This application claims priority to Great Britain Serial No. 0411163.9 filed May 19, 2004 entitled “The Copy Protection of Optical Discs”.
The present invention relates to a method of copy protecting an optical disc and to a copy protected optical disc. In addition, the application relates to a method for encoding user data and a method for selecting data symbols for incorporation within user data.
Optical discs, such as the various formats of compact discs (CDs) and of digital versatile discs (DVDs) are increasingly used for carrying information for many different applications. The information encoded onto the optical disc is generally very valuable and, accordingly, they are increasingly copied by counterfeiters. Furthermore, recordable CDs and CD writers for writing the information content from one disc to such recordable discs are readily available to the domestic consumer. Recordable DVDs and DVD writers have become as readily available. This means that new and effective methods for copy protecting optical discs are required.
The applicants have proposed various copy protection techniques which utilise data patterns which have poor Digital Sum Value (“DSV”) characteristics. For example, in WO 02/11136 data patterns are added to a CD to provide an authenticating signature. These data patterns are chosen to cause DSV problems. It has been found that when a CD writer is used to make a copy of the original disc it has difficulty writing the authenticating signature.
In PCT/GB2004/000241 areas of unbalanced dc content are added to an optical disc by recording onto the disc data with poor DSV characteristics. It has been found that if the areas of recorded data with unbalanced dc content are restricted in size, for example, there is no problem in playing the disc normally but again, copying of the disc is made very difficult.
It will be seen from the above that it is very useful to impress data patterns with poor DSV characteristics onto optical discs.
The present invention seeks to provide a method of copy protecting an optical disc by impressing subversive data with poor DSV characteristics thereon.
According to a first aspect of the present invention there is provided a method of copy protecting an optical disc on which user data is encoded, the encoding utilising a multimodal code, and the method comprising incorporating selected data symbols within the user data to be encoded onto the disc to ensure that at least one subversive sequence of code words having a large absolute value of DSV is encoded onto the disc.
It is extremely useful if the subversive sequence of code words can be encoded onto the disc by a simple choice of data symbols within the user data. These data symbols need to be chosen such that they will force any encoder to output the subversive sequence of code words.
Preferably, the or each subversive sequence of code words has a large absolute value of DSV.
In an embodiment, sequences of data symbols forcing subversive sequences of code words that have an even number of transitions are provided.
Preferably, subversive sequences of data symbols that when encoded in a certain state S will force an encoder to output S as the next state for that sequence are provided.
In an embodiment, each code word in the or each subversive sequence is the only code word, without alternative, for the corresponding selected data symbol incorporated in the user data.
Additionally and/or alternatively, some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but each of the two alternatives is equivalent.
Additionally and/or alternatively, some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but all alternatives except one are ruled out by RLL rules.
As indicated above, the subversive sequences of code words may be used to provide an authenticating signature.
Additionally and/or alternatively, the subversive sequences of code words may be used to give unbalanced dc content to selected areas of encoded data on the disc.
Preferably, the or each subversive sequence of code words has a DSV with a rapid rate of change.
According to a further aspect of the present invention there is provided a copy protected optical disc on which user data is encoded, the encoding utilising a multimodal code, wherein at least one subversive sequence of code words having a large absolute value of DSV is encoded onto the disc, the or each subversive sequence of code words having been obtained from selected data symbols incorporated within the user data.
Preferably, the or each subversive sequence of code words has a large absolute value of DSV.
Additionally and/or alternatively, the or each subversive sequence of code words has even transitions.
Additionally and/or alternatively, subversive sequences of data symbols that when encoded in a certain state S will force an encoder to output S as the next state for that sequence are provided.
Additionally and/or alternatively, each code word in the or each subversive sequence is the only code word, without alternative, for the corresponding selected data symbol incorporated in the in user data.
In an embodiment, some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but each of the alternatives is equivalent.
Additionally and/or alternatively, some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but all the alternatives except one are ruled out by RLL rules.
The or each subversive sequence of code words may be used to provide an authenticating signature.
Additionally and/or alternatively, the or each subversive sequence of code words is used to give unbalanced dc content to selected areas of encoded data on the disc.
Preferably, the or each subversive sequence of code words has a DSV with a rapid rate of change.
The present invention also extends to a method for encoding user data, utilising a multimodal code, the method comprising incorporating selected data symbols into the user data, the data symbols having been selected to force the encoder to produce at least one subversive sequence of code words having a large absolute DSV value.
When dealing with non-multimodal codes such as the EFM modulation used with CDs, it is relatively straight forward to choose a subversive sequence of code words and then to decode that sequence into data symbols for incorporation within the user data. However, expensive computational time would be required in order to undertake the same operation for DVDs.
In an embodiment, the or each subversive sequence of code words has a large absolute value of DSV.
Preferably, the or each subversive sequence of code words has even transitions.
Additionally and/or alternatively, subversive sequences of data symbols that when encoded in a certain state S will force an encoder to output S as the next state for that sequence are provided.
Additionally and/or alternatively, each code word in the or each subversive sequence is the only code word, without alternative, for the corresponding selected data symbol incorporated in the user data.
Additionally and/or alternatively some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but each of the two alternatives is equivalent.
Additionally and/or alternatively, some of the code words in the or each subversive sequence are one of two or more alternatives for the corresponding selected data symbol incorporated in the user data, but all the alternatives except one are ruled out by RLL rules.
In a preferred embodiment, each selected data symbol has been identified as a data symbol which has a code word with a large absolute value of DSV where either there is no alternative code word or all possible alternatives have large absolute values of DSV.
Accordingly, in an embodiment, the selected data symbols are identified by looking at the sequence of code words for an input sequence of data symbols, and establishing: if the sequence of code words has even transitions; if the sequence of code words has the next state the same as the initial state; if there are no alternative sequences of code words or all alternative sequences of code words are equivalent, or one of two or more alternative sequences violates the RLL rules; and if the sequence of code words has a large absolute value of DSV; and the data symbols are selected for incorporation within the user data where all the conditions are met.
The present invention also extends to a method of selecting data symbols for incorporation within user data to be encoded using a multimodal code, the selected data symbols being selected so that they are capable of forcing an encoder to produce at least one subversive sequence of code words, the method comprising looking at a possible code word for a data symbol and selecting that data symbol if its code word has a large absolute value of DSV and there are no alternative code words, or all alternative code words are equivalent, or one of two alternative sequences violates the RLL rules.
According to a further aspect of the present invention there is provided a method of selecting data symbols for incorporation within user data to be encoded using a multimodal code, the selected data symbols being selected so that they are capable of forcing an encoder to produce at least one subversive sequence of code words, the method comprising looking at the sequence of code words for a sequence of two or more data symbols, and selecting that sequence of two or more data symbols if the sequence of code words has a large absolute value of DSV and there is not an alternative sequence of code words, or all alternative sequences are equivalent, or one of two alternative sequences violates the RLL rules.
Preferably, the method further comprises selecting the sequence of data symbols where the sequence of code words has even transitions.
The method may further comprise selecting the sequence of data symbols where the sequence of code words has its next state the same as its initial state.
The present invention will hereinafter be described, by way of example, with reference to the accompanying drawings, in which:
a and 20b illustrate a flow diagram of a method of selecting data symbols for incorporation within user data to be encoded using a multimodal code.
a and 20b illustrate a flow diagram indicative of the method, which may be extended and/or modified as would be appreciated by those skilled in the pertinent art according to or suggested by the description herein.
Multimodal Codes
Multimodal codes are Run Length Limitation (RLL) codes based on a state machine where the optimum symbol choice depends not only on the encoder state and the data to be encoded but also on some non-local characteristics such as the DSV. The Eight-to-Sixteen Modulation (ESM or EFM plus) used in DVD discs constitute examples of such codes.
The basic structure of an RLL code based on a state machine is as follows. We say that the code is an RLL(k,d) code if k and d are the minimum and maximum number respectively of consecutive zeroes allowed in an encoded sequence.
Given an input data symbol D(i) and a state S(i), an output code word
C(i)=C(D(i),S(i))
will be returned together with a next state
S(i+1)=S(D(i),S(i)),
where C(,) is the output code word function and S(,) is the next state function as shown in
{D(0), D(1), . . . , D(n)}
and an initial state S(0) are given. For each pair (D(i), S(i)) a new pair (C(i), S(i+1)) will be generated, as shown in
C(i)=C(D(i), S(i));
S(i+1)=S(D(i), S(i)).
The next state S(i+1) is the state in which the data symbol D(i+1) will be encoded. Then the output sequence of code words will be
{C(0), C(1), . . . C(n)},
where C(0) is in state S(0), C(1) is in state S(1), . . . , C(n) is in state S(n). The output code words form a sequence of bits that satisfies the RLL(k,d) rule.
The state of a code word C can be essentially defined by its RLL characteristics. More precisely, it can be defined according to the class of code words that C can follow without violating the RLL rule. For example, consider the class of code words with no trailing zeroes. The state S1 can then be defined as the state in which all the code words with at least k leading zeroes are. Given this definition for state S1, a code word with no trailing zeroes can be followed by any code word in state S1. Hence, state S1 can be set as the next state for all the code words with no trailing zeroes. Similarly, consider the class of code words having d trailing zeroes and define state S2 as the state in which all the code words with no leading zeroes are, so that state S2 can be set as the next state for all the code words with d trailing zeroes.
Similarly, State 4 is defined to be the class where all the code words have at most one leading zero. Since in ESM there are no code words having more than 9 trailing zeroes, any ESM code word with more than 2 trailing zeroes can be followed by a code word in State 4 and hence can have the next state set to State 4.
A multimodal code provides options in the way an input data symbol 40 can be encoded, as shown in
For example,
The ESM is a 4-state multimodal code that converts 8-bit input data symbols into 16-channel bit code words. This conversion is performed according to two look-up conversion tables, the Main Table and the Substitution Table. For each state and for each input data symbol, the Main Table contains the list of the corresponding ESM code words. The Substitution Table contains alternative encoding for the data symbols included in the range 0, . . . ,87. Hence, given a data symbol D(i) in the range 0, . . . ,87 and a state S(i), there exists two alternative outputs C(i), S(i+1) and C′(i), S′(i+1), one from the Main Table, the other from the Substitution Table. For the data symbols in the range 88, . . . ,255 that are to be encoded either in State 1 or in State 4 there can be also alternative outputs: data symbols 88, . . . ,255 to be encoded in State 1 can also be encoded in State 4, provided that the RLL rules are satisfied and, similarly, data symbols 88, . . . ,255 to be encoded in State 4 might as well be encoded in State 1. No alternative encoding exists for data symbols in the range 88, . . . ,255 to be encoded either in State 2 or in State 3. The available outputs for the data symbols are shown in
The tables and the methods that are used to carry out the conversion are arranged in such a way that the absolute value of the DSV (|DSV|) of the output sequence of code words can be minimised as is illustrated in
We say that a sequence of code words is a subversive sequence if it is capable of inducing uncorrectable read errors when read from an optical disc. We say that a sequence of input data symbols is a subversive sequence if the encoder will be forced to output a subversive sequence of code words when presented with that input sequence of data symbols.
It is well known that encoded sequence having large |DSV| can induce uncorrectable read errors. In this case we speak of subversive DSV (SDSV) sequences.
The Problem of Obtaining SDSV Sequences
SDSV sequences of input data symbols are extremely valuable for copy protection techniques based on subversive data, because they allow the creation of unreadable data on the disc by working exclusively at the user data 2 level rather than at the physical sector 4 level and hence prior to writing the user data on DLT tapes. The data levels when applying user data to an optical disc, for example, a DVD, are shown in
However, in multimodal codes such as ESM very few SDSV sequences of data symbols capable of tweaking intelligent encoders can be found. This makes an exhaustive approach, that is, considering all the possible sequences of data symbols and the |DSV| of their corresponding encoded sequences of code words, as output by an intelligent decoder, for finding SDSV sequences of data symbols quite unpractical.
An alternative approach might consist of starting from SDSV sequences of code words, and using a decoder to decode those sequences into sequences of data symbols. Although this could be a viable way for non-multimodal codes such as EFM modulation, in the case of multimodal codes the situation is more complex, as shown in
It follows that any exhaustive search for SDSV sequences in multimodal codes is computationally very expensive.
How to Obtain SDSV Sequences
It is required to find a method capable of determining forced subversive sequences, that is, sequences of data symbols capable of forcing an encoder to output subversive sequences of code words. In particular, it is required to generate SDSV patterns for ESM Modulation, that is, sequences {D0, . . . , Dr} of data symbols (plus an initial state) such that the corresponding encoded sequence {C0, . . . , Cr} of code words has “large” |DSV| and such that they can be repeated “effectively” from a DSV point of view as many times as required. More precisely, a sequence {D0, . . . , Dr} of data symbols with initial state S0 is a SDSV pattern if when repeated, say, t times
will force a given encoder to output the sequence of code words
whose |DSV| is
The method is described with particular reference to ESM. However, the method outlined can be used with multimodal RLL codes other than ESM.
Preferably, the method will provide a list of patterns of data symbols forcing large |DSV| that can result in SDSV when ESM modulated.
If the input data is subject to some sort of manipulation, such as scrambling, prior to ESM, then this manipulation will have to be taken into account when writing the SDSV sequences, so that these sequences will result in forced SDSV sequences after the manipulation.
A method for generating forced SDSV sequences and, in particular, SDSV patterns will now be described.
For each code word the following characteristics need to be considered as illustrated in
Given a code word C we will use the following notation:
By convention, we compute the DSV of a code word as shown in
Observe that the concepts above can also be applied to any sequence of bits and, therefore, in particular, to a sequence of code words. Hence, the notation above will apply also when considering a sequence of code words.
We say that two pairs (C, S) and (C′, S′) (or two sequences {(Cj, Sj)} and {(C′j, S′j)} of pairs) are equivalent if and only if
|DSV(C)| and |DSV(C′)| are “almost equal” if |DSV(C′)|=|DSV(C)|+L, where L is a (signed) integer. The smaller |L| is, the more restrictive the definition of “almost equal” is.
If (C, S) and (C′, S′) are equivalent we write
(C, S)˜(C′, S′);
if they are not, we write
−(C, S)˜(C′, S′).
Observe that a sequence {D0, . . . , Dr} of data symbols with a given initial state S0 is a SDSV pattern if the corresponding encoded sequence {C0, . . . , Cr} of code words satisfies the following conditions:
Let m0 be the maximum |DSV| value among all the ESM code words. We will consider the code words having.
|DSV|=m0−2i
for i=0, . . . , M where M is an integer 0<=M<=m0/2. The value of M depends on how strong the required SDSV sequences must be.
Observe that the DSV value of a sequence of bits of even length is always even.
In what follows we assume that, given the conversion tables, the encoding algorithm is as effective as possible with regard to the minimisation of |DSV|. Since this is not usually the case, it is possible to adapt the method described below to the particular encoding algorithm used, in order to exploit its weaknesses.
Overview of the Method
For i=0, . . . , M where 0<=M<=m0/2, let C0 be a code word such that
|DSV(C0)|=m0−2i.
Let D0 and S0 be respectively a data symbol and a state such that
C0=C(D0, S0).
The pair (D0, S0) is not necessarily uniquely determined. There might exist different pairs (D0, S0) and (D0′, S0′) such that C(D0, S0)=C(D0′, S0).
Step 1
Let (D−1,S−1) be such that S(D−1,S−1)=S0 and let C−1=C(D−1,S−1). If |DSV(C−1, C0)|is “small”, then we discard the pair (D−1,S−1) and we examine another suitable pair (D−1,S−1).
When we write that a code word C is such that C=C(D,S) without any further specification, we mean that C is the default encoded code word corresponding to (D,S), i.e. option A in
|DSV(C−1, C0)| is “small” if |DSV(C−1, C0)|<|DSV(C0)|+T, where T is a parameter such that 0<=T<=m0. Hence |DSV(C−1, C0)| is “large” if |DSV(C−1, C0)|>=|DSV(C0)|+T. Obviously the larger is T, the stronger the SDSV sequence will be, if any is found.
Let us assume that |DSV(C−1, C0)| is “large”. We have one of the following cases as shown in
1) D0 is in the range 0, . . . , 87;
2) D0 is in the range 88, . . . ,255 and S0 is equal either to State 1 or to State 4;
3) D0 is in the range 88, . . . ,255 and S0 is equal either to State 2 or to State 3.
In the first case, a pair (C0′, S1′) alternative to (C0, S1) will always exist. In the second case, an alternative pair (C0′, S1′) might exist. In the third case no alternative exists.
Let us consider the three cases which are set out in
Case (1)
Please refer to
Please refer to
We are in the situation shown in
Step 2
We are now in one of the three cases shown in
We have three possible subcases as indicated in
1. D−1 is in the range 0, . . . , 87;
2. D−1 is in the range 88, . . . ,255 and S−1 is equal either to State 1 or to State 4;
3. D−1 is in the range 88, . . . ,255 and S−1 is equal either to State 2 or to State 3.
Case (3.1)
For simplicity, if (C−1′, S0′)˜(C−1, S0), we discard (D−1, S−1) and find another suitable pair (D−1, S−1). Observe that, in fact, it is not necessary to have
(C−1′, S0′)˜(C−1, S0).
as it would suffice to check that
i. (C0″, S1″)˜(C0′″, S1′″) and
ii. {(C−1′, S0′), (C0″, S1″)}˜{(C−1, S0), (C0, S1)}
and discard (D−1,S−1) only if one of these conditions is not satisfied as shown in
We can now assume that we are in the situation shown in
Case (3.2)
For simplicity, if (C−1′, S0′)˜(C−1, S0), we discard (D−1, S−1) and find another suitable pair (D−1, S−1). In fact, if (C−1′, S0′) and (C−1, S0) are not equivalent, we could still find a suitable pair (C−2, S−1) such that the sequence {C−2, C−1′} violates the RLL rules as shown in
Hence we can assume to be in the situation shown in
Case (3.3)
Suppose now that from any of cases (3.1), (3.2) or (3.3) we have found a sequence {D−1, D0} with initial state S−1 as described in
If, on the contrary, no suitable sequence {D−1, D0} has been found, we will examine another code word C0 having the required |DSV| value and restart from Step 1. Once we have exhausted all the possibilities for that particular |DSV| value, we can increase by 1 the value for i.
We will be considering longer and longer sequences {C−n, . . . ,C−1, C0}. Clearly, when n reaches the maximum preferred length, we can output the corresponding SDSV sequence of data symbols {D−n, . . . , D−1, D0} (which will not be necessarily a SDSV pattern).
Suppose we are considering code words having |DSV|=4. Suppose that the code word
C0=1001001000000100,
which has DVS equal to −4, has been selected from the ESM Conversion Tables. From the Tables we can see that D0=98 and S0=State 3 are such that C0=C(D0, S0). We now consider all the pairs (D−1, S−1) such that S(D−1, S−1)=S0=State 3. Let us assume we have selected D−1=88, S−1=State 2 among these pairs. We have
C(D−1, S−1)=0001000100010000.
Now, DSV(C−1, C0)=+2. But then we discard the pair (D−1, S−1)=(88, State 2) because |DSV(C−1, C0)| is “small”, as
|DSV(C−1, C0)|=2<|DSV(C0)|=4.
Therefore we consider another pair (D−1, S−1) such that S(D−1, S−1)=State 3, say
(D−1, S−1)=(131, State 3).
In this case we have
C(D−1, S−1)=1001001000000100
and DSV(C−1, C0)=−8. Hence |DSV(C−1, C0)| is “large” enough as
|DSV(C−1, C0)|=8>=|DSV(C0)|+4.
Observe that D0 is in the range 88, . . . , 255 and S0=State 3 and that also D−1 is in the range 88, . . . , 255 and S−1=State 3.
a) Transitions(C−1, C0)=8;
c) |DSV(C−1, C0)| is large;
d) no alternative encoded sequences exist.
However, NextState(D−1, D0)=State 2, which is not equal to S−1=State 3. Therefore (D−1, D0) with initial state S−1 is not a SDSV pattern.
Hence now we look for a pair (D−2, S−2) such that S(D−2, S−2)=S−1=State 3. So let
(D−2, S−2)=(161, State 2).
We have C−2=C(D−2, S−2)=0100000000010000. Then DSV(C−2, C−1, C0)=−12 and hence |DSV(C−2, C−1, C0)| is “large” as
|DSV(C−2, C−1, C0)|=12>=|DSV(C−1, C0)|+4.
The sequence of data symbols {D−2, D−1, D0} with initial state S−2=State 2 is a SDSV pattern. Indeed, all the conditions for the definition of a SDSV pattern are satisfied as:
a) Transitions(C−2, C−1, C0)=10;
b) NextState(D−2, D−1, D0)=State 2=S−2;
c) |DSV(C−2, C−1, C0)| is large;
d) no alternative encoded sequences exist.
It follows that the pattern (D−2, D−1, D0) can be repeated “effectively” (from a |DSV| point of view) as many times as required, provided that the initial state is State 2. More precisely, the sequence of data symbols
{D−2, D−1, D0, D−2, D−1, D0, D−2, D−1, D0, D−2, . . . }
will force any ESM encoder to output a sequence of code words whose |DSV| is equal to 4*n when n is the length of the sequence.
SDSV Patterns
Once a number of SDSV patterns have been found, a table can be drawn listing the patterns and their characteristics, such as initial state, DSV value, as shown below.
Given these data in the table, it is possible to select suitable patterns and combine them together to form longer SDSV patterns. This is also useful to generate SDSV sequences as random-looking as possible. For example, in the table above, the first and third patterns have same initial state and, hence, the same next state, by definition of SDSV pattern. Therefore it is possible to construct the SDSV pattern {A0, A1, C0, C1, C2} having initial state S0 and DSV=20.
Number | Date | Country | Kind |
---|---|---|---|
0411163.9 | May 2004 | GB | national |
Number | Name | Date | Kind |
---|---|---|---|
4603413 | Sinjou et al. | Jul 1986 | A |
5659613 | Copeland et al. | Aug 1997 | A |
5696505 | Immink | Dec 1997 | A |
5699434 | Hogan | Dec 1997 | A |
5703858 | Mitchell et al. | Dec 1997 | A |
5748119 | Ko | May 1998 | A |
5787068 | Arps | Jul 1998 | A |
5828754 | Hogan | Oct 1998 | A |
5832088 | Nakajima et al. | Nov 1998 | A |
6011496 | Park et al. | Jan 2000 | A |
6028936 | Hillis | Feb 2000 | A |
6076165 | Maenza | Jun 2000 | A |
6278386 | Hogan | Aug 2001 | B1 |
6317397 | Deguchi et al. | Nov 2001 | B1 |
6353890 | Newman | Mar 2002 | B1 |
6421750 | Gunther et al. | Jul 2002 | B1 |
6665240 | Kobayashi et al. | Dec 2003 | B1 |
6694023 | Kim | Feb 2004 | B1 |
6782190 | Morito | Aug 2004 | B1 |
6839312 | Heylen et al. | Jan 2005 | B2 |
6966002 | Torrubia-Saez | Nov 2005 | B1 |
7030788 | Aida et al. | Apr 2006 | B2 |
7366071 | Kihara et al. | Apr 2008 | B2 |
20010011237 | Tanaka et al. | Aug 2001 | A1 |
20020076046 | Heylen | Jun 2002 | A1 |
20030184455 | Hayami | Oct 2003 | A1 |
20030227398 | Chen et al. | Dec 2003 | A1 |
20040037201 | Sako et al. | Feb 2004 | A1 |
20040062168 | Kobari et al. | Apr 2004 | A1 |
20040151105 | Aida et al. | Aug 2004 | A1 |
20050163315 | Jackson et al. | Jul 2005 | A1 |
20050193313 | Heylen et al. | Sep 2005 | A1 |
20050226412 | Selve et al. | Oct 2005 | A1 |
Number | Date | Country |
---|---|---|
0 347 934 | Dec 1989 | EP |
0 347 934 | Dec 1989 | EP |
0 347 934 | Dec 1989 | EP |
0 791 923 | Aug 1997 | EP |
0918326 | Oct 1997 | EP |
0 854 482 | Jul 1998 | EP |
0 854 482 | Jul 1998 | EP |
0 918 326 | May 1999 | EP |
1 011 103 | Jun 2000 | EP |
1 355 306 | Oct 2003 | EP |
1 396 857 | Mar 2004 | EP |
1 418 584 | May 2004 | EP |
1 494 235 | Jan 2005 | EP |
1 505 598 | Feb 2005 | EP |
1 521 262 | Apr 2005 | EP |
2 397 687 | Jul 2004 | GB |
2 369 718 | Aug 2004 | GB |
2 398 670 | Aug 2004 | GB |
2 398 671 | Aug 2004 | GB |
2002-175662 | Jun 2002 | JP |
2003303468 | Oct 2003 | JP |
WO 9801852 | Jan 1998 | WO |
WO 9802885 | Jan 1998 | WO |
WO 9854713 | Dec 1998 | WO |
WO 9857413 | Dec 1998 | WO |
WO 0074053 | Dec 2000 | WO |
WO 0211136 | Feb 2002 | WO |
WO 03085668 | Oct 2003 | WO |
WO 03088239 | Oct 2003 | WO |
WO 2004006253 | Jan 2004 | WO |
WO 2004066294 | Aug 2004 | WO |
WO 2004075185 | Sep 2004 | WO |
WO 2004075186 | Sep 2004 | WO |
WO 2005010695 | Feb 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20050270190 A1 | Dec 2005 | US |