WO1998052114A1 - Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor - Google Patents

Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor Download PDF

Info

Publication number
WO1998052114A1
WO1998052114A1 PCT/US1998/008422 US9808422W WO9852114A1 WO 1998052114 A1 WO1998052114 A1 WO 1998052114A1 US 9808422 W US9808422 W US 9808422W WO 9852114 A1 WO9852114 A1 WO 9852114A1
Authority
WO
WIPO (PCT)
Prior art keywords
data storage
storage medium
segments
format information
storing
Prior art date
Application number
PCT/US1998/008422
Other languages
French (fr)
Inventor
Jon J. Blixt
Original Assignee
Imation Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Imation Corp. filed Critical Imation Corp.
Priority to AU73621/98A priority Critical patent/AU7362198A/en
Publication of WO1998052114A1 publication Critical patent/WO1998052114A1/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00615Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the logical format of the recording medium, e.g. the structure of sectors, blocks, or frames
    • G11B20/0063Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the logical format of the recording medium, e.g. the structure of sectors, blocks, or frames wherein the modification to the logical format mainly concerns management data, e.g., by changing the format of the TOC or the subcode
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier

Definitions

  • the present invention relates to data storage. More particularly, the present invention relates to preventing use of unauthorized copies of a data storage medium.
  • Optical media such as discs recorded in the Compact Disc-Read Only Memory (CD-ROM) format, have become a popular data storage medium for storing computer software. Their large storage capacity allows them to store programs that are too large to be stored practically on certain other types of removable media, such as magnetic media known as floppy disks.
  • CD-ROMs are capable of storing video clips and CD-quality audio clips.
  • Some of these techniques involve using certain codes that identify an optical medium as an original. These techniques can be defeated using an approach known as sequential copying, in which the data on an optical medium is read sequentially and copied to a writable optical medium. Using sequential copying, an optical recording device can make a copy of an optical medium that is indistinguishable from the original. In addition, many such techniques involve using circuitry to detect the codes. Optical recording devices that lack this detection circuitry can copy optical media despite the presence of the codes.
  • Some other copy protection techniques involve physically altering the original medium to render areas of the medium difficult to read and copy by an optical reading device.
  • An optical recording device can, however, copy the original medium by skipping over these areas. Because the original medium is physically altered, identifying the altered areas of the original medium is relatively easy. Furthermore, physical alterations can cause inconsistencies in playback from different optical reading device manufacturers. To prevent these inconsistencies, these techniques often use areas known as buffer zones to increase the error tolerance of the medium. These buffer zones use part of the user space on the medium and thus reduce the amount of space that can store other information.
  • the present invention is directed to a method for use in preventing use of unauthorized duplicates of an original data storage medium storing user information.
  • the method includes providing an original data storage medium having a plurality of first segments for storing the user information and a plurality of second segments for storing format information that is disregarded during a processing mode of a data storage medium reading device. Selected data is stored on at least one of the second segments.
  • the data storage medium reading device reads said at least one of the second segments and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the selected data.
  • Additional embodiments are directed to apparatuses for performing this method and to a method in which a computer-executable program is stored on the original data storage medium.
  • the other computer-executable program when executed, commands the data storage medium reading device to read said at least one of the second segments, and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the selected data.
  • Still another embodiment of the present invention is directed to a data recording apparatus for use in preventing use of unauthorized duplicates of a data storage medium storing user information.
  • the data storage apparatus comprises an encoding arrangement, coupled to receive a data stream and configured and arranged to encode the data stream as a modulated data stream.
  • the encoding arrangement is also configured and arranged to generate nonstandard format information.
  • a controller responsive to the encoding arrangement generates a control signal at least in part as a function of the modified format information and the modulated data stream.
  • the control signal controls a modulator that modulates a laser beam generated by an oscillator.
  • Another embodiment of the present invention is directed to a data storage medium that has a plurality of first segments storing user information and a plurality of second segments storing format information.
  • the format information is disregarded. At least a portion of the format information contains certain data if the data storage medium is an original data storage medium.
  • the data storage medium stores a computer-executable program.
  • the computer-executable program when executed, commands the data storage medium reading device to read at least one of the second segments, and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the certain data.
  • an authentication method comprises commanding a data storage medium reading device to read a portion of a data storage medium.
  • the portion contains nonstandard format information if the data storage medium is an original data storage medium.
  • the method also includes determining whether to allow or prevent use of user information stored on the data storage medium as a function of whether the format information is nonstandard.
  • FIG. 1 is a plan view of an optical data storage medium, according to the present invention, illustrating logical structures for storing data
  • FIG. 2A is a diagram conceptually illustrating an example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 2B is a diagram conceptually illustrating another example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 3 is a block diagram of an optical recording device for recording data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 4 is a flow chart of a method for preventing unauthorized duplication of an optical data storage medium, according to the present invention.
  • FIG. 5 is a flow chart of a method for authenticating an optical data storage medium, according to the present invention.
  • the present invention is believed to be applicable to a variety of systems and arrangements that prevent the use of unauthorized copies of optical storage media.
  • the invention has been found to be particularly advantageous in application environments in which a CD-ROM or other optical medium stores user information, such as a computer-executable program for use by a personal computer (PC) or other computer arrangement.
  • PC personal computer
  • An appreciation of various aspects of the invention is best gained through a discussion of various application examples operating in such an environment. While the examples are discussed in the context of the CD-ROM format, it should be understood that the techniques described can be adapted readily to a variety of optical storage formats. Examples of such formats include, but are not limited to, the Digital Video Disc - Read Only Memory (DVD-ROM) , CD-Erasable (CD-E) , and CD-Recordable (CD-R) formats.
  • DVD-ROM Digital Video Disc - Read Only Memory
  • CD-E CD-Erasable
  • CD-R CD-Recordable
  • FIG. 1 illustrates a CD-ROM 100 that includes a reflective substrate on which information is stored as pits in the substrate and lands between the pits.
  • the pattern of pits and lands represents the information stored on the CD-ROM 100. Any of a variety of techniques, including, for example, conventional photoresist techniques, can be used to create the pits.
  • the CD-ROM 100 includes a center aperture 102 to facilitate placement of the CD-ROM 100 in an optical reading device, such as a CD-ROM drive.
  • the CD-ROM 100 physically consists of a single spiral track from the inner perimeter of the CD- ROM 100 to an outer perimeter of the CD-ROM 100. While the spiral track is typically considered a single logical segment, the spiral track can be further divided into a plurality of logical segments 104, which are exaggerated on FIG. 1 for illustration purposes. The logical segments 104 are further divided into sectors 106. The sectors 106 are also exaggerated on FIG. 1 for illustration purposes.
  • FIGS. 2A and 2B illustrate two example sector formats, according to the CD-ROM standard.
  • FIG. 2A illustrates a sector format known as Mode 1.
  • a Mode 1 sector includes twelve bytes comprising a synchronization section 202.
  • a header section 204 consists of four bytes.
  • the header section 204 is followed by a user data section 206 that stores user information, such as program data, image data, or audio data.
  • the user data section 206 is 2048 bytes long in a Mode 1 sector.
  • a four-byte error detection code (EDC) 208 and an eight-byte reserved section 210 follow the user data section 206.
  • the reserved section 210 is typically blank.
  • a 276-byte error correction code 212 follows the reserved section 210 and provides enhanced error correction.
  • EDC error detection code
  • An error detection/error correction (ED/EC) section 214 follows the error correction code 212 and provides basic error detection and correction functions. Those skilled in the art will appreciate that the above-described sections are typically physically interleaved to improve error tolerance.
  • each 2352-byte sector is divided into ninety-eight interleaved 24-byte frames. Each frame is followed by one byte of subcode.
  • the subcode bytes when combined, comprise a 98-byte subcode section 216 that contains formatting information.
  • the formatting information includes time index and audio track, e . g . , song information.
  • FIG. 2B illustrates a CD-ROM sector format known as Mode 2.
  • the Mode 2 format is similar to the Mode 1 format. In the Mode 2 format, however, the EDC section 208, the reserved section 210, and the ECC section 212 are absent. The space conserved by omitting these sections stores additional user data. Accordingly, the user data section 206 is 2336 bytes long in the Mode 2 format.
  • a manufacturer alters at least some of the subcode areas on the CD- ROM. Because the subcode areas do not store user information and are not normally read by the CD-ROM drive, the alterations to the subcode areas do not affect program data or other user information. A purchaser of an original CD-ROM can thus use software stored on the CD-ROM normally. Because CD-ROM drives do not normally read the subcode areas, however, the altered subcode is not copied during normal copying operations. Copies of an original CD-ROM made by typical optical recording devices therefore do not contain the modified subcode.
  • the CD-ROM stores an authentication program that, when executed, commands the CD-ROM drive to read the subcode areas.
  • the authentication program allows use of the user information stored on the CD-ROM only if the subcode areas are properly altered, indicating that the CD-ROM is an original. Authenticating the CD- ROM as an original using an authentication program allows any CD-ROM drive to authenticate the CD-ROM, regardless of whether the CD-ROM drive has detection circuitry configured to detect the modified subcode.
  • the subcode alterations do not alter the user data and are not normally read by a CD-ROM drive, detecting the copy protection is difficult.
  • a user can copy the original CD-ROM easily, but cannot execute a program stored on a copy of the CD-ROM. No record of the subcode alterations exists, rendering detection of the alteration difficult, unless an end user inspects a large number of data blocks, e.g., over 300,000, by analyzing certain CD-ROM information that is not normally provided to the end user.
  • the particular subcode areas that are altered can be randomly varied between individual CD-ROMs. In this manner, a CD-ROM manufacturer can discourage even facilities that have equipment that are capable of producing usable copies of originals protected according to the present invention from producing unauthorized copies of multiple CD-ROMs. Even if such a facility can defeat the copy protection for a particular CD-ROM, defeating the copy-protection for another CD-ROM involves thorough analysis of the CD-
  • FIG. 3 is a block diagram of an optical recording device, according to the present invention, used in producing a copy-protected CD-ROM.
  • a digital data stream 300 such as program information for a computer application, is provided to an encoder 302.
  • an encoder 302. For example, one type of encoder commonly used in recording data on CD-ROMs is known as an 8-to-14 modulation (EFM) encoder.
  • EFM 8-to-14 modulation
  • Encoders of this type encode data streams having eight-bit bytes, which are commonly used to store data on magnetic media, to a data stream having fourteen-bit bytes.
  • Optical storage media typically use fourteen-bit bytes to allow encoding of two consecutive ones using pits and lands.
  • an interface card converts the fourteen-bit code back to the eight-bit code used by the computer.
  • a subcode generator 304 provides subcode to a computer arrangement 306, including, for example, a CPU.
  • the computer arrangement 306 is implemented using, for example, a conventional personal computer (PC) or a group of computers.
  • the subcode generator 304 can be implemented using a distinct component, as illustrated, or integrated as part of the computer arrangement 306.
  • the subcode generator 304 and the encoder 302 can be implemented using a single card installed on a computer.
  • the subcode is generated in a form inconsistent with typical formats, e.g., containing unexpected data.
  • the computer arrangement 306 interleaves the modified subcode and the encoded data stream and generates a recording signal.
  • a modulator controller 308 receives the recording signal and generates a control signal used for controlling a modulator 310.
  • the modulator 310 modulates the intensity of a continuous-intensity laser beam generated by an oscillator 312. Accordingly, the modulator 310 produces a laser beam having a modulation that varies as a function of the recording signal.
  • An objective lens 314 focuses the modulated laser beam on a location of a CD-ROM or a master used for producing CD-ROMs.
  • FIG. 4 is a flow chart illustrating an example method for preventing use of unauthorized copies of an original CD-ROM, according to the present invention.
  • an encoder reads source data, such as software code.
  • the encoder provides the source data and other encoded information to a computer arrangement.
  • the computer arrangement generates subcode, as depicted at a block 402. At least part of the subcode is nonstandard.
  • the source data and subcode are interleaved and written to a CD- ROM, as respectively depicted at blocks 403 and 404.
  • an authentication program is stored.
  • the authentication program allows use of user information, such as software, stored on the CD-ROM only if the modified subcode areas are present on the CD-ROM. Absence of the modified subcode areas indicates that the CD-ROM is an unauthorized copy.
  • the authentication program prevents use of the user information stored on the CD-ROM if the modified subcode areas are absent.
  • the authentication program can be incorporated into another application program stored on the CD-ROM.
  • the authentication program can also be interleaved with the source data and subcode instead of being written to the CD-ROM in a separate process.
  • FIG. 5 is a flow chart illustrating an example of the operation of the authentication program.
  • the authentication program commands the CD-ROM drive to read the subcode areas of the CD-ROM.
  • the authentication program determines whether the subcode areas are properly altered, as depicted at a block 502. If the subcode areas are altered properly, the authentication program permits use of user information stored on the CD-ROM, as depicted at a block 504. On the other hand, if the subcode areas are not properly altered, the authentication program prevents the user from using the user information, as depicted at a block 506. Because it is difficult to determine why the copy of the CD-ROM does not work or the portions of the CD-ROM that were not copied, circumventing this copy protection scheme is difficult.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)
  • Storage Device Security (AREA)

Abstract

A copy-protection method includes modifying portions of the subcode (216) on a disc (100). The modified subcode is normally disregarded when reading the disc and is not copied during typical copying operations. When a user wishes to execute a program stored on the disc using a computer, the computer determines (502) whether the subcode is modified. If the subcode contains certain data, the user is permitted (504) to execute the program. Otherwise, the user is prevented (506) from executing the program.

Description

ARRANGEMENT FOR PREVENTING USE OF UNAUTHORIZED
DUPLICATES OF A DATA STORAGE MEDIUM USING
SUBCODE AND METHOD THEREFOR
Field of the invention
The present invention relates to data storage. More particularly, the present invention relates to preventing use of unauthorized copies of a data storage medium.
Background of the Invention
Optical media, such as discs recorded in the Compact Disc-Read Only Memory (CD-ROM) format, have become a popular data storage medium for storing computer software. Their large storage capacity allows them to store programs that are too large to be stored practically on certain other types of removable media, such as magnetic media known as floppy disks. For example, CD-ROMs are capable of storing video clips and CD-quality audio clips.
The proliferation of optical recording devices and writable optical media in the consumer market has facilitated storage of data on CD-ROMs. Decreasing prices of both optical recording devices and writable optical media have given an increasing number of consumers access to this technology. As a result, unauthorized duplication of CD-ROMs is a significant concern in the software industry.
Several techniques have been proposed to prevent unauthorized duplication of optical media.
Some of these techniques involve using certain codes that identify an optical medium as an original. These techniques can be defeated using an approach known as sequential copying, in which the data on an optical medium is read sequentially and copied to a writable optical medium. Using sequential copying, an optical recording device can make a copy of an optical medium that is indistinguishable from the original. In addition, many such techniques involve using circuitry to detect the codes. Optical recording devices that lack this detection circuitry can copy optical media despite the presence of the codes.
Some other copy protection techniques involve physically altering the original medium to render areas of the medium difficult to read and copy by an optical reading device. An optical recording device can, however, copy the original medium by skipping over these areas. Because the original medium is physically altered, identifying the altered areas of the original medium is relatively easy. Furthermore, physical alterations can cause inconsistencies in playback from different optical reading device manufacturers. To prevent these inconsistencies, these techniques often use areas known as buffer zones to increase the error tolerance of the medium. These buffer zones use part of the user space on the medium and thus reduce the amount of space that can store other information.
Summary of the Invention
According to one embodiment, the present invention is directed to a method for use in preventing use of unauthorized duplicates of an original data storage medium storing user information. The method includes providing an original data storage medium having a plurality of first segments for storing the user information and a plurality of second segments for storing format information that is disregarded during a processing mode of a data storage medium reading device. Selected data is stored on at least one of the second segments. The data storage medium reading device reads said at least one of the second segments and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the selected data. Additional embodiments are directed to apparatuses for performing this method and to a method in which a computer-executable program is stored on the original data storage medium. The other computer-executable program, when executed, commands the data storage medium reading device to read said at least one of the second segments, and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the selected data.
Still another embodiment of the present invention is directed to a data recording apparatus for use in preventing use of unauthorized duplicates of a data storage medium storing user information. The data storage apparatus comprises an encoding arrangement, coupled to receive a data stream and configured and arranged to encode the data stream as a modulated data stream. The encoding arrangement is also configured and arranged to generate nonstandard format information. A controller responsive to the encoding arrangement generates a control signal at least in part as a function of the modified format information and the modulated data stream. The control signal controls a modulator that modulates a laser beam generated by an oscillator.
Another embodiment of the present invention is directed to a data storage medium that has a plurality of first segments storing user information and a plurality of second segments storing format information. During a processing mode of a data storage medium reading device, the format information is disregarded. At least a portion of the format information contains certain data if the data storage medium is an original data storage medium. The data storage medium stores a computer-executable program. The computer-executable program, when executed, commands the data storage medium reading device to read at least one of the second segments, and determines whether to allow or prevent use of the user information as a function of whether said at least one of the second segments contains the certain data. According to another aspect of the present invention, an authentication method comprises commanding a data storage medium reading device to read a portion of a data storage medium. The portion contains nonstandard format information if the data storage medium is an original data storage medium. The method also includes determining whether to allow or prevent use of user information stored on the data storage medium as a function of whether the format information is nonstandard. The above summary of the invention is not intended to describe each disclosed embodiment of the present invention. This is the purpose of the figures and of the detailed description that follows.
Brief Description of the Drawings
Other aspects and advantages of the present invention will become apparent upon reading the following detailed description and upon reference to the drawings in which: FIG. 1 is a plan view of an optical data storage medium, according to the present invention, illustrating logical structures for storing data;
FIG. 2A is a diagram conceptually illustrating an example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention;
FIG. 2B is a diagram conceptually illustrating another example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention;
FIG. 3 is a block diagram of an optical recording device for recording data on the optical data storage medium of FIG. 1, according to the present invention;
FIG. 4 is a flow chart of a method for preventing unauthorized duplication of an optical data storage medium, according to the present invention; and
FIG. 5 is a flow chart of a method for authenticating an optical data storage medium, according to the present invention.
Detailed Description of the Various rcmhodintents
The present invention is believed to be applicable to a variety of systems and arrangements that prevent the use of unauthorized copies of optical storage media. The invention has been found to be particularly advantageous in application environments in which a CD-ROM or other optical medium stores user information, such as a computer-executable program for use by a personal computer (PC) or other computer arrangement. An appreciation of various aspects of the invention is best gained through a discussion of various application examples operating in such an environment. While the examples are discussed in the context of the CD-ROM format, it should be understood that the techniques described can be adapted readily to a variety of optical storage formats. Examples of such formats include, but are not limited to, the Digital Video Disc - Read Only Memory (DVD-ROM) , CD-Erasable (CD-E) , and CD-Recordable (CD-R) formats.
FIG. 1 illustrates a CD-ROM 100 that includes a reflective substrate on which information is stored as pits in the substrate and lands between the pits. The pattern of pits and lands represents the information stored on the CD-ROM 100. Any of a variety of techniques, including, for example, conventional photoresist techniques, can be used to create the pits. The CD-ROM 100 includes a center aperture 102 to facilitate placement of the CD-ROM 100 in an optical reading device, such as a CD-ROM drive.
The CD-ROM 100 physically consists of a single spiral track from the inner perimeter of the CD- ROM 100 to an outer perimeter of the CD-ROM 100. While the spiral track is typically considered a single logical segment, the spiral track can be further divided into a plurality of logical segments 104, which are exaggerated on FIG. 1 for illustration purposes. The logical segments 104 are further divided into sectors 106. The sectors 106 are also exaggerated on FIG. 1 for illustration purposes.
FIGS. 2A and 2B illustrate two example sector formats, according to the CD-ROM standard. FIG. 2A illustrates a sector format known as Mode 1. A Mode 1 sector includes twelve bytes comprising a synchronization section 202. A header section 204 consists of four bytes. The header section 204 is followed by a user data section 206 that stores user information, such as program data, image data, or audio data. The user data section 206 is 2048 bytes long in a Mode 1 sector. A four-byte error detection code (EDC) 208 and an eight-byte reserved section 210 follow the user data section 206. The reserved section 210 is typically blank. A 276-byte error correction code 212 follows the reserved section 210 and provides enhanced error correction. An error detection/error correction (ED/EC) section 214 follows the error correction code 212 and provides basic error detection and correction functions. Those skilled in the art will appreciate that the above-described sections are typically physically interleaved to improve error tolerance. In the CD-ROM format, each 2352-byte sector is divided into ninety-eight interleaved 24-byte frames. Each frame is followed by one byte of subcode. The subcode bytes, when combined, comprise a 98-byte subcode section 216 that contains formatting information. In the audio CD format, the formatting information includes time index and audio track, e . g . , song information.
In the CD-ROM format, an optical reading device addresses sectors of the CD-ROM using an index known as absolute time or ATIME. Absolute time identifies time indexes from the beginning of the disc, using an internal clock of the optical reading device. Because optical reading devices compliant with the CD- ROM standard use absolute time to address sectors of the CD-ROM, the formatting information stored in the subcode section 216 is not used during normal read operations of the optical reading device or CD-ROM drive. FIG. 2B illustrates a CD-ROM sector format known as Mode 2. The Mode 2 format is similar to the Mode 1 format. In the Mode 2 format, however, the EDC section 208, the reserved section 210, and the ECC section 212 are absent. The space conserved by omitting these sections stores additional user data. Accordingly, the user data section 206 is 2336 bytes long in the Mode 2 format.
To prevent the use of user information, such as software, on an unauthorized copy of an original CD- ROM, according to the present invention, a manufacturer alters at least some of the subcode areas on the CD- ROM. Because the subcode areas do not store user information and are not normally read by the CD-ROM drive, the alterations to the subcode areas do not affect program data or other user information. A purchaser of an original CD-ROM can thus use software stored on the CD-ROM normally. Because CD-ROM drives do not normally read the subcode areas, however, the altered subcode is not copied during normal copying operations. Copies of an original CD-ROM made by typical optical recording devices therefore do not contain the modified subcode. The CD-ROM stores an authentication program that, when executed, commands the CD-ROM drive to read the subcode areas. The authentication program allows use of the user information stored on the CD-ROM only if the subcode areas are properly altered, indicating that the CD-ROM is an original. Authenticating the CD- ROM as an original using an authentication program allows any CD-ROM drive to authenticate the CD-ROM, regardless of whether the CD-ROM drive has detection circuitry configured to detect the modified subcode.
Because the subcode alterations do not alter the user data and are not normally read by a CD-ROM drive, detecting the copy protection is difficult. A user can copy the original CD-ROM easily, but cannot execute a program stored on a copy of the CD-ROM. No record of the subcode alterations exists, rendering detection of the alteration difficult, unless an end user inspects a large number of data blocks, e.g., over 300,000, by analyzing certain CD-ROM information that is not normally provided to the end user. Furthermore, the particular subcode areas that are altered can be randomly varied between individual CD-ROMs. In this manner, a CD-ROM manufacturer can discourage even facilities that have equipment that are capable of producing usable copies of originals protected according to the present invention from producing unauthorized copies of multiple CD-ROMs. Even if such a facility can defeat the copy protection for a particular CD-ROM, defeating the copy-protection for another CD-ROM involves thorough analysis of the CD-
ROM.
FIG. 3 is a block diagram of an optical recording device, according to the present invention, used in producing a copy-protected CD-ROM. A digital data stream 300, such as program information for a computer application, is provided to an encoder 302. For example, one type of encoder commonly used in recording data on CD-ROMs is known as an 8-to-14 modulation (EFM) encoder. Encoders of this type encode data streams having eight-bit bytes, which are commonly used to store data on magnetic media, to a data stream having fourteen-bit bytes. Optical storage media typically use fourteen-bit bytes to allow encoding of two consecutive ones using pits and lands. During read operations of a CD-ROM drive, an interface card converts the fourteen-bit code back to the eight-bit code used by the computer.
A subcode generator 304 provides subcode to a computer arrangement 306, including, for example, a CPU. The computer arrangement 306 is implemented using, for example, a conventional personal computer (PC) or a group of computers. The subcode generator 304 can be implemented using a distinct component, as illustrated, or integrated as part of the computer arrangement 306. For example, the subcode generator 304 and the encoder 302 can be implemented using a single card installed on a computer. The subcode is generated in a form inconsistent with typical formats, e.g., containing unexpected data. The computer arrangement 306 interleaves the modified subcode and the encoded data stream and generates a recording signal.
A modulator controller 308 receives the recording signal and generates a control signal used for controlling a modulator 310. The modulator 310 modulates the intensity of a continuous-intensity laser beam generated by an oscillator 312. Accordingly, the modulator 310 produces a laser beam having a modulation that varies as a function of the recording signal. An objective lens 314 focuses the modulated laser beam on a location of a CD-ROM or a master used for producing CD-ROMs.
FIG. 4 is a flow chart illustrating an example method for preventing use of unauthorized copies of an original CD-ROM, according to the present invention. As depicted at a block 400, an encoder reads source data, such as software code. The encoder provides the source data and other encoded information to a computer arrangement. The computer arrangement generates subcode, as depicted at a block 402. At least part of the subcode is nonstandard. The source data and subcode are interleaved and written to a CD- ROM, as respectively depicted at blocks 403 and 404. At a block 406, an authentication program is stored. The authentication program allows use of user information, such as software, stored on the CD-ROM only if the modified subcode areas are present on the CD-ROM. Absence of the modified subcode areas indicates that the CD-ROM is an unauthorized copy.
Accordingly, the authentication program prevents use of the user information stored on the CD-ROM if the modified subcode areas are absent. Alternatively, the authentication program can be incorporated into another application program stored on the CD-ROM. The authentication program can also be interleaved with the source data and subcode instead of being written to the CD-ROM in a separate process.
FIG. 5 is a flow chart illustrating an example of the operation of the authentication program. At a block 500, the authentication program commands the CD-ROM drive to read the subcode areas of the CD-ROM. The authentication program then determines whether the subcode areas are properly altered, as depicted at a block 502. If the subcode areas are altered properly, the authentication program permits use of user information stored on the CD-ROM, as depicted at a block 504. On the other hand, if the subcode areas are not properly altered, the authentication program prevents the user from using the user information, as depicted at a block 506. Because it is difficult to determine why the copy of the CD-ROM does not work or the portions of the CD-ROM that were not copied, circumventing this copy protection scheme is difficult.

Claims

What is claimed is;
1. For use in preventing use of unauthorized duplicates of an original data storage medium (100) storing user information, a copy-protection method comprising: providing an original data storage medium having a plurality of first segments (206) for storing the user information and a plurality of second segments (216) for storing format information that is disregarded during a processing mode of a data storage medium reading device; storing (404) selected data on at least one of the second segments; commanding (500) the data storage medium reading device to read said at least one of the second segments; and determining (502) whether to allow (504) or prevent (506) use of the user information as a function of whether said at least one of the second segments contains the selected data.
2. The method of claim 1, further comprising storing the user information and the format information in one of the following formats: CD-ROM, DVD-ROM, CD-E, and CD-R.
3. The method of claim 1, wherein the second segments contain subcode.
4. The method of claim 1, further comprising creating a master for providing the original data storage medium.
5. The method of claim 1, further comprising randomly selecting said at least one of the second segments for storing the selected data.
6. For use in preventing use of unauthorized duplicates of a data storage medium (100) storing user information, a data storage apparatus comprising: an encoding arrangement (302) coupled to receive a data stream (300) and configured and arranged to: encode the data stream as a modulated data stream, and generate nonstandard format information; an oscillator (312) configured and arranged to generate a laser beam; a modulator (310) responsive to a control signal and configured and arranged to modulate the laser beam; and a controller (308) responsive to the encoding arrangement and configured and arranged to generate the control signal at least in part as a function of the nonstandard format information and the modulated data stream.
7. The apparatus of claim 6, wherein the format information comprises subcode.
8. The apparatus of claim 6, wherein the encoding arrangement is further configured and arranged to generate a second data stream as a function of the received data stream and the nonstandard format information.
9. The apparatus of claim 6, wherein a microprocessor (306) is further configured and arranged to command the modulator to modulate the laser beam for storing an authentication program (406) on the data storage medium, and wherein the authentication program is configured and arranged to, when executed, command (500) a data storage medium reading device to read a portion of the data storage medium, and determine (502) whether to allow (504) or prevent (506) use of the user information as a function of whether the format information is modified.
10. The apparatus of claim 6, further comprising a lens (314) , configured and arranged to focus the laser beam on a portion of the data storage medium.
11. For use in preventing use of unauthorized duplicates of an original data storage medium (100) storing user information, an authentication method comprising: commanding (500) a data storage medium reading device to read a portion of the data storage medium, the portion containing nonstandard format information (216) if the data storage medium is the original data storage medium; and determining (502) whether to allow (504) or prevent (506) use of the user information as a function of whether the format information is nonstandard.
12. The method of claim 11, wherein the format information comprises subcode.
13. An optical data storage disc (100), comprising: a plurality of first segments (206) for storing user information; a plurality of second segments (216) for storing format information that is disregarded during a processing mode of an optical data storage disc reading device, at least a portion of the format information containing certain data if the data storage disc is an original data storage disc; and a computer-executable program (406) , configured and arranged to, when executed, command (500) the data storage disc reading device to read at least one of the second segments, and determine (502) whether to allow (504) or prevent (506) use of the user information as a function of whether the format information contains the certain data.
14. The disc of claim 13, wherein the format information comprises subcode, and wherein the computer-executable program comprises a portion of the user information.
PCT/US1998/008422 1997-05-16 1998-05-06 Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor WO1998052114A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU73621/98A AU7362198A (en) 1997-05-16 1998-05-06 Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US85723597A 1997-05-16 1997-05-16
US08/857,235 1997-05-16

Publications (1)

Publication Number Publication Date
WO1998052114A1 true WO1998052114A1 (en) 1998-11-19

Family

ID=25325528

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/008422 WO1998052114A1 (en) 1997-05-16 1998-05-06 Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor

Country Status (2)

Country Link
AU (1) AU7362198A (en)
WO (1) WO1998052114A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000059165A1 (en) * 1999-03-31 2000-10-05 Atabok Inc. A method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network
WO2000068945A1 (en) * 1999-05-11 2000-11-16 Macrovision Corporation Secure compact disk and player
WO2001061695A1 (en) * 2000-02-15 2001-08-23 Macrovision Corporation The copy protection of digital audio compact discs
WO2001061696A1 (en) * 2000-02-15 2001-08-23 Macrovision Corporation The copy protection of digital audio compact discs
WO2003019552A1 (en) * 2001-08-22 2003-03-06 Brainshield Technologies, Inc. Copy protection device
EP1297651A2 (en) * 2000-04-14 2003-04-02 Midbar Tech Ltd. Prevention of cd-audio piracy using sub-code channels
EP1304693A2 (en) * 2001-10-16 2003-04-23 Sonopress Ibermemory S.A,. CD-audio recording procedure to prevent coping thereof
EP1353332A1 (en) * 2002-04-12 2003-10-15 Hudson Soft Co., Ltd. Apparatus and method for preparing modified data to prevent unauthorized reading/execution of original data
US6842522B1 (en) 2000-06-01 2005-01-11 Macrovision Corporation Secure digital video disk and player
GB2421350A (en) * 2004-12-20 2006-06-21 Macrovision Europ Ltd Copy protection for optical discs
US7356142B1 (en) 2000-05-10 2008-04-08 Macrovision Corporation Secure compact disk and player
KR100898131B1 (en) * 2001-10-31 2009-05-19 소니 가부시끼 가이샤 Data recording method, recorder, and data reproducing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60215232A (en) * 1984-04-11 1985-10-28 Nec Corp System for preventing wrong use of information
JPH05266575A (en) * 1992-03-18 1993-10-15 Fujitsu Ltd Copy preventing method of optical disk, optical disk and optical disk device
WO1995003655A1 (en) * 1993-07-26 1995-02-02 Oakleigh Systems, Inc. Cd prom encryption system
JPH08153331A (en) * 1994-09-29 1996-06-11 Applics:Kk Method and device for discriminating copied cd-rom

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS60215232A (en) * 1984-04-11 1985-10-28 Nec Corp System for preventing wrong use of information
JPH05266575A (en) * 1992-03-18 1993-10-15 Fujitsu Ltd Copy preventing method of optical disk, optical disk and optical disk device
WO1995003655A1 (en) * 1993-07-26 1995-02-02 Oakleigh Systems, Inc. Cd prom encryption system
JPH08153331A (en) * 1994-09-29 1996-06-11 Applics:Kk Method and device for discriminating copied cd-rom

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN vol. 010, no. 076 (P - 440) 26 March 1986 (1986-03-26) *
PATENT ABSTRACTS OF JAPAN vol. 018, no. 045 (P - 1681) 24 January 1994 (1994-01-24) *
PATENT ABSTRACTS OF JAPAN vol. 096, no. 010 31 October 1996 (1996-10-31) *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6591367B1 (en) 1999-03-31 2003-07-08 Atabok Japan, Inc. Method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network
WO2000059165A1 (en) * 1999-03-31 2000-10-05 Atabok Inc. A method and apparatus for preventing unauthorized copying and distributing of electronic messages transmitted over a network
WO2000068945A1 (en) * 1999-05-11 2000-11-16 Macrovision Corporation Secure compact disk and player
WO2001061696A1 (en) * 2000-02-15 2001-08-23 Macrovision Corporation The copy protection of digital audio compact discs
GB2365202A (en) * 2000-02-15 2002-02-13 Macrovision Corp The copy protection of digital audio compact discs
GB2366444A (en) * 2000-02-15 2002-03-06 Macrovision Corp The copy protection of digital audio compact discs
US6839312B2 (en) 2000-02-15 2005-01-04 Macrovision Corporation Copy protection of digital audio compact discs
WO2001061695A1 (en) * 2000-02-15 2001-08-23 Macrovision Corporation The copy protection of digital audio compact discs
GB2365202B (en) * 2000-02-15 2004-02-04 Macrovision Corp The copy protection of digital audio compact discs
GB2366444B (en) * 2000-02-15 2004-02-04 Macrovision Corp The copy protection of digital audio compact discs
AU778271B2 (en) * 2000-02-15 2004-11-25 Rovi Solutions Corporation The copy protection of digital audio compact discs
EP1297651A2 (en) * 2000-04-14 2003-04-02 Midbar Tech Ltd. Prevention of cd-audio piracy using sub-code channels
EP1297651A4 (en) * 2000-04-14 2006-04-12 Macrovision Europ Ltd Prevention of cd-audio piracy using sub-code channels
US7356142B1 (en) 2000-05-10 2008-04-08 Macrovision Corporation Secure compact disk and player
US6842522B1 (en) 2000-06-01 2005-01-11 Macrovision Corporation Secure digital video disk and player
US7310764B2 (en) 2000-06-01 2007-12-18 Macrovision Corporation Digital video disk and player and associated methods with proprietary format
WO2003019552A1 (en) * 2001-08-22 2003-03-06 Brainshield Technologies, Inc. Copy protection device
EP1304693A2 (en) * 2001-10-16 2003-04-23 Sonopress Ibermemory S.A,. CD-audio recording procedure to prevent coping thereof
EP1304693A3 (en) * 2001-10-16 2007-03-21 Sonopress Ibermemory S.A,. CD-audio recording procedure to prevent coping thereof
KR100898131B1 (en) * 2001-10-31 2009-05-19 소니 가부시끼 가이샤 Data recording method, recorder, and data reproducing method and device
EP1353332A1 (en) * 2002-04-12 2003-10-15 Hudson Soft Co., Ltd. Apparatus and method for preparing modified data to prevent unauthorized reading/execution of original data
GB2421350A (en) * 2004-12-20 2006-06-21 Macrovision Europ Ltd Copy protection for optical discs
GB2421350B (en) * 2004-12-20 2007-05-02 Macrovision Europ Ltd Copy protection for optical discs

Also Published As

Publication number Publication date
AU7362198A (en) 1998-12-08

Similar Documents

Publication Publication Date Title
KR100489912B1 (en) Information carriers, reading devices and methods of making the information carriers containing auxiliary information
RU2249861C2 (en) Copy protection of compact disks with digital audio record
JP3888473B2 (en) Copy protection method for record carrier, copy protected record carrier and method for detecting access control information
EP1046163B1 (en) System for copy protection of recorded information
US6122739A (en) Digital compact disc player security system reproducing method and apparatus
US6646967B1 (en) Method for making copy protected optical discs
WO1998052194A1 (en) Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information
JP2005505884A (en) Optical disc copy protection or related improvements
JP2006520036A (en) Method and system for preventing unauthorized copying and unauthorized use of digital content recorded on optical media and other media
WO1998052114A1 (en) Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor
EP1199714B1 (en) Information recording medium adaptive to copy protection and recording/reproducing apparatus
RU2322707C2 (en) Method for controlling copy protection information on a record carrier, record carrier with information for copy protection of content recorded on it and reproduction method for data carrier
US20070297759A1 (en) Copy Protection For Audio, Video, and/or A/V Navigation Data
EP2120236B1 (en) Optical media with control data in wobble
KR100551103B1 (en) Information recording medium, information recording medium authenticity checking method, information recording medium authenticity checking program, information recording medium sector reading method, and information recording medium sector reading program
JPH1145509A (en) Disk, its discriminating method and device, and its reproducing device
KR100608268B1 (en) Method and apparatus for protecting copyright of digital recording medium, and copyright protected digital recording medium
JPH10326463A (en) Disk, discriminating method therefor, discriminating device therefor, and reproducing device therefor
JPH10326462A (en) Disk, discriminating method therefor, discriminating device therefor, and reproducing device therefor
JP2002175663A (en) Copyright protecting and recording method for optical disk
JP2000331419A (en) Recording medium which prevents the use of unlawfully duplicated program or data on computer
JP2002190157A (en) Recording medium, recording/reproducing apparatus, and recording/reproducing method
JPH10241291A (en) Recording medium, identification method therefor, identification device therefor and reproducer therefor
JP2006517713A (en) Recordable medium having data recording range with embedded unrecordable area
JPH10241292A (en) Recording medium, identification method therefor, indentification device therefor and reproducing device therefor

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998549250

Format of ref document f/p: F