WO2003019552A1 - Vorrichtung zum kopierschutz - Google Patents
Vorrichtung zum kopierschutz Download PDFInfo
- Publication number
- WO2003019552A1 WO2003019552A1 PCT/EP2002/009392 EP0209392W WO03019552A1 WO 2003019552 A1 WO2003019552 A1 WO 2003019552A1 EP 0209392 W EP0209392 W EP 0209392W WO 03019552 A1 WO03019552 A1 WO 03019552A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- additional
- digital
- data carrier
- coding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
Definitions
- the present invention relates to a device for copy protection of data carrier units carrying digital documents, in particular of optically readable data carriers such as CDs or DVDs, with the features of the preamble of patent claim 1.
- Such a device is known, for example, from German Offenlegungsschrift 43 11 683.
- Data carrier IDs on the relevant data carrier unit e.g. the pits or lands on a CD
- the object of the present invention is therefore to further develop a device for copy protection of data carrier units carrying digital documents according to the preamble of patent claim 1 in such a way that, in particular, a fully automated or computerized and digital check for unauthorized copying or forgery is also possible, which furthermore is not visible and has easily identifiable security features, in particular can also be used in a mobile or portable environment, at the same time the requirements for the manufacture of such data protection units provided with a protective effect are simplified with regard to the necessary manufacturing infrastructure.
- the object is achieved by the device with the features of claim 1;
- protection is claimed for using the device according to claim 1 in the particularly relevant use cases CD and DVD, further for a method for producing a digital data carrier unit that is suitable for operating the device according to the main claim, and a method for verifying potentially fake data carriers , which is suitable for operating the device according to the main claim.
- Advantageous developments of the invention are described in the subclaims.
- the means for applying the additional coding apply such individualizing features to the data carrier unit that are not effective in terms of content and thus, particularly when the digital content is played or displayed as intended, do not influence the content.
- the additional coding enables an unauthorized (i.e.
- an unauthorized copy is determined by the fact that the verification means according to the invention allow a direct and therefore automated verification process that is accessible to machine processing by direct access to the additional coding, not only with the possibility that Determine the presence or absence of the additional coding and thus immediately allow the conclusion of a forgery, but in particular also to determine a possible variation or change in the additional coding compared to a predetermined and stored (and thus securely stored) original coding according to the invention.
- the verification means according to the invention allow a direct and therefore automated verification process that is accessible to machine processing by direct access to the additional coding, not only with the possibility that Determine the presence or absence of the additional coding and thus immediately allow the conclusion of a forgery, but in particular also to determine a possible variation or change in the additional coding compared to a predetermined and stored (and thus securely stored) original coding according to the invention.
- such (advanced) attempts at misuse were immediately recognizable, in which a (partial or varied) copy of the additional coding was also made as part of an attempt
- the verification means have direct access to the additional coding and traditional mechanisms, which typically ensure that the additional coding is not taken into account during regular playback or reading of the digital content and has no influence on the content, namely otherwise known error correction or filter modules, so that for the Verification process according to the invention makes this distinction possible using the detected additional coding.
- the general lack of transparency of such a procedure from a user or copy point of view is a major advantage of this technology.
- the verification unit can be published, since a relationship can be established within an additional coding by means of public / private key methods, without the information disclosed in this way leading to a reduction in the security method or to its compromise.
- digital documents or electronic document includes not only the music (audio) and video files that are particularly at risk of error from the current point of view, but in particular also (interactive) computer games, computer software, digital text, Image or multimedia data, which are typically of copyright significance and thus represent a property that is worth protecting.
- additional coding within the scope of the present invention, a rough division into two can first be made:
- additional coding according to the invention is possible within the logical structure of a data carrier unit, the logical structure being the format structure or organization of the data carrier unit as it is in the form of frames, sectors, tracks etc. exists in the intended manner and is typically predetermined by norms or similar conventions (e.g. Red Book for CDs or CD-DA or music CDs in the narrower sense or Yellow Book for CD-XA or CD-ROMs).
- the additional coding according to the invention can be provided in a variety of ways, for example in the user data area (provided that the original digital content remains unchanged as a result of additional correction mechanisms, ie the original is reconstructed, corrected, calculated or interpolated), further in ( error correction and / or control data areas (also known as subcode data areas), which are typically provided redundantly anyway, furthermore in any additional header data provided or in lead-in lead-out data areas (ie in input or output areas), etc It is correct that when the additional coding is applied in this way, the condition according to the invention is maintained that the digital content signals to be output by a user from This additional coding remains unaffected, that is, the corresponding targeted additional coding measures in the logical structure are either suppressed within the framework of the existing error correction and redundancy structures, as far as content is concerned, or are otherwise ignored.
- the additional data suppressed in the context of the logical structure can be corrected before output by the inherent redundancy data, on the other hand data fields can be used without further error correction, which are provided for future extensions of the standard according to the corresponding specification and are only active from these extended formats are used, such as the subcode channels R to W in the corresponding control data area of a CD.
- a second essential solution aspect of the provision of the additional coding according to the invention is to provide it within the physical structure of the data carrier unit, but outside of the logical structure. This means that, according to the invention, modifications are made to the data carrier identifications, readable by reading units, which lie outside the format and organizational structure of the data carrier unit.
- physically very short markings are on the CD relative to pits or lands of a CD Data carrier surface, which lead to correspondingly different (short) detection signals and which, in terms of signal, have more of a defect character, so that they are suppressed or masked by traditional error correction mechanisms during playback, but can be read or evaluated by the verification means according to the invention.
- the playback or display unit is also a means for outputting, storing, copying, processing and transferring data via a data transmission network such as the Internet, as well as typical consumer playback unit for reproducing the digital content to understand, that is, in the case of CD or DVD, a respective commercially available CD or DVD player, or of CD-ROM or DVD-RO, which are contained in commercially available PCs, and which are otherwise known (laser) scanning units with subsequent digitization, buffering and error correction in order to reproduce even poor quality data media in a usable manner.
- a data transmission network such as the Internet
- typical consumer playback unit for reproducing the digital content to understand, that is, in the case of CD or DVD, a respective commercially available CD or DVD player, or of CD-ROM or DVD-RO, which are contained in commercially available PCs, and which are otherwise known (laser) scanning units with subsequent digitization, buffering and error correction in order to reproduce even poor quality data media in a usable manner.
- error correction and filter units typically consist of known mechanisms to compensate for data or surface errors (caused by pressing errors), including scratches, dust, hair, fingerprints or the like, whereby, in addition to mechanical effects, the standard for CD in particular and DVD provided error corrections, based on a very high redundant data volume, are provided.
- Common error corrections start with CRC, with suitable coding (ECC or EDC) or with specifically used reconstruction methods such as CIRC or ACIRC.
- the application means according to the invention consist of (typically implemented in terms of software) devices for introducing or anchoring the additional coding for the production of a CD or DVD (ie there is then a common step for producing the glass master of the die as a production template ), or the application of the Additional coding is carried out independently of the otherwise known production of the matrix with the digital original content, by prior or subsequent manipulation of either the matrix or the respective pressed end product, for example by means of a laser or magnetic unit to produce the modifications according to the invention of the physical structure of the data carrier unit.
- the procedure according to the invention corresponds to the production of a digitally effective watermark for copy protection or for authenticity control, wherein, according to the further development, a plurality of such digital watermarks can be ascertained and ascertained by suitable assignment of content or linkage of data with the additional coding, so that As provided in accordance with the invention, hierarchically effective security over several security levels (preferably distinguished by a degree of confidentiality of the respective digital links with the additional coding) is possible.
- each data set individualizing CD, for. B. in the form of an otherwise known manner to produce serial number, and thus a check for the multiple presence of the same digital identifier, derived from the serial number and additional coding, is already possible in analogy to the detection of counterfeit money.
- the present invention for the first time creates the possibility of reliably detecting unauthorized copies of data carrier units manufactured professionally in large numbers with little additional manufacturing and, above all, monitoring, and thus promptly triggering control measures without it being necessary to detect a illegal copy, as required in the prior art, requires special optically effective instruments or a specially trained eye, or even in a laboratory environment, the copy proof must first be carried out at great expense.
- the device according to the present invention allows a simple to automate verification infrastructure to be created, which offers the potential to ultimately suppress the copiousness that is harmful to the general public, particularly on the popular CD and DVD market, since it hinders performance.
- 1 is a schematic block diagram of the manufacturing, playback and verification units contained in the main claim according to a first preferred embodiment of the invention
- FIG. 2 shows a schematic block diagram of a playback unit and a verification device according to a first preferred embodiment of the invention
- CD-DA a schematic structure of a music CD (CD-DA), which is composed of music tracks
- FIG. 13 shows a schematic block diagram of the units which are suitable for producing the CD with the additional codings according to a first, preferred embodiment of the invention
- FIG. 14 shows a schematic block diagram of the components with the individual units which are suitable for producing the CD with the additional codings according to a preferred embodiment of the invention
- FIG. 16 shows a schematic block diagram for the construction of the driver for reading the additional digital coding according to a first preferred embodiment for the invention
- 17 shows a schematic block diagram for describing a watermark separating unit with which a plurality of watermarks can be formed from the additional coding data which are contained on the CD
- 18 shows a schematic block diagram of a method for producing a watermark, in which a watermark is linked in terms of data to a serial number
- 20 shows a schematic block diagram of a security platform in which security-enhancing components can be replaced.
- FIG. 1 shows the schematic block diagram of a first preferred embodiment with the essential main functional components of the present invention, namely a manufacturing unit (1) with, on the one hand, means for applying digital documents, realized in an otherwise known manner as technology for producing the digital data carriers, about by means of a glass master, and on the other hand means (3) for applying the additional coding, these means either acting directly on the data carrier unit (10), or by means of the connection (7) to the unit (2), at a suitable point in the logical structure of the digital document before the final creation of the data carrier unit, the additional codes are introduced into the application unit (2).
- a manufacturing unit (1) with, on the one hand, means for applying digital documents, realized in an otherwise known manner as technology for producing the digital data carriers, about by means of a glass master, and on the other hand means (3) for applying the additional coding, these means either acting directly on the data carrier unit (10), or by means of the connection (7) to the unit (2), at a suitable point in the logical structure of the digital document before the final creation of the data carrier unit, the additional codes are
- the data carrier unit produced according to the invention with a digital document and additional coding works in an otherwise known manner together with means for output (15), which can be implemented, for example, as a CD or DVD player and, typically by mixing hardware and / or software components, reproduce the pure content of the digital document and hide, correct and interpolate physical and / or logical errors or modifications.
- means for verification (20) are provided for use by authorized users within the scope of the invention, which, in the following, refer to Descriptive way, have a functionality that goes well beyond the playback means (15) and are in particular able, within the scope of the invention, to extract the additional coding in the desired manner in order to find copies made without authorization.
- Fig. 1 also shows that the playback and display unit (15) can be expanded by means of communication and operational control (9), which can query the means for verification (20) in a manner protected against manipulation as to whether the data carrier is an authorized one Copy is.
- further control information can be extracted from the additional coding data via the unit (20) and transmitted to the communication and operational control (9), e.g. the limitation of the usage rights, such as a limitation on the number of copies that can be legally produced from the data carrier, or the right to offer the digital document for exchange on the Internet, or the like.
- the output means were activated or suppressed these usage rights or usage rights restrictions associated with the electronic document within the playback, display, copy or data transfer modes.
- FIG. 2 shows on the basis of a single-user computer system how the present invention can be implemented and expanded with assemblies and components of a commercially available PC.
- a digital document (5) is read in accordance with FIG. 2 by a data carrier unit (10) by a data carrier reading device (12).
- the reading device is read by a laser and by a photodiode or the like for recognizing signal identifications which are applied to the data carrier unit and which are represented as digital data.
- the measured analog signal is transformed into a digital signal by means of an AD converter and converted into a sequence of 1 or 0.
- the errors are corrected by special error correction processes of a correction unit (14) implemented in hardware immediately after reading.
- An example of this error correction implemented in hardware would be the use of a low-pass filter to eliminate errors in the reflection or absorption zones, which are smaller than the typical pit lengths or their intermediate areas, the so-called lands.
- the conversion of digital signals using EFM signaling can be implemented in terms of hardware so that the byte data can be correctly reconstructed even in the event of individual bit errors.
- correction unit (16) implemented in software, which can be used to detect further errors in the digital data in each case by processor operations and which is also able to add the corresponding defective data depending on the severity of the error correct.
- the software-based error correction is used when different physical and logical structure formats can be contained in the data carrier reading unit.
- corrections to the smallest completed data units, the frames can also be carried out automatically in the correction unit (14) close to the hardware. Since the function of error detection and error correction can be contained both in the software and in the hardware, these can be offered and used in an interchangeable manner in both variants.
- the hardware detection and correction method implemented in hardware can be used to increase performance and relieve the load on the processor, while software implemented error detection and correction can be used to improve flexibility in reading various formats.
- Hybrid software and hardware implementations are also used, in which the error detection in a hardware implementation is carried out automatically, while the somewhat less frequent error corrections are carried out in software.
- the data are then transmitted for output by a regular driver (18) which is adapted to the special software interfaces of the hardware, or in accordance with a processor-centered sequence, the driver (18) is outputted by means of output, storage or processing (15). prompted by means of appropriate software components and calls in the driver interface for data acquisition from the data carrier (10) contained in the data carrier reading device (12).
- the extended data carrier reading device (26) reads the data contained on the data carrier unit (10) without the error correction methods contained in normal operation and / or with a higher sensitivity, so that the defective signal coding can also be registered.
- the data read by the extended data carrier reading device (26) can be improved and made more precisely detectable by additional low-pass filters or the like and / or immediately converted into a digital signal, so that a digital signal essentially unaffected by error correction measures is sent to the extended driver (24 ) is transferred or the data is requested from the driver (24) in the usual way.
- the data is requested in the verification device (20) by a validity checking unit (22) and processed further.
- the additional coding is separated from the content-related coding and watermark data and / or additional serial number and / or encrypted additional data is extracted in order to subsequently obtain the information regarding the validity or forgery of the hidden security features by using additional verification methods.
- the tester can be prompted to take further measures.
- the data obtained during the test can be stored in an archiving unit (30) for the purpose of preserving evidence.
- further data can be obtained through a Input unit (32) can be added to the evidence preservation protocol.
- a digital signature unit connected to the verification module can be digitally signed with qualified time stamps and an additional smart card to increase the data integrity of the evidence preservation protocols before the test protocol data are stored in an archive data storage unit.
- different parameters or extraction methods for the validity checking unit (22) can be loaded from the parameter storage unit (34) or different drivers from the driver storage unit (36) instead of the driver (24) .
- the selection process can also take place automatically after reading less identifying data from the digital document.
- FIG. 3 shows a CD or DVD with a center hole (42) and an area for the drive and pressure mechanism (44) of the player.
- the user data contained on the data carrier unit are stored on a track that begins from the inside and runs spirally outwards in the so-called user data area (40).
- Each CD also has an entrance area or lead-in area (46) in which tax or meta information is stored.
- the user data area is closed by an output area (lead-out area) (48) before the non-writable edge (41) of the CD is reached.
- the multisession CD allows the CD-ROM to contain several lead-in and lead-out areas, so that a CD cannot be burned in one process step, but can also be created in several steps, one in each case new lead-in / lead-out area must be written on the CD. Since these areas can each be several MB in size and the data contained therein are subject to a strict format, whereby the data area is not fully utilized, some of the additional coding can be integrated into these areas without the software that evaluates these areas additional coding data registered.
- the table in FIG. 4 contains an assignment of byte data to a 14 bit wide data modulation for a single data byte according to the EFM (Eight-in-Fourteen Modulation).
- the values contained under the EFM column contain only 256 combinations, out of a total of 16384 possible bit combinations.
- Individual bit errors in the 14-bit representation can be converted to the data bit using corresponding assignment methods, which then corresponds to the associated data byte with a high degree of probability. For example, 1000010 0100000 corresponds to byte value 1.
- the assignment procedures are designed so that they can also assign the byte values of 1 to a 1100010 0100000.
- a regular driver with a corresponding error correction would not make a distinction between the two EFM encodings and was accordingly passed the byte value 1 to the requesting components. Since 1 pit error can have various causes, 2 or 3 pit changes can be used to hide additional codes, so that a reliable assignment to the original byte is still possible for regular error correction. On the other hand, a more sensitive data carrier reading unit (26) can extract these additional data from the EFM modulation if circumventing any error corrections that may be present. Since a large part of the pit / lands and thus the EFM changes can be traced back to actual reading and material errors, the hidden additional coding data is to be seen in a quantity of further data which can be traced back to real errors and impurities.
- the finally digital signal data (52) in the form of an unstructured linear chain (54) of bits (“0” and “1 ”) arises while a synchronization identifier consisting of 24 bits as a pits / country chain makes it possible to divide the bit sequence by subsequently using a division method.
- a synchronization identifier consisting of 24 bits as a pits / country chain makes it possible to divide the bit sequence by subsequently using a division method.
- 3-bit wide "merging bits” (55) can then be used to extract the 14-bit modulated data (56).
- the 14-bit data (56 ) the 8 bit data are finally obtained as byte values (58).
- the pits have a width (-66) of approximately 0.5-0.6 ⁇ m and a length (62) of 0.83-3.05 ⁇ m.
- the distance between the tracks (64) is 1.5-1.6 ⁇ m.
- the focused laser (68) with red light has a wavelength of 780 nm.
- the depth of field of the laser beam is approx. 2 ⁇ m, so that due to the diameter of the laser beam (68) of a regular CD drive, the defects of type (71), ( 72) and (73) cannot be registered. These defective markings can be on the track (71) in a lands area, between the tracks (72) and in the vicinity of a pit start or end area (73).
- the defective pits can, however, be registered by a laser beam with a shorter wavelength or with a non-linear focusing method or a non-linear photodetection device and can be used as additional coding independently of the coding used with the digital document.
- each frame begins with a 24-bit synchronization area (81) and 3 merging bits. This is followed by 1 control byte (82), which, like all the following bytes, is shown in an EFM representation and is separated from 3 merging bits.
- the first user data area (84) consists of 12 bytes followed by 1 (l st) Level EDC / ECC correction data (85), consisting of 4 bytes.
- the second user data area (86) also consists of 12 bytes followed by the second (2 nd) Level EDC / ECC correction data (4 bytes) (87). This frame creates a sector (90) by lining up 98 frames.
- FIG. 8 describes the schematic structure of the sector (90), the 2,352 bytes of user data contained in the useful data area (94) being distributed in accordance with the frame areas (84) and (86) described in FIG. 7.
- the EDC / ECC data area (95) the l st level EDC / ECC and EDC / ECC data area (97) the 2 nd level EDC / ECC data are included.
- the 98 byte control data (92), which are also distributed, are also called subcode channels
- Figure 9 contains a single subcode byte (82) contained in each frame. According to the convention, the bits are marked with P to W.
- the subcode channel P (82p) contains a flag which indicates at which address within the track the music or the data begin.
- the subcode Channel Q (82q) allows the addressing of a sector on a disc in a manner specified in the Red Book.
- the error detection and correction bytes contained in (95) and (97) and the CRC bits (93c) contained in the subcode channel allow the user and control data to be changed so that a regular driver receives the data without errors in the case of automated error correction, while the presence of an error and the resulting additional information can be extracted as additional coding by a verification unit.
- the verification unit cannot recognize the error bits that are attributable to the additional coding without additional data.
- the subcode channels R to W are not used on a music or data CD (CD-ROM), so that almost 12 MB can be stored in these areas, based on the entire CD.
- a music CD is constructed in accordance with FIG. 11, in which the CD is constructed in tracks by means of the subcode channel P. It contains a lead-in area (46) at the beginning and a lead-out area (48) at the end. There can be up to 99 music tracks (100) in between. Individual free or empty sectors (101) which do not contain any useful data, but instead additional coding data, can be stored between the pieces of music / tracks.
- FIG. 12 describes the schematic structure of a CD-ROM sector (HO) in accordance with Mode 1 of the Yellow Book specification. Due to the higher requirements with regard to freedom from errors in the user data, the user data area (94) is further divided. In addition, a 12 byte sync data field (102), a 4 byte header data field (104) and a data area for user data (105) limited to 2048 bytes are introduced. The remaining 288 bytes are used for additional CD-ROM-specific error detection and correction (106).
- the user and header data provided with the additional coding are replaced by the data fields (95), (97) and ( 106), a regular driver being able to ignore this additional information contained therein and output it correspondingly corrected for errors, while the verification unit (20) can recognize the additional data and, together with others, also accidentally also extract error and defect data contained therein.
- FIG. 13 contains a block diagram for the description of the production of a code provided with additional codes Disk unit (10).
- the additional coding data is generated as a watermark, as a serial number or as an encrypted character string in the additional coding data creation unit (130).
- the parameters used and / or the data resulting therefrom are stored in a parameter data storage unit (132) and / or transferred to a unit for generating verification parameters (126), from which the verification unit (20) either via the Internet or via data carriers corresponding data can be updated promptly.
- the content of the music data completed for publication is e.g. fetched from a music data storage unit (125) by a merging unit (120) which is responsible for the overall production of the data contained on the data carrier units, this unit thus for merging the music data and the additional coding data before the creation of a corresponding glass master or a die is responsible.
- the EFM codings that have not yet been carried out take place.
- the EDC / ECC error correction values are then calculated in the creation unit (122) and a corresponding pit coding is generated on the glass master (die), so that the CDs are produced using the injection molding method according to the production method for CDs known from the prior art or DVDs are produced, in which the CDs are each made of polycarbonate with a reflective metal layer, the additional, including The identification and recognition of pirate goods, encodings are contained in the redundancy area of the data.
- an input unit (135) is provided in which additional administration data for the watermarks, serial numbers or encrypted additional data can be entered in the data memory and for controlling the generation of the corresponding data ,
- a postprocessing unit (124) can be carried out in an additional step, for example by a laser which .die additional signaling indicator burns on the optical data carrier at previously calculated positions, so as to create the situation of a defective signaling.
- FIG. 14 shows a block diagram consisting of components in which several additional coding data output units (144) can be provided and the production of watermarks (150) behind a specially protected security installation, e.g. an optional firewall (145), with the delivery of the corresponding additional coding data only on request by a data entry station (142).
- a specially protected security installation e.g. an optional firewall (145)
- the protection of the components behind the firewall arises from the need to protect particularly critical data from copying the watermark or the like and possibly a pirate product that appears legal from being passed on or betrayed.
- the data are fetched via the session management of the server (140), a user having to be known to the user management (146) before further user actions in the session are carried out after the user password has been checked by the user access management (148).
- Management (140) can be unlocked.
- the data output on the output unit (144) can possibly be automatically processed there, transformed and further calculated as part of a workflow.
- the additional coding data come from the additional coding data generator unit (150) or from a buffer, e.g. from that of session management (140) or the like.
- a key generation and use unit (154) is provided for generating and using private or public keys, in which either the additional coding data generator unit (150) is supplied with key data or the private key data are applied to watermark parameters, serial numbers or the like.
- a log file generator and storage unit (164), an external monitoring unit (162) being added to further increase security, the data of which are also not subsequently alterable in the log file.
- the resulting data can be used as a qualified protocol in a certified log file output unit (160) to demonstrate the integrity and freedom from manipulation of the server unit.
- the component model allows the processes to be distributed to individual, independent computers that communicate with each other via a network, it makes sense to combine individual tasks on a smaller number of computers, so that the associated flexible distribution through suitable configuration management (165) , as in the example described, can find a corresponding application.
- FIG. 15 shows a comparison of schematic structures on a data carrier unit realized in the present example as a CD or DVD in two reading or viewing levels:
- the left-hand view illustrates a data carrier unit (10) with a digital data area (171) and an additionally provided area (180) with serial number or other encrypted additional data; the reference numerals (170) indicate two otherwise known watermark data areas.
- FIG. 15 illustrates a deeper technical reading level of the data carrier unit (10), namely without (largely hardware-based or automated) cleaning of the user interface in the area of the digital data 172 in order to always have existing, randomly arranged defects, errors, local deviations or the like (hereinafter also referred to as "white noise” (175)).
- the reference numerals (170 a ) and (180 a ) designate the additional coding data which are also present, as are contained in the left view, but these cannot be distinguished directly from the data of the white noise (175) in the right representation.
- FIG. 16 With a schematic view of a driver unit combining hardware and software elements for implementing the verification means (20) (cf. FIG. 2), it is now possible to display the physical conditions that are inevitably present on a data carrier unit (FIG. 15). to be used selectively and thus to ensure the desired verification purpose within the scope of the invention.
- units (188) and (189) offer the possibility of hardware-based (i.e. real-time, however comparatively inflexible) error detection and correction, but this is done selectively according to an additional coding applied, i.e. selectable or switchable.
- a device (200) for filtering out the white noise (FIG. 15) cleans up the data carrier (10), controlled by a suitable parameter and storage unit (215).
- the data-based output product of the storage unit (200), namely the data carrier image (202) adjusted for the white noise, which still contains the additional coding data (204) according to the invention, is then selectively applied to the relevant unit (205) Coding information is examined, and it is then converted into independent verification criteria (depending on the unit (215)) divided and stored in the table (210), as shown schematically.
- FIG. 18 and 19 illustrate the generation (FIG. 18) of the multiple watermark information or its evaluation and checking (FIG. 19) on the basis of the flowchart diagrams shown there; reference is made in each case to the associated explanations of the method steps in the attached reference symbol table, which, like the other explanations of the reference numerals, is to be considered as belonging to the invention in the present description.
- the selection of the keys establishing a relationship between the watermarks or the serial number can be variable, randomized or in particular also rule-based, as can the selection or positioning of the specific one Application pattern of the additional coding.
- FIG. 20 again uses the concrete verification process
- the additional coding data are divided into 3 categories: the watermark-like, the serial number-like and the encrypted additional data-like data.
- the serial number data or unencrypted additional data that can be added to the serial numbers as additional identifiers are data that e.g. at a defined location (data position), in a defined sector or the like in a preferably coherent form on the data carrier in unencrypted form.
- the meaning of the data that can be read in these fields is made known to the verification unit by method instructions and / or by parameter sets.
- the encrypted additional data are also in defined data carrier positions and / or sectors or the like saved, the only difference being the encryption of the corresponding data record.
- Additional data such as parameters, procedural instructions or the like, can be contained in both the unencrypted and the encrypted additional coding data sets, with which the hidden watermarks can then be extracted.
- the decrypted encoding data records can either be decrypted using publicly available public key keys, for example in the case of data to be protected against manipulation, such as to limit the use of the data carrier. To increase the security and reliability of the method, further keys can also later be applied to other fields that have already been prepared, so that a check can still be carried out if appropriate secret information for the exact implementation of the device has become known.
- the parameters obtained in this way from the additional coding data in unencrypted and encrypted form can be converted into watermark data, and the data carrier reading device can then search for this data accordingly without the need for all data that is detected as white noise, and possibly originated from real material or surface defects from which data carriers must be read.
- the watermark is a signal that arises in the white noise when reading the data uncorrected, i.e. with unintended material or surfaces or sensory errors.
- the added additional coding data are to be regarded as watermarks because they are imperceptible when the surface of the data carrier is scanned very precisely and also when the data carrier format is known.
- any naturally existing defect that can be detected or read out by the verification unit in a reproducible manner can be used to determine the authenticity of a CD or DVD and by linking it within a predetermined method, for example with a serial number or with other additional ones encrypted data if necessary.
- the additional identifiers do not have to be applied artificially as defect-like identifiers, but they can also be selected and thus defined by defining a predetermined selection and detection method from inherently existing defect locations (data carrier identifiers or defective signal elements within the meaning of the invention).
- a watermark can already be defined and distinguished, which, as in the watermarks known in the prior art, does not arise only through data or identifiers additionally added externally.
- the defects which in principle occur randomly, create a clear watermark, which is naturally hidden without additional effort, but if knowledge of predetermined parameters, instructions and use of suitable verification or sensor means is known.
- the parameters used can also be stored on the CD or DVD, as their meaning is only determined by the Verification unit is manufactured. Through the variation of different verification methods, it can also be determined very quickly which methods for recognizing additional markings have become known, since a very small number of successful matches with a simultaneous mismatch of the markings within other verification methods is a clear indication that it is very likely that pirates' unmatched labeling procedures have been exposed.
- the watermark that has become recognizable through the use of the parameters then represents a document that can be digitally signed by using known digital signature methods and whose values have been stored within a predetermined and possibly even published area of the CD.
- the defective data used or contained in a watermark or in the additional coding can also be subject to change due to contamination, scratches or other environmental factors, so that the added and used defective additional characteristics can also have an internal redundancy, which is due to an EFM-type Coding or modulation, by means of CRC or EDC / ECC-like correction data or by means of CIRC or ACIRC-like reconstruction methods, the reliability of their data-based detectability can be increased.
- the reliability of the copy protection method according to the invention results from the fact that even a CD pirate equipped with professional manufacturing technology and copying technology is not able to error-free clone all defective signals, be they of physical origin or based on the deviation from the logical format.
- the absence of the additional encodings immediately gives an indication of illegal copies of an unauthorized data carrier.
- Disk Unit 2 means for applying digital documents to a. Disk Unit
- control and control bytes of a frame which is also referred to as a subcode channel
- Frames of a sector of user data of a frame 84 1. 85 l st level EDC / ECC error detection and a frame -korrektur Scheme
- 90 sector which is composed of 98 frames as a data unit 92 control data that arises from the control bytes of the frames that form a common sector 93s synchronization bits from the 82Q bit chain 93j type information on the content of the 82Q bit chain 93k control bits from the 82Q bit chain 93i data content bits from the 82Q bit chain 93c CRC error detection bit chain within the 82Q bit chain
- Level EDC / ECC Data area of a sector which is formed from the data areas (85) of all frames that belong to a common sector
- 135 input unit Means for entering additional data during manufacture for the purpose of administration or rights administration or the like.
- 155 data storage unit Means for storing data which are directly related to the generation of the additional coding.
- 170a watermark data on a CD 170a watermark data on a CD; Additional coding data that is hidden on a data carrier in additional random additional data resulting from faulty data
- 180 serial number data and encrypted data may be the, preferably in continuous manner, contained on a data carrier and 'the knowledge of the corresponding parameters read at defined locations / sectors / positions and as a serial number data od. Like. Identifies 180a serial number data, and Encrypted data on a CD without applying error correction; additional co- dation data that is hidden on a data carrier in other random faulty data
- Interface for fetching data from a data carrier
- Data read from a data carrier 202 Mapping the data from a data carrier unit after filtering out the white noise
- Process step Calculation of the watermark with the values or processes selected in (222) - (228), set or entered as standard.
- Verification criterion matches.
- 262 Means for offering, using and selecting various methods for generating watermarks, serial numbers and other (encrypted) additional data
- 264 Means for offering, applying and selecting various methods of calculating application points or application patterns
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/487,293 US20050027996A1 (en) | 2001-08-22 | 2002-08-22 | Device for copy protection |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE10140237A DE10140237A1 (de) | 2001-08-22 | 2001-08-22 | Vorrichtung zum Kopierschutz |
| DE10140237.6 | 2001-08-22 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2003019552A1 true WO2003019552A1 (de) | 2003-03-06 |
| WO2003019552A8 WO2003019552A8 (de) | 2003-11-06 |
Family
ID=7695656
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2002/009392 Ceased WO2003019552A1 (de) | 2001-08-22 | 2002-08-22 | Vorrichtung zum kopierschutz |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US20050027996A1 (de) |
| DE (1) | DE10140237A1 (de) |
| WO (1) | WO2003019552A1 (de) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1353332A1 (de) * | 2002-04-12 | 2003-10-15 | Hudson Soft Co., Ltd. | Appareil et procédé de préparation des données modifiées pour empêcher la lecture ou l'exécution non-authorisée des données originelles |
| GB2421350A (en) * | 2004-12-20 | 2006-06-21 | Macrovision Europ Ltd | Copy protection for optical discs |
| WO2007069164A3 (en) * | 2005-12-15 | 2007-11-22 | Koninkl Philips Electronics Nv | Method for recording data having a distinctive feature |
| US7391691B2 (en) | 2003-08-29 | 2008-06-24 | General Electric Company | Method for facilitating copyright protection in digital media and digital media made thereby |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070220537A1 (en) * | 2003-06-16 | 2007-09-20 | Microsoft Corporation | Counterfeit-resistant portable storage media with embedded security device |
| US7086073B2 (en) * | 2003-06-16 | 2006-08-01 | Microsoft Corporation | Optical storage media with embedded security device |
| WO2005078721A1 (en) * | 2004-02-12 | 2005-08-25 | Koninklijke Philips Electronics N.V. | Reproduction apparatus and method for reproducing a unique medium identifier |
| US11734393B2 (en) | 2004-09-20 | 2023-08-22 | Warner Bros. Entertainment Inc. | Content distribution with renewable content protection |
| US8190918B2 (en) | 2006-11-13 | 2012-05-29 | Disney Enterprises, Inc. | Interoperable digital rights management |
| JP5461436B2 (ja) * | 2008-02-11 | 2014-04-02 | セキュアー コンテント ストレージ アソシエイション, リミテッド ライアビリティ カンパニー | 簡易非自律ピアリング環境透かし、認証、及びバインド |
| WO2011121928A1 (ja) * | 2010-03-31 | 2011-10-06 | 日本電気株式会社 | デジタルコンテンツ管理システム、検証装置、そのプログラムおよびデータ処理方法 |
Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0637023A1 (de) * | 1993-07-29 | 1995-02-01 | Victor Company Of Japan, Limited | Optische Scheibe, Gerät zur Prüfung der optischen Scheiben und Gerät zur Aufzeichnung von Informationen auf eine optische Scheibe |
| WO1998001852A1 (en) * | 1996-07-05 | 1998-01-15 | Ifunga Test Equipment B.V. | Method of providing an optical data carrier with identity information |
| WO1998052114A1 (en) * | 1997-05-16 | 1998-11-19 | Imation Corp. | Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor |
| EP0899733A1 (de) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | System zur Kopierverwaltung einer optischen Platte |
| EP0901122A2 (de) * | 1997-09-05 | 1999-03-10 | Pioneer Electronic Corporation | Informationserzeugungs- und -wiedergabeverfahren und -gerät sowie Informationsaufzeichnungsmedium |
| EP0908881A2 (de) * | 1997-09-16 | 1999-04-14 | Kabushiki Kaisha Toshiba | Optische Platte mit elektronischem Wasserzeichen, Wiedergabegerät dafür und Kopierschutzverfahren damit |
| US5930209A (en) * | 1996-07-24 | 1999-07-27 | U.S. Philips Corporation | Optical disc with sector address irregularities to prevent copying, and apparatus for recording and detecting such copy protection |
| WO1999063538A1 (en) * | 1998-06-01 | 1999-12-09 | Enterprise Corporation International | Apparatus and method for copy protection for recordable digital media |
| US6076165A (en) * | 1998-01-16 | 2000-06-13 | Sony Corporation | Method for authenticating digital recording devices |
| GB2348585A (en) * | 1999-01-26 | 2000-10-04 | Ibm | Method and apparatus for watermarking digital data |
| WO2000062293A1 (en) * | 1999-04-12 | 2000-10-19 | Macrovision Corporation | Copy protection signature for compact disks |
| WO2000074053A1 (en) * | 1999-05-26 | 2000-12-07 | Macrovision Europe Limited | The copy protection of digital audio compact discs |
| WO2001061696A1 (en) * | 2000-02-15 | 2001-08-23 | Macrovision Corporation | The copy protection of digital audio compact discs |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5943422A (en) * | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
| US6684199B1 (en) * | 1998-05-20 | 2004-01-27 | Recording Industry Association Of America | Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same |
| ATE404970T1 (de) * | 2000-12-14 | 2008-08-15 | Ecd Systems Inc | Verfahren zur authentifizierung eines optischen aufzeichnungsmediums und ein optisches aufzeichnungsmedium |
-
2001
- 2001-08-22 DE DE10140237A patent/DE10140237A1/de not_active Withdrawn
-
2002
- 2002-08-22 US US10/487,293 patent/US20050027996A1/en not_active Abandoned
- 2002-08-22 WO PCT/EP2002/009392 patent/WO2003019552A1/de not_active Ceased
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0637023A1 (de) * | 1993-07-29 | 1995-02-01 | Victor Company Of Japan, Limited | Optische Scheibe, Gerät zur Prüfung der optischen Scheiben und Gerät zur Aufzeichnung von Informationen auf eine optische Scheibe |
| WO1998001852A1 (en) * | 1996-07-05 | 1998-01-15 | Ifunga Test Equipment B.V. | Method of providing an optical data carrier with identity information |
| US5930209A (en) * | 1996-07-24 | 1999-07-27 | U.S. Philips Corporation | Optical disc with sector address irregularities to prevent copying, and apparatus for recording and detecting such copy protection |
| WO1998052114A1 (en) * | 1997-05-16 | 1998-11-19 | Imation Corp. | Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor |
| EP0899733A1 (de) * | 1997-08-28 | 1999-03-03 | Sony DADC Austria AG | System zur Kopierverwaltung einer optischen Platte |
| EP0901122A2 (de) * | 1997-09-05 | 1999-03-10 | Pioneer Electronic Corporation | Informationserzeugungs- und -wiedergabeverfahren und -gerät sowie Informationsaufzeichnungsmedium |
| EP0908881A2 (de) * | 1997-09-16 | 1999-04-14 | Kabushiki Kaisha Toshiba | Optische Platte mit elektronischem Wasserzeichen, Wiedergabegerät dafür und Kopierschutzverfahren damit |
| US6076165A (en) * | 1998-01-16 | 2000-06-13 | Sony Corporation | Method for authenticating digital recording devices |
| WO1999063538A1 (en) * | 1998-06-01 | 1999-12-09 | Enterprise Corporation International | Apparatus and method for copy protection for recordable digital media |
| GB2348585A (en) * | 1999-01-26 | 2000-10-04 | Ibm | Method and apparatus for watermarking digital data |
| WO2000062293A1 (en) * | 1999-04-12 | 2000-10-19 | Macrovision Corporation | Copy protection signature for compact disks |
| WO2000074053A1 (en) * | 1999-05-26 | 2000-12-07 | Macrovision Europe Limited | The copy protection of digital audio compact discs |
| WO2001061696A1 (en) * | 2000-02-15 | 2001-08-23 | Macrovision Corporation | The copy protection of digital audio compact discs |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1353332A1 (de) * | 2002-04-12 | 2003-10-15 | Hudson Soft Co., Ltd. | Appareil et procédé de préparation des données modifiées pour empêcher la lecture ou l'exécution non-authorisée des données originelles |
| US7391691B2 (en) | 2003-08-29 | 2008-06-24 | General Electric Company | Method for facilitating copyright protection in digital media and digital media made thereby |
| GB2421350A (en) * | 2004-12-20 | 2006-06-21 | Macrovision Europ Ltd | Copy protection for optical discs |
| GB2421350B (en) * | 2004-12-20 | 2007-05-02 | Macrovision Europ Ltd | Copy protection for optical discs |
| WO2007069164A3 (en) * | 2005-12-15 | 2007-11-22 | Koninkl Philips Electronics Nv | Method for recording data having a distinctive feature |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2003019552A8 (de) | 2003-11-06 |
| US20050027996A1 (en) | 2005-02-03 |
| DE10140237A1 (de) | 2003-03-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| DE69831275T2 (de) | Kopierschutzverfahren für einen Aufzeichnungsträger mit einem Muster von logischen Fehlern | |
| DE60109160T2 (de) | Beschreibbares speichermedium mit geschütztem datenbereich | |
| DE69704352T2 (de) | System zur Kopierverwaltung einer optischen Platte | |
| DE4308680B4 (de) | Verfahren und Vorrichtung zum Verhindern einer unberechtigten Benutzung eines Aufzeichnungsmediums | |
| DE60017877T2 (de) | Rekorder zur aufzeichnung von produktionskopien auf basis eines kopierattributes das eingebettet ist als elektronisches wasserzeichen in der produktion, wiedergabevorrichtung zur wiedergabe von aufgezeichneten kopien, aufgezeichnungsmedium, aufzeichungsverfahren und wiedergabeverfahren. | |
| DE10194725B3 (de) | Datenaufzeichnungs- und Wiedergabegerät mit Kopierschutzfunktion | |
| AT404644B (de) | System zum kodieren einer glas-vaterplatte, um eine gefälschte cd-rom zu erkennen | |
| DE69807807T2 (de) | Verfahren und vorrichtung zur übertragung von inhaltsinformation und darauf bezogener zusatzinformation | |
| DE60029371T2 (de) | Informationsaufzeichnungsvorrichtung und Informationswiedergabevorrichtung mit Lizenzverwaltung | |
| DE60019546T2 (de) | Medium mit aufgezeichneten daten, datenwiedergabeverfahren und wiedergabegeraet | |
| DE69703155T2 (de) | Verfahren zum versehen eines optischen datenträgers mit identitätsinformationen | |
| DE69932695T2 (de) | Technik zur Datenkopiersteuerung | |
| DE69635069T2 (de) | Wiedergabe von Daten | |
| DE60011958T2 (de) | Optische Platte, optisches Plattenaufzeichnungs- und wiedergabegerät, und Verfahren zur Aufzeichnung und Wiedergabe | |
| DE69834604T2 (de) | System zum kopierschutz von aufgezeichneten signalen | |
| EP1944716B1 (de) | Verfahren und Vorrichtung zum Sichern eines Dokuments mit eingefügtem Signaturabbild und biometrischen Daten in einem Computersystem | |
| DE69915446T2 (de) | System und Verfahren zum Datenkopieren, Einrichtung zum Ablesen von Daten sowie Einrichtung zum Abschreiben von Daten, Datenaufzeichnungsmedium zur optionalen Verhinderung einer digitalen Kopie der dritten Generation von einer ROM-Platte | |
| DE60129326T2 (de) | Datenaufzeichnungsmedium und wiedergabevorrichtung daf r | |
| DE60108692T2 (de) | Schutz eines inhalts vor unrechtmässiger wiedergabe durch den existenzbeweis eines kompletten datensatzes mit hilfe von selbstreferenzierenden sektionen | |
| DE69836100T2 (de) | Verfahren und vorrichtung zur bestimmung der herkunft einer datenträgerplatte | |
| WO2003019552A1 (de) | Vorrichtung zum kopierschutz | |
| DE60130265T2 (de) | Sichere superverteilung von benutzerdaten | |
| DE60208707T2 (de) | Verfahren und gerät zur verhinderung von unautorisierten kopien von digitaler information | |
| DE60006538T2 (de) | Beschreibbare optische Platte | |
| DE60318458T2 (de) | Zugangsgeregelter optischer datenträger und verfahren dafür |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VN YU ZA ZM Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| CFP | Corrected version of a pamphlet front page | ||
| CR1 | Correction of entry in section i |
Free format text: IN PCT GAZETTE 10/2003 UNDER (81) DELETE "ALL DESIGNATIONS EXCEPT US" AND UNDER (84) "ALL DESIGNATIONS EXCEPT EUROPEAN PATENT" Free format text: IN PCT GAZETTE 10/2003 UNDER (81) DELETE "ALL DESIGNATIONS EXCEPT US" AND UNDER (84) "ALL DESIGNATIONS EXCEPT EUROPEAN PATENT" |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 10487293 Country of ref document: US |
|
| NENP | Non-entry into the national phase |
Ref country code: JP |