omitted if it is not necessary to go through the decoding circuit. , Program 'Then, according to the present invention, the digital format data is prevented from being stolen. As shown in the fifth figure, it can also be referred to in conjunction with the fourth figure. In the NiuWan method system, a read command is input externally via the input / output interface 12. In the step, the control circuit 14 decodes and generates a control signal which is fetched and controlled by the memory 16. By detecting the readout instruction or control signal to judge the action of J should be learned, that is, step S12, it is judged whether the result of the external download is continuous reading or whether the action of copying is stolen. The item ‘order is that if a read command or control signal is detected for continuous reading, it is in the normal read operation mode, so the reading is changed to indicate step S13 and the data output is stopped, that is, step S15. Interruption, that is, jump to the next 1 result is $ ', then proceed to step 5 "calculation is possible, λ' production data, an extension step can be performed by a counter. Straightforward, such as in the monitoring circuit 25 according to the normal read f ^ The amount of data for the project is set in advance to read Erming = every action is to test whether the read action is stopped, or not. Before the step, the monitoring circuit 25 selects g 的 xi a *, action The number of broadcasts has not yet been calculated. * In the 4th step of accumulating the data read during the reading process, ΛΛ controls whether the calculation result exceeds the -critical value, that is, the maximum value of U is based on the efficiency when the stolen copy is stolen. The threshold reads. The amount of data read by the test will exceed the amount of data output by the Linmu Tian. If the cumulative amount exceeds the threshold, it means that this S15, β 屮 hanging American-style 'so it skips to step S13 and will continue The operation is interrupted and the data output is stopped. When page 8 of step si6

據 、知吊碩出模式下的特 先設定合理的工作範圍,以分辨是 珂疋否處於正常讀出的丄 模式。若發現讀出的過程不符合1机aAccording to the knowledge, the reasonable working range is set first in the master mode to distinguish whether it is in the normal read mode. If it is found that the reading process does not meet the 1 machine a

五、發明說明(6) 結果為是,即讀出動 的數據量與前述之合,便將該次讀出動作讀出資料 據量是否在合理範圍内1\圍進行比較,判斷讀出資料之數 至步驟su·,::丄:步驟S20。若結果為否,便跳 若由記憶體26讀出資中•,並且停止資料輪出。 下來便進行步驟S22計算的之據:在預設的合理範圍内,接 根據正常讀出的工作模;可以疋例如在監控電路25内 時間預先設定一停止時^二,郇二次讀出動作之間的間隔 量,讀出停止的時j常盜拷時基於效率的考 係表示此時並非是在—般正常讀 為否,更 步驟,,將讀出動作中斷,止jm 之,當步襲的結果為是’便進 ; 的這份資料是否結束。如果尚未讀到資料社]斷靖出 器及計時器歸零,即步驟S28,並、丰0束便將計數 丄丨a从土 丨/ 並且回到步驟S14 〇如要咨 料已結束’便跳至步驟815,停止果貝 不再輸出資料。 分电路早7L動作, 前述的過程中,依次利用監控電 ,續進行]賣出資料的數據量以及讀出 間疋否正常,來決定是否停止資料輪 内的數位r資料在正常讀出模 設疋合理的工作範圍,以分雜I π # u n 昇叹疋的條件,便將讀 五、發明說明(7) 動作中斷,停止資料繼續輸出,以防止記 資料被盜拷。 ^體26内的數位 « ΐ = ΐ判斷方式亦可以各別獨立或者排列組合運 U ;所示的監控流程具有較佳的防盜拷效 !至:m,能夠將數位格式資料被盜拷的機會 減至最低备然,第五圖中的三種判斷步驟 序,例如將步湖細對調,其流程圖則= 的情裡,亦可以只利用記憶體26輸出資料 以及其讀出過程的停止時間是否符合預設』:=據: 判斷是否記憶體係處於正常讀出 ^去> 則分別如第七圖與第八圖所示。 文所侍出U圖 ί = 前述各項讀出狀態的判態,包括正常 設定-•止時間的人理;圈3乍之間的間⑯時間預先 次讀出動作所讀出^盤^ Ξ, 根據正常讀出資料時一 圍,亦可& μ # ·§*康1預先設定讀出數據量合理的範 圍丌了以利用軟體或軔體程式來進行。 根據本發明若是利用與 電路動作用裢控制器之程式監控及利用既有 ;T則了以大幅地簡化監控電路25。 上述讀取資料的數摅旦 依需要預先設定。而χΐ或了 間的合理範圍,可以 JPEG .· ··、 X η •不同的數位貧料袼式(如MPEG, 5的貝料類別(例如聲音,音樂,影像,影V. Description of the invention (6) The result is yes, that is, the amount of data read out is the same as the foregoing, then the data amount of the readout data in this readout operation is within a reasonable range. Count to steps su ·, :: 丄: step S20. If the result is no, then skip If the data is read from the memory 26, and the data rotation is stopped. Then proceed to the data calculated in step S22: within the preset reasonable range, connect the working mode according to the normal reading; you can, for example, set a time in the monitoring circuit 25 when a stop is set in advance ^ 2, and the second read action The amount of time between readings, when reading is stopped, and j is often stolen. Efficiency-based tests indicate that the reading is not normal at this time. Normally, the reading is interrupted. In addition, the reading operation is interrupted to stop jm. The result of the raid was' will enter; whether this information is over. If you have n’t read the information agency], the breakout timer and the timer are reset to zero, that is, step S28, and the number of beams will be counted 丄 丨 a from the soil 丨 / and return to step S14. Skip to step 815 to stop the fruit from exporting data. The sub-circuit operates as early as 7L. In the foregoing process, the monitoring power is used in sequence and continued.] The data amount of the sold data and whether the reading interval is normal are used to determine whether to stop the digital r data in the data wheel in the normal reading mode.疋 Reasonable working range, according to the conditions of miscellaneous I π # un to raise sigh, we will read V. Invention Description (7) The operation is interrupted, and the data will continue to be output to prevent the data from being stolen. ^ The numbers in the body 26 «ΐ = ΐ can also be judged independently or arranged in a combined manner; the monitoring process shown has a better anti-theft copy effect! To: m, the chance of digital format data being stolen To the minimum, the three judgment steps in the fifth figure, for example, reverse the steps of the lake, the flow chart = =, you can only use the memory 26 to output data and stop the read process. "In line with the preset": = According to: Determine whether the memory system is in normal reading ^ go > as shown in Figure 7 and Figure 8, respectively. The figure shown by the text is U = = Judgment of the foregoing readout states, including the normal setting of the human time; the time between the first three readings is read by the pre-reading action ^ 盘 ^ Ξ According to the normal reading data, you can also set a reasonable range of the read data amount in advance by using software or a body program. According to the present invention, if a program using a circuit controller for circuit operation is used to monitor and utilize existing ones, T is used to greatly simplify the monitoring circuit 25. The number of read data is set in advance as needed. The reasonable range of χΐ or 了 can be JPEG ....., X η • Different digital lean formats (such as MPEG, 5 shell material categories (such as sound, music, video, video

HI 第10頁 ΑΊΜ21_ 五 、發明說明(8) =…··)或者不同的應用,其預設值皆隨之而異,以音樂 單曲為例,不同的單曲亦可以有不同的預設值,換言之預 叹值並非唯一。如此一來根據本發明可以衍生各種不同的 防益拷效果,讓盜拷者捉摸不著防盜拷的破解方式。 至於前述步驟S13主要目的在破壞盜拷的動作,故在 其他實施例裡’也不一定是立即中斷資料讀出,很多其他 :擾的方法也可以適用,例如加入亂碼讀出,或者使讀出 二^不齊全,這些方法可以藉由解碼及控制電路24,或者 1 ,入的控制電路,亦可以是藉由軟體程式進行,如此 /讓盜拷者一時無法查覺其盜拷結果失敗。 訊的推ί的:止數位格式資料被盜拷,有助於各種數位資 或者動查,I凡數位音樂,例如ΜΡ3,MIDI,WAVETABLE, 護而使ΐ知^像,以及各類影音資料都可根據本發明的保 人,抑^二=結晶及創意得到保障。特別對於音樂創作 充份^保^ a影音節目發行者而言,其智慧財產權獲得 而提昇產蚩L使其獲得對等之報酬,將有助於鼓勵創作進 汁產業水準,這同時也是我國專利法立法之目的。HI Page 10 ΑΊΜ21_ V. Description of the Invention (8) =… ··) or different applications, the default values will vary accordingly. Take music singles as an example, different singles can also have different presets. Value, in other words, the sigh value is not unique. In this way, according to the present invention, a variety of different anti-copying effects can be derived, so that copycats can't figure out the cracking methods of anti-theft. As for the foregoing step S13, the main purpose is to destroy the action of copying, so in other embodiments, 'it is not necessarily to immediately interrupt the reading of data. Many other methods of disturbing are also applicable, such as adding garbled reading, or making reading The method is not complete. These methods can be implemented by the decoding and control circuit 24, or the control circuit, or by a software program, so that the pirates cannot detect the failure of the pirate copy for a while. News from the news: Only digital format data is stolen, which is helpful for various digital assets or mobile investigations. All digital music, such as MP3, MIDI, WAVETABLE, etc., can be used to protect the image, as well as various audiovisual materials. According to the guarantor according to the present invention, the crystallization and creativity are guaranteed. Especially for music publishers who have sufficient music creation, their intellectual property rights will increase and increase their production and remuneration, which will help encourage the creation of creative industries. This is also our patent. The purpose of legal legislation.

第11頁Page 11

Claims (1)

A1M22 六、申請專利範圍 資料1枝防止數位資料被盜拷之方法,丨中該數位格式 產一記憶體中,一控制電路連接該記憶體,並 控制信號讀出該記憶體儲存之數位資料,再經由—輪 请出介面輸出’該方法包括下列步驟: 偵測一讀出指令或該控制信號,以判斷是否連續 ;以及 、只% 當前一步驟之判斷結果為是,則破壞該讀出動作。 . 如申請專利範圍第1項所述之方法,盆中該破瓌兮 讀出動作係中斷讀出動作,停止資料輸出。八^展邊 3 ·如申請專利範圍第1項所述之方法,豆 讀出動作係、將該記憶體輸出的數位資料加人亂碼;出晨該 申請專利範圍第1項所述之方法,其中該破壞# 5貝出動作係使讀出資料不齊全。 落 5, 一種防止數位資料被盜拷之方法,苴中哕盤办从 式貝料係儲存於一記憶體中,一控制電連接^ σ 並產生和制俨% > # 連接該δ己憶體, 輸出;|面輸出,該方法包括下列步驟: (a) 計算讀出動作所讀取的資料數據量; (b) ==該數據量是否符合預設數據量範圍之條件; lc)i(由b)步驟之比較結果為否,便破壞該讀出動作。 ·-山&申請專利範圍第5項所述之方法,盆中玆破檢 項出動作係中斷讀出動作,停止資料輸出。 Μ破壞該 7.如申請專利範圍第5項所述之方法,其中該破壞該A1M22 VI. Patent application scope 1 method to prevent digital data from being stolen. In the digital format, a memory is produced, a control circuit is connected to the memory, and a control signal reads the digital data stored in the memory. Then, please output the interface through the “round” method. The method includes the following steps: detecting a readout command or the control signal to determine whether it is continuous; and, only if the judgment result of the previous step is yes, the readout action is destroyed . The method described in item 1 of the scope of patent application, the broken reading operation in the basin is to interrupt the reading operation and stop the data output. ^ Zhanbian3 · As the method described in the first scope of the patent application, the bean read action is garbled with the digital data output from this memory; the method described in the first scope of the patent application, Among them, the destruction # 5 is caused by incomplete reading data. Drop 5, a method to prevent digital data from being stolen. The central storage system stores the slave material in a memory, and controls the electrical connection ^ σ to generate and control the%. ≫# Connect the δ Ji Yi Output; | surface output, the method includes the following steps: (a) calculating the amount of data data read by the read operation; (b) == whether the data amount meets the conditions of the preset data amount range; lc) i If the comparison result of step (b) is No, the read operation is destroyed. -The method described in item 5 of the scope of the patent application for the mountain, the detection action in the basin is to interrupt the reading operation and stop the data output. M destroys the method as described in item 5 of the scope of patent application, wherein the destroys the 第13頁 六、申請專利範圍 5貝出動作係將該記憶體輪出的數位資料加入 > 如申請專利範圍第5項所述之方法, 項出動作係使讀出資料不齊全。 如申請專利範圍第5項所述之方法,^ 之預叹數據量範圍至少包含一預設之最大值 (a步驟的計算結果是否大於該最大值。 1 〇 ·如申請專利範圍第5項所述之方法, 驟係以U)步驟的計算結果與一預設合理區f 其中該預設合理區間係根據正常讀出動作時 項出貝料數據量的正常範圍,據以比較(a) 4 果是否位於該正常範圍内。 > 11· 一種防止數位資料被盜拷之方法, 式資料係儲存於一記憶體中,一控制電路連 並產生控制信號讀出該記憶體儲存之數位資 輸入/輸出介面輸出,該方法包括下列步驟 (a) 計算讀出動作過程中的停止時間; (b) 比較該停止時間是否符合預設停止日 件;以及 (c) 當(b)步驟之比較結果為否,便破壞 1 2 ·如申請專利範圍第丨丨項所述之方法 該讀出動作係中斷讀出動作,停資料輸 …如申請專利範圍第!!項所:之= 該讀出動作係將該記憶體輸出的數位資料加 14 .如申請專利範圍第丨丨項所述之方法 亂碼讀出。 其中該破壞該 [中該(b)步·驟 ,據以比較 其中該(b )步 5進行比較, 一次讀出動作 ^驟的計算結 其中該數位袼 接該記憶體, 料,再經由一 f間範圍之條 該讀出動作。 ’其中該破壞 〇 ’其中該破壞 入亂碼讀出。 ’其中該破壞 ATimx 六、申請專利範圍 該讀出動作係使讀出的資料不齊全。 ^ 15·如申請專利範圍第11項所述之方法,其中該預設 :止時間範圍係根據正常讀出工作模式時的間^時間而 定。 一種防止數位資料被盜拷之方法,其中該數位格 於:記憶體中,一控制電路連接該記憶體, 並產生控制、唬讀出該記憶體儲存之數位資料,再經由一 輸入/輸出介面輸出,該方法包括下列步驟: (a) 偵測讀出的指令或該控制信號是否為連續讀取; (b) 當上述(a)步驟之結果為是,則進行(c)步驟反 之,則進行(d )步驟; (c )破壞該次讀出動作·· (d) 偵測讀出動作是否停止; (e) 若上述(d)步驟的結果為否,便累計該讀出動 出的數據量,並與一預設之臨界值進行比貝 臨界值係根據正常讀出工作模式下讀出動二 取資料數據量的最大值; 汁5貝 (f )當上述(e )步驟的比較結果為讀出動作讀出 量大於該臨界值,便進行(c)步驟; (g) 若上述(d)步驟的結果為是,便計算該次讀 所讀取的資料數據量; 出動作 (h) 根據上述(g)步驟計算的結果與一預設數據 進打比較,、其中該預設數據量區間係根據正當曰 出工作模式下讀出動作所讀取資料數據量的正^Page 13 VI. Application for Patent Range The 5th output operation is to add the digital data out of the memory > The method described in item 5 of the patent application scope, the first output operation is to make the reading data incomplete. According to the method described in item 5 of the scope of patent application, the range of the sigh data amount of ^ includes at least a preset maximum value (whether the calculation result of step a is greater than the maximum value. 1 〇 As described in item 5 of the scope of patent application The method described above is based on the calculation result of step U) and a preset reasonable area f, where the preset reasonable interval is the normal range of the amount of shellfish data according to the normal reading action, and then (a) 4 is compared. Whether the result is within this normal range. > 11. A method for preventing digital data from being stolen, wherein the data is stored in a memory, a control circuit is connected and generates a control signal to read out the digital data input / output interface output from the memory, the method includes The following steps (a) calculate the stop time during the read operation; (b) compare whether the stop time matches the preset stop date; and (c) when the comparison result in step (b) is no, then destroy 1 2 · According to the method described in the scope of the patent application, the read operation is to interrupt the read operation, and stop the data input ... As in the scope of the patent application, the scope of the application is: = = The read operation is a digital output of the memory Data plus 14. Read in illegible way as described in item 丨 丨 of the scope of patent application. Wherein the step (b) of step [b] is compared, based on which the step (b) of step 5 is compared, a calculation of a read operation is performed, and the number is connected to the memory. The strips in the f range should be read. 'Where the damage is 0' where the damage is read in garbled. ‘Among the destruction ATimx 6. Scope of patent application This readout action makes the readout data incomplete. ^ 15. The method as described in item 11 of the scope of patent application, wherein the preset: end time range is determined according to the time in the normal reading operation mode. A method for preventing digital data from being stolen, wherein the digital grid is in the memory, a control circuit is connected to the memory, and the digital data stored in the memory is controlled and read out, and then passed through an input / output interface Output, the method includes the following steps: (a) detecting whether the read instruction or the control signal is continuously read; (b) when the result of the above step (a) is yes, then proceed to step (c) and vice versa, Carry out step (d); (c) Destroy the read operation ... (d) Detect whether the read operation has stopped; (e) If the result of step (d) above is no, accumulate the data from the read operation The value is compared with a preset critical value. The critical value is based on the maximum value of the amount of data in the second reading according to the normal reading operation mode. When the comparison result of step (e) above is 5 If the read amount is greater than the critical value, step (c) is performed; (g) If the result of step (d) above is YES, the data amount of the data read by the read is calculated; the action (h) The result calculated according to step (g) above and a preset data Comparison of advances, where the preset data volume interval is based on the positive data volume of the data read by the read operation in the normal mode. 第15頁 Α7Π933 六、申請專利範圍 範圍 (1)當上述(g)步驟計算的結果不在該預設數據量區間 的範圍,便進行(c )步驟; (J·)當上述(g)步驟計算的結果落在該預設數據量區間 的範園内,便進行下一步驟; (k) 計算該次讀出動作後的停止時間;以及 (l) 根據上述(k)步驟的計算結果與一預設時間區間進 行比較,其中該預設時間區間係根據正常讀出工 作模式下讀出動作過程中的停止時間,若上述(k) 步驟的計算結果不在該預設時間區間的範圍内, 便進行(C )步驟。 步驟1J吐^申請專利範圍第16項所述之方法,其中該(C) 壞該讀出動作係指中斷讀出動作,停止資料輪 步驟2破利範圍第16項所述之方法,其中該(c) 亂碼讀出#出動作係將該記憶體輸出的數位資料加入 步騍2破範圍第16項所述之方法’,中該(c) 9 ”貝出動作係使讀出的資料不齊全。 _ •一種數位資料防盜拷裝置,包括: 輸入/輪出介面,提供與外界溝通; W射數位資料; ~" 制雷% A;絡’產生控制信號以讀出該記憶體儲存之數 位=貝料’再經由該輸入/輸出介面輸出;以及Page 15 Α7Π933 6. Scope of patent application (1) When the result of the calculation in step (g) above is not within the range of the preset data amount range, proceed to step (c); (J ·) When the calculation in step (g) above If the result falls within the range of the preset data volume, the next step is performed; (k) Calculate the stop time after the read operation; and (l) According to the calculation result of step (k) above and a preliminary Set the time interval for comparison. The preset time interval is based on the stop time during the read operation in the normal read operation mode. If the calculation result of step (k) above is not within the range of the preset time interval, then (C) Step. Step 1J: The method described in item 16 of the scope of patent application, wherein the (C) bad read operation means interrupting the read operation and stopping the data wheel. (c) garbled readout #output action is to add the digital data output from this memory to the method described in step 16 of step 2 to break the range ', in which (c) 9 "the output action is to make the read data not _ • A digital data anti-theft device, including: input / roll-out interface to provide communication with the outside world; W shoot digital data; ~ " Mining% A; Network 'generates a control signal to read out the memory storage Digital = shell material 'is then output through this input / output interface; and 、申請專利範圍 一監控電路,至少與該輸入/輸出介面、該控制電路 與該記憶體三者之一相連’藉以判斷記憶體讀出資 料的工作模式是否為正常讀出之工作模式,以便決 定是否破壞讀出動作。 2 1 ·如申請專利範圍第2 〇項所述之數位資料防盜拷裝 置’其中該監控電路包括偵測讀出指令或控制信號是否為 連續讀出。 2 2 ·如申請專利範圍第2 〇項所述之數位資料防盜拷裝 置’其中該監控電路包括偵測讀出動作之數據量是否符合 預設數據量範圍之條件。 2 3 ·如申請專利範圍第2 0項所述之數位資料防盜拷裝 置,其中該監控電路包括偵測讀出動作過程中之停止時間 是否符合預設停止時間範圍之條件。 2 3 ·如申請專利範圍第2 0項所述之數位資料防盜拷裝 置,其中該監控電路係利用軟體或軔體程式監控。Scope of patent application: A monitoring circuit is connected to at least the input / output interface, the control circuit and one of the memory ', so as to determine whether the working mode of reading data from the memory is the normal reading working mode in order to determine Whether to break the read operation. 2 1 · The digital data anti-theft device described in item 20 of the scope of patent application, wherein the monitoring circuit includes detecting whether a read command or a control signal is continuously read. 2 2 The digital data anti-theft device according to item 20 of the scope of patent application, wherein the monitoring circuit includes detecting whether the data amount of the read operation meets the condition of the preset data amount range. 2 3 · The digital data anti-theft device described in item 20 of the scope of patent application, wherein the monitoring circuit includes detecting whether the stop time during the read operation meets the conditions of the preset stop time range. 2 3 · The digital data anti-theft device as described in item 20 of the scope of patent application, wherein the monitoring circuit is monitored by software or a body program.
TW89108234A 2000-04-28 2000-04-28 Method and apparatus against pirated copy of digital format data TW470933B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW89108234A TW470933B (en) 2000-04-28 2000-04-28 Method and apparatus against pirated copy of digital format data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW89108234A TW470933B (en) 2000-04-28 2000-04-28 Method and apparatus against pirated copy of digital format data

Publications (1)

Publication Number Publication Date
TW470933B true TW470933B (en) 2002-01-01

Family

ID=21659572

Family Applications (1)

Application Number Title Priority Date Filing Date
TW89108234A TW470933B (en) 2000-04-28 2000-04-28 Method and apparatus against pirated copy of digital format data

Country Status (1)

Country Link
TW (1) TW470933B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005086007A1 (en) * 2004-03-05 2005-09-15 Nextodi Co., Ltd Data copy device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005086007A1 (en) * 2004-03-05 2005-09-15 Nextodi Co., Ltd Data copy device
US7447853B2 (en) 2004-03-05 2008-11-04 Nextodi Co., Ltd. Data copy device

Similar Documents

Publication Publication Date Title
EP1198959B1 (en) A scaling independent technique for watermarking images
JP4843894B2 (en) Data recording method, data output method, and data recording and / or reproducing method
US20060294382A1 (en) Detecting a watermark using a subset of available detection methods
KR100795059B1 (en) Method and device for controlling multimedia data watermark
US6076165A (en) Method for authenticating digital recording devices
JP4234099B2 (en) How to extract a watermark
TW470933B (en) Method and apparatus against pirated copy of digital format data
US20020144130A1 (en) Apparatus and methods for detecting illicit content that has been imported into a secure domain
EP0915620A1 (en) Method and apparatus for preventing unauthorized copy of data recorded on recording medium
EP1444695B1 (en) Apparatus for and method of preventing illicit copying of digital content
US20080120724A1 (en) Ensuring the copy protection of digital data
CN1185583C (en) Method and appts. for preventing illegal copying digit, data
US20050108535A1 (en) Collusion-robust watermarking
US7117181B1 (en) Reproduction apparatus and reproduction method of digital video signal or audio signal
US20030088773A1 (en) Method of and apparatus for preventing illicit copying of digital content
US20030118181A1 (en) Method and Apparatus for Controlling Digital Data
EP1001625A2 (en) Method and apparatus for controlling digital data
JP2001127988A (en) Information processor, data reproducing device, data recording device, their methods and program storing medium
US20020144132A1 (en) Apparatus and methods of preventing an adulteration attack on a content screening algorithm
WO2003036443A2 (en) Apparatus and methods for attacking a screening algorithm using digital signal processing
CN112911187A (en) System and method for judging video data tampering
Li et al. Antipiracy technology study on optical disks

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees