Present invention refers to protection of data storage discs such as CD, DVD, Video CD, Photo CD, etc., containing subjects of copyright, from illegal copying. Present invention comprises a disc with security code, modified reading device and software.
A method called Safe Disc is known for this protection. It is based on verification of digital signature loaded on the disc in multilevel encrypted “coverage”, which protects the content of the CD-ROM. Digital signature is incorporated by laser while master or original disc is being produced, and usually cannot be copied by CD burner or compacting machine. When the original disc is inserted to the drive, the verifying software reads digital signature allowing next decoding of inserted program and its start. If a non-authorized CD without signature is inserted, the program does not start.
Another known method of data storage disc protection, described in U.S. Pat. No. 5,696,757, is based on specific characteristics of data records on disc, where shapes of pits are traced and evaluated. The protection is made by controlling of pits' position with respect to the track axis. Present ways of users' copy discs creation allow only making copies on which the shape of pits and their position relative to the track axis is only similar, in acceptable tolerance. The technology of industrial production of discs allows more accuracy in both shape and position of pits. So if reader with ability of recognizing the position of pits is used, it can easily find out whether the inserted disc is original or it is a copy made by users' means—burners. In the same time, for increasing of the security, some of the pits are duly written in the track axis and others are duly written off centered in the defined way. This method reliably recognizes industrially produced discs from copies made by users.
The purpose of present technical solution is to exclude the possibility of illegal copying of discs containing copyright material.
Said purpose is reached by data discs protection according to present technical solution, comprising a disc with security code, reading device and software. The subject-matter of this technical solution is as follows:
The security code field is set out in an annulus concentric to the disc centre, with diameters from 17 to 23 mm.
The software checks the presence of security code, and/or files the values of the code, and/or checks the mutual location of set item of the code and actually read item in data field, and/or controls mutual logical link between set item of the code and actually read item in data field according to a defined cryptography algorithm, and/or uses security code as a decoder to decode entries in data field according to a defined cryptography algorithm.
The data storage disc is equipped with a security code situated outside the disc centre, which completely fills and utilizes the whole inner part capacity for disc record in the area outside of the disc centre in front of the data area. This solution allows the protection from copying onto recordable media because of the lack of space for data entering in this space, where it is not possible to completely record the data because of the lack of data space. When utilizing solution according to present invention, where the data fully fill the area situated outside the disc centre in front of the data field dedicated to the security code record, then the security code cannot be copied onto recordable media.
The pressed (original) CDs, DVDs have different physical characteristics than the burned CDs, DVDs. Because of that it is possible to get such high record density, which cannot be applied by burning.
Thus, if the central area, where the code is situated, is fully equipped with data serving to the security of the data field, it is impossible to being copied.
The exact orientation of the coding field in the area situated outside the disc centre in front of the data field, and its mutual position to the data field is used to fortification of the security code. This can be set up only during the original production.
Technical solution is disclosed on drawings, where
Data storage disc on
Reading device on
Data in data field 1 are encrypted by security code 3, which is used as the key for cryptographic data coding. Actual data in data field 1 in this status are readable but don't make any sense without the key and thus are useless without the security code 3. When copy of this disc is made by present disc copy devices, only the copy of data field 1 is made. The copy then cannot be used.
Disc contains security code 3 with figures:
Data entry on the disc contains data in data field 1 with figures:
Required record, executable file or displayable picture, eventually a sound record is achieved by conversion according to algorithm. In this example, it is a simple algorithm of plain summation of values:
Contains record as it is written in data field 1 of the disc.
Contains repeated security code 3.
In this last line of the table there is the record decoded into the required usable format.
For example, installation disc of a hypothetic program “APPLICATION” is used, which is probably going to be used by the user just once, for the installation, and after that, he won't be asked to prove his right to use this program by repeated inserting of the disc into the reading device.
The procedure is going to be as follows:
The installation program ends with error message
The installation program runs the installation of “APPLICATION”
The installation program ends with error message and uninstalls just installed files of “APPLICATION”
The installation program continues with the installation of “APPLICATION”
Suitable example of using the protection of disc data storage according to present technical solution is its application in playing consoles. Disc data storage is equipped with security code 3 in the same way as in example nr. 1, with difference of the security code containing also TOC for data field 1. Data field 1 does not contain TOC.
Suitable example of using the protection of disc data storage according to present technical solution is the application in which the disc data storage is equipped with security code 3, which completely fills and utilizes the whole capacity of the inner area of the record on the disc in the security code area 4 situated outside the disc centre 2 in front of the data field 1
The protection of data storage disc from illegal copying according to present technical solution is utilizable namely in playing consoles.
Number | Date | Country | Kind |
---|---|---|---|
PUV 2005-16442 | Mar 2005 | CZ | national |
PV 2005-197 | Mar 2005 | CZ | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CZ2006/000015 | 3/30/2006 | WO | 00 | 10/30/2007 |