WO2000055736A1 - Protection contre la copie assuree sur un support memoire au moyen de la randomisation des emplacements et des cles lors d'un acces 'ecriture' - Google Patents
Protection contre la copie assuree sur un support memoire au moyen de la randomisation des emplacements et des cles lors d'un acces 'ecriture' Download PDFInfo
- Publication number
- WO2000055736A1 WO2000055736A1 PCT/EP2000/002276 EP0002276W WO0055736A1 WO 2000055736 A1 WO2000055736 A1 WO 2000055736A1 EP 0002276 W EP0002276 W EP 0002276W WO 0055736 A1 WO0055736 A1 WO 0055736A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- block
- storage medium
- copy
- key
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00115—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers wherein the record carrier stores a unique medium identifier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00507—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein consecutive physical data units of the record carrier are encrypted with separate encryption keys, e.g. the key changes on a cluster or sector basis
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00557—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein further management data is encrypted, e.g. sector headers, TOC or the lead-in or lead-out areas
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/12—Formatting, e.g. arrangement of data block or words on the record carriers
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/10—Digital recording or reproducing
- G11B20/10527—Audio or video recording; Data buffering arrangements
- G11B2020/10537—Audio or video recording
- G11B2020/10546—Audio or video recording specifically adapted for audio data
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
Definitions
- the invention relates to a method for providing copy-protection to a data storage medium, in particular to solid state memory modules.
- a data storage medium in particular to solid state memory modules.
- Arguments in favor are based on weight, power and shockproofness considerations.
- ID unique identification code
- Known anti-copying solutions use a unique identification code (ID) that is 'engraved' in the storage medium. At some point in time, this may be disadvantageous because of privacy considerations. Furthermore, as will be explained below, methods which 5 mainly rely on such an ID do not provide adequate protection against a copying scheme known as a 'replay attack'.
- the present invention is particularly suited for solid state memory modules which provide easy random access to any location in the memory, be it on the basis of a bit, a byte or on some other entity such as a uniform sized sector that relates to the access width of the memory in question.
- the invention is characterized in that the data on the storage medium are encrypted with a key K which depends on the position (Li, L 2 , L 3 ) of the data on the storage medium, and that in each write operation the data is stored in locations on the storage medium that are chosen at random.
- the invention also relates to a system arranged for implementing a method as claimed in claim 1, a player for playing a recording prepared according to a method as claimed in claim 1, and a record carrier prepared according to a method as claimed in claim 1. Further advantageous aspects of the invention are recited in dependent Claims.
- Figure 1 shows a conceptual two-player arrangement
- Figure 2 illustrates the mechanism of 'replay attacks' in the prior art.
- Figure 3 shows a schematic diagram of a storage medium embodiment;
- Figure 4 shows an example of a file structure
- Figures 5A and 5B illustrate an example of a method in accordance with the invention and how this method prevents 'replay attacks'.
- Figures 6A and 6B illustrate a further example for a method in accordance with the invention.
- FIG 1 illustrates a conceptual two-player arrangement, with two players A and B, and a removable module C that may be transposed between the players. As shown, both players have appropriate means for inserting the module. In the rest of the discussion it is assumed that this removable module may be accessed by other means as well (e.g. PC based readers). This poses the risk of unauthorized copying of the data on the module, assuming that the players A and B do not allow unauthorized copying.
- the preferred embodiments are described in relation to a Solid State Audio player and module, although the invention may be used in a broader context. Within a few years, Solid State Audio (SSA) players are expected to become a new standard for portable audio playback devices.
- SSA Solid State Audio
- One of the tools for copy protection of digital content is encryption. While encryption by itself does not prevent illegal copying, it does render such copies useless, as the original content can be retrieved only by decrypting it using the proper key. As a result, playback of the content is limited to those devices that have access to that key. It is an objective of the copy protection system to manage the keys in such a way that illegal copying is prevented, while at the same time not inconveniencing legal and intended use of the content.
- Most of the memory modules for solid state multimedia storage applications comprise a large flash memory and an on-board controller. The controller may or may not be integrated, and multiple separate memory chips may be employed on the module.
- multimedia memory modules are: Memory Stick (Sony), SmartMedia (SSFDC Forum), Miniature Card (MC Forum), Compact Flash (PCMCIA Forum), Multimedia Card (MMC Association).
- these devices can be thought of as block devices, similar to hard disk drives, where memory accesses occur by addressing sectors (typically 512 bytes) on the module.
- sectors typically 512 bytes
- some of the modules listed above employ the ATA interface standard, which is used to connect hard disks and other peripherals to a PC. This enables easy duplication (bit by bit) of the content of such memory modules using a PC.
- Other modules use a proprietary interface and command set, but still are block based, i.e. individual sectors on the module can be addressed and modified.
- a SSA player employs detachable memory modules, which can be accessed by other means as well (e.g. PC based readers).
- One known solution is to embed a unique identification code (ID) in the memory module, which can be read by the application, but which can not be changed. This identification code can then be used to generate an encryption key, which is specific for the module.
- ID unique identification code
- Another known solution is to make use of defects in the memory modules, which naturally occur as a result of the manufacturing processes used to fabricate cheap but high storage capacity flash memories.
- the locations of these natural defects probably will be unique for each module, and as such can act as a 'fingerprint' of that device. Again, a unique key can be generated, which is specific for the module.
- a 'replay attack' is a form of copying in which an unauthorized copy is made from one system (system 1) to another (system 2), where the unauthorized (but unplayable copy) on system 2 can be used to restore a playable copy on system over and over again, even after expiration of the original copy.
- Figure 2 illustrates this in more detail.
- Each system comprises a unique identification code, represented by EDI for system 1 and ED2 for system 2, and contains files in which the content is stored as a sequence of separate blocks.
- the data in respect of rights and usage on the original copy are encrypted with a key that is derived from IDl and a secret S.
- Figure 3 represents a schematic diagram of a memory module embodiment 20.
- the storage area 30 has an access time that is substantially independent of the physical storage location.
- the controller 22 controls the access to the storage proper.
- Various subsystems have been shown therein, the host interface 24, the memory interface 26, and the file system 28. External write and internal selection to the memory are shown as well.
- the Application Programming Interface API the following functionality should be present.
- an optional volume number is outputted that is either uniquely fixed and hard-wired, or a random number that is generated each time the command is executed. This number may only be changed when executing the formatting command, thereby destroying all data on the device.
- the copy protection proper does not expressly need this number.
- a reusable file ID is produced for later referencing the file in question.
- a sector number is produced that is a random choice from the free block list.
- the sector number that is produced can be the actual sector number in which the data proper were stored during the write operation, or it can be the sector number will be stored during the next write operation. This amongst others is possible in solid state audio devices without appreciable loss of time because the flash memory is not hampered by a seek time as is common in disk based systems. Such random choice in addition helps to level wear over the entire device.
- the application may use or discard the sector number returned by the block write command as required.
- the file ID controls outputting the data proper and the sector number of the current or next block to be read.
- Figure 4 illustrates an example of a file structure, that is distributed into blocks, each having the size of a single sector of 512 bytes.
- the first block carries information regarding the file, while the others have the file data proper.
- the above organization will block the making of a bit wise copy of the module, inasmuch as no modification facility for individual sectors has been provided. Copying to an intermediate storage location and subsequently recopying the data on the module (which constitutes the 'replay attack' as explained above) will copy the data to completely different locations. This in itself provides some protection against copying. Copy protection is further provided by encrypting a data block through a key that is derived from a secret and also from the location (for instance and preferably the sector number) where the data in question is stored.
- the latter information may be derived from the block write function that returns the sector number of the next file sector. As this information is not available for the first block, the latter may be used for less sensitive data. This limitation is overcome by letting the file create function return the sector number of the first sector in the file where the data proper (e.g. the file info) will be written. For reading, the present or next sector number is available before reading of the actual data, allowing the application to calculate the proper decryption key in time.
- the encryption key thus combines the location of the storage, and a method that renders it impossible to predict this location. Copying will change the storage location, and in consequence will break the relation between location and decryption key.
- the secret used in the derivation of the key may be a globally shared secret between all players, or may be derived by other methods well known to those skilled in the art.
- Figures 5A and 5B illustrate a method in accordance with the invention. Each time data blocks are written, the controller 22 writes the data in randomly chosen locations. In Figures 5 A and 5B the locations are indicated by Li, L 2 etc. The data are encrypted with a key which is dependent on a secret S and a location L; or a combination of locations L, (for instance the location of the block that is written, or of the previous block, or of the block that is written and the previous block etc). Making a copy of the data of the memory module will (see Figure 5B) change in a irreproducible manner the locations of the data. In fact such will happen twice.
- FIGS. 6A and 6B show an embodiment of the invention in which all data are encrypted with a key K (which may consist of a single key or a block of keys), that itself is stored encrypted with a key K' , which is the output of a hash function having as arguments the locations Li, L 2 , L 3 etc and a secret S. K' thus depends on the positions of the data blocks, in this case on the total sequence in which the data blocks are written.
- K which may consist of a single key or a block of keys
- controller may be provided in the system apart from the memory module, preferably the controller unit by which the random locations are chosen is integrated in the memory module. This makes it difficult to circumvent the method or influence the choice of locations of data.
- the locations where the data, preferably arranged in blocks, are stored are chosen by a (preferably built-in) controller on a random basis.
- a controller preferably built-in controller on a random basis.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2000605898A JP2002539557A (ja) | 1999-03-15 | 2000-03-14 | 書き込みアクセスの際に位置とキーをランダム化することによる蓄積媒体のコピー保護 |
CA002332008A CA2332008A1 (fr) | 1999-03-15 | 2000-03-14 | Procede et systeme de protection contre la copie sur un support memoire au moyen de la randomisation des emplacements lors d'un acces ecriture, et un lecteur et un support a utilise dans un tel systeme |
KR1020007012720A KR20010043582A (ko) | 1999-03-15 | 2000-03-14 | 기록 액세스시에 위치와 키를 무작위화하여 저장매체 상에복제 방지를 하는 방법 및 장치 |
EP00918799A EP1076857A1 (fr) | 1999-03-15 | 2000-03-14 | Protection contre la copie assuree sur un support memoire au moyen de la randomisation des emplacements et des cles lors d'un acces "ecriture" |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP99200776.5 | 1999-03-15 | ||
EP99200776 | 1999-03-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000055736A1 true WO2000055736A1 (fr) | 2000-09-21 |
Family
ID=8239984
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2000/002276 WO2000055736A1 (fr) | 1999-03-15 | 2000-03-14 | Protection contre la copie assuree sur un support memoire au moyen de la randomisation des emplacements et des cles lors d'un acces 'ecriture' |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP1076857A1 (fr) |
JP (1) | JP2002539557A (fr) |
KR (1) | KR20010043582A (fr) |
CA (1) | CA2332008A1 (fr) |
WO (1) | WO2000055736A1 (fr) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002025410A2 (fr) * | 2000-09-15 | 2002-03-28 | Koninklijke Philips Electronics N.V. | Protection par adresse de blocs de donnees en tant que cle de chiffrement |
JP2002132585A (ja) * | 2000-10-20 | 2002-05-10 | Sony Corp | 情報記録装置、情報再生装置、情報記録媒体、および情報記録方法、情報再生方法、並びにプログラム提供媒体 |
WO2002047078A2 (fr) * | 2000-12-05 | 2002-06-13 | Koninklijke Philips Electronics N.V. | Systeme et procede de protection de supports numeriques |
WO2003034227A2 (fr) * | 2001-10-12 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Appareil et procede de lecture ou d'ecriture de donnees utilisateur |
WO2002095748A3 (fr) * | 2001-05-22 | 2004-02-26 | Koninkl Philips Electronics Nv | Support d'enregistrement destine a stocker un travail numerique |
WO2005043396A2 (fr) * | 2003-09-30 | 2005-05-12 | Infineon Technologies Ag | Production d'une cle individuelle a chaque mot |
US7042489B2 (en) | 2000-09-08 | 2006-05-09 | Pandora International Limited | Image processing |
JP2006308635A (ja) * | 2005-04-26 | 2006-11-09 | Kenwood Corp | 音声データベース製造装置、音声データベース、音片復元装置、音声データベース製造方法、音片復元方法及びプログラム |
WO2008063965A2 (fr) * | 2006-11-14 | 2008-05-29 | Mcm Portfolio Llc | Procédé et système pour fournir une implémentation sûre de dispositifs de stockage |
WO2009088114A1 (fr) * | 2008-01-11 | 2009-07-16 | Slim Disc Corp. | Procédé de gestion des droits numériques (gdn) au moyen de motifs défectueux, et enregistreur/lecteur de contenu numérique et procédé d'utilisation correspondant |
US7657031B2 (en) | 2003-07-18 | 2010-02-02 | Oce Printing Systems Gmbh | Method and device for printing sensitive data |
US20100208890A1 (en) * | 2009-02-13 | 2010-08-19 | Tatsuya Igarashi | Content distribution apparatus, content use apparatus, content distribution system, content distribution method and program |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100712498B1 (ko) * | 2003-06-21 | 2007-04-27 | 삼성전자주식회사 | 하드디스크 드라이브의 난수 발생 방법 |
JP4620518B2 (ja) * | 2005-04-26 | 2011-01-26 | 株式会社ケンウッド | 音声データベース製造装置、音片復元装置、音声データベース製造方法、音片復元方法及びプログラム |
CN111847533A (zh) * | 2020-05-25 | 2020-10-30 | 安徽普偌森环保科技有限公司 | 一体化生活污水处理工程管理系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63211045A (ja) * | 1987-02-27 | 1988-09-01 | Toshiba Corp | 携帯可能電子装置 |
JPH0278066A (ja) * | 1988-09-13 | 1990-03-19 | Nec Corp | プレキシブルデイスク媒体およびその記録方式 |
EP0899733A1 (fr) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | Système d'administration du copiage de disque optique |
-
2000
- 2000-03-14 EP EP00918799A patent/EP1076857A1/fr not_active Withdrawn
- 2000-03-14 JP JP2000605898A patent/JP2002539557A/ja active Pending
- 2000-03-14 CA CA002332008A patent/CA2332008A1/fr not_active Abandoned
- 2000-03-14 KR KR1020007012720A patent/KR20010043582A/ko not_active Application Discontinuation
- 2000-03-14 WO PCT/EP2000/002276 patent/WO2000055736A1/fr not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS63211045A (ja) * | 1987-02-27 | 1988-09-01 | Toshiba Corp | 携帯可能電子装置 |
JPH0278066A (ja) * | 1988-09-13 | 1990-03-19 | Nec Corp | プレキシブルデイスク媒体およびその記録方式 |
EP0899733A1 (fr) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | Système d'administration du copiage de disque optique |
Non-Patent Citations (2)
Title |
---|
PATENT ABSTRACTS OF JAPAN vol. 013, no. 001 (P - 808) 6 January 1989 (1989-01-06) * |
PATENT ABSTRACTS OF JAPAN vol. 014, no. 272 (P - 1060) 12 June 1990 (1990-06-12) * |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7042489B2 (en) | 2000-09-08 | 2006-05-09 | Pandora International Limited | Image processing |
WO2002025410A3 (fr) * | 2000-09-15 | 2003-03-20 | Koninkl Philips Electronics Nv | Protection par adresse de blocs de donnees en tant que cle de chiffrement |
WO2002025410A2 (fr) * | 2000-09-15 | 2002-03-28 | Koninklijke Philips Electronics N.V. | Protection par adresse de blocs de donnees en tant que cle de chiffrement |
JP2002132585A (ja) * | 2000-10-20 | 2002-05-10 | Sony Corp | 情報記録装置、情報再生装置、情報記録媒体、および情報記録方法、情報再生方法、並びにプログラム提供媒体 |
US7925017B2 (en) | 2000-10-20 | 2011-04-12 | Sony Corporation | Information recording device, information playback device, information recording medium, information recording method, information playback method, and program providing medium |
WO2002047078A2 (fr) * | 2000-12-05 | 2002-06-13 | Koninklijke Philips Electronics N.V. | Systeme et procede de protection de supports numeriques |
WO2002047078A3 (fr) * | 2000-12-05 | 2002-09-19 | Koninkl Philips Electronics Nv | Systeme et procede de protection de supports numeriques |
WO2002095748A3 (fr) * | 2001-05-22 | 2004-02-26 | Koninkl Philips Electronics Nv | Support d'enregistrement destine a stocker un travail numerique |
KR100926962B1 (ko) * | 2001-05-22 | 2009-11-17 | 유큐이, 엘엘씨 | 디지털 저작물을 저장하는 기록매체 |
WO2003034227A2 (fr) * | 2001-10-12 | 2003-04-24 | Koninklijke Philips Electronics N.V. | Appareil et procede de lecture ou d'ecriture de donnees utilisateur |
CN100364002C (zh) * | 2001-10-12 | 2008-01-23 | 皇家飞利浦电子股份有限公司 | 读或写用户数据的设备和方法 |
WO2003034227A3 (fr) * | 2001-10-12 | 2004-07-29 | Koninkl Philips Electronics Nv | Appareil et procede de lecture ou d'ecriture de donnees utilisateur |
US7657031B2 (en) | 2003-07-18 | 2010-02-02 | Oce Printing Systems Gmbh | Method and device for printing sensitive data |
WO2005043396A3 (fr) * | 2003-09-30 | 2005-07-07 | Infineon Technologies Ag | Production d'une cle individuelle a chaque mot |
WO2005043396A2 (fr) * | 2003-09-30 | 2005-05-12 | Infineon Technologies Ag | Production d'une cle individuelle a chaque mot |
JP2006308635A (ja) * | 2005-04-26 | 2006-11-09 | Kenwood Corp | 音声データベース製造装置、音声データベース、音片復元装置、音声データベース製造方法、音片復元方法及びプログラム |
JP4620517B2 (ja) * | 2005-04-26 | 2011-01-26 | 株式会社ケンウッド | 音声データベース製造装置、音片復元装置、音声データベース製造方法、音片復元方法及びプログラム |
WO2008063965A2 (fr) * | 2006-11-14 | 2008-05-29 | Mcm Portfolio Llc | Procédé et système pour fournir une implémentation sûre de dispositifs de stockage |
WO2008063965A3 (fr) * | 2006-11-14 | 2008-07-24 | Technology Properties Ltd | Procédé et système pour fournir une implémentation sûre de dispositifs de stockage |
US7876894B2 (en) | 2006-11-14 | 2011-01-25 | Mcm Portfolio Llc | Method and system to provide security implementation for storage devices |
WO2009088114A1 (fr) * | 2008-01-11 | 2009-07-16 | Slim Disc Corp. | Procédé de gestion des droits numériques (gdn) au moyen de motifs défectueux, et enregistreur/lecteur de contenu numérique et procédé d'utilisation correspondant |
US20100208890A1 (en) * | 2009-02-13 | 2010-08-19 | Tatsuya Igarashi | Content distribution apparatus, content use apparatus, content distribution system, content distribution method and program |
Also Published As
Publication number | Publication date |
---|---|
CA2332008A1 (fr) | 2000-09-21 |
KR20010043582A (ko) | 2001-05-25 |
EP1076857A1 (fr) | 2001-02-21 |
JP2002539557A (ja) | 2002-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8296582B2 (en) | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system | |
KR100844998B1 (ko) | 비휘발성 메모리 카드, 콤팩트 디스크 또는 다른 매체로부터 기록된 오디오, 비디오 또는 다른 콘텐츠를 재생하기 위한 시스템, 방법 및 장치 | |
US6615192B1 (en) | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer | |
JP4198060B2 (ja) | リムーバル記録媒体によって配布されるデジタルコンテンツの使用及びコピーを制御するシステム | |
JP5362675B2 (ja) | メモリ装置による鍵配布 | |
JP2005505873A (ja) | ブロックとして記憶されるユーザデータを読み取る又は書き込む装置及び方法 | |
US5646993A (en) | Information reproducing method and apparatus having protect function and recording medium used in apparatus | |
EA004199B1 (ru) | Носитель данных с возможностью записи информации, имеющий участок защищенных данных | |
RU2494447C2 (ru) | Способ шифрования карты памяти и сборка для его осуществления | |
EP1076857A1 (fr) | Protection contre la copie assuree sur un support memoire au moyen de la randomisation des emplacements et des cles lors d'un acces "ecriture" | |
KR20120026974A (ko) | 복제 방지를 위한 비휘발성 저장 장치 및 그 저장 장치의 인증 방법 | |
RU2297677C2 (ru) | Носитель записи для хранения цифрового продукта | |
JP2000298942A (ja) | ディスク記憶装置及び同装置に適用するコピー防止システム | |
EP1807835B1 (fr) | Support optique avec donnees de commande dans des oscillations | |
MXPA00011207A (en) | Copy-protection on a storage medium by randomizing locations and keys upon write access | |
JP2002208216A (ja) | コンテンツ記録再生装置 | |
EP1585127A2 (fr) | Système, procédé, et dispositif de lecture audio, vidéo ou d'autres contenus enregistrés à partir de cartes de mémoire non-volatile, de disques compacts ou d'autres supports | |
MXPA00011118A (en) | A method and system for providing copy-protection on a storage medium and storage medium for use in such a system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA JP KR MX US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2000918799 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2332008 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007012720 Country of ref document: KR Ref document number: 09700373 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: PA/a/2000/011207 Country of ref document: MX |
|
WWP | Wipo information: published in national office |
Ref document number: 2000918799 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007012720 Country of ref document: KR |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2000918799 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1020007012720 Country of ref document: KR |