Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media
First Claim
1. A method for preventing the illegal copying of a copy protected content by a computerized system, comprising:
- a) installing a driver in the operating system of said computerized system, where said driver is capable of intercepting any attempt of the I/O routines of said operating system to access the device drivers of said Operating System;
b) whenever an attempt to read data from said device drivers is intercepted performing the following steps;
b.1) performing an authentication test to determine if the accessed device contain an original copy, and if it is determined that the accessed device contain an illegal copy terminating the requested I/O operation;
b.2) if it is determined that the accessed device contains an original copy allowing access to said device and calculating and storing in the memory of said computerized system the CRC codes of the data read from said device;
c) whenever an attempt to write data to said device drivers is intercepted performing the following steps;
c.3) calculating CRC code of the data to be written to said device;
c.4) if the calculated CRC code equals to one of the CRC codes that were previously stored in the memory of said computerized system terminating said write data attempt; and
c.5) if the calculated CRC code does not equal to any one of the CRC codes that were previously stored in the memory of said computerized system allowing said write data to be performed.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first sA method for preventing the illegal copying of a copy protected content by a computerized system by installing a driver in the operating system of the computerized system for intercepting any attempt of the I/O routines of the operating system to access the device drivers of the Operating System, producing a CRC codes for data read from devices containing original copies, producing a CRC codes for data to be written to devices, and preventing any attempt to write such data whenever the CRC code produced match a CRC code produced for read data. The protection of content stored on a recordable CD can be achieved by recording on the CD a first session including one or more Tracks, each of which includes unique and/or nonstandard data structures. The protected content is then recorded on the CD in a concealed form together with an authentication module capable of determining the existence or non-existence of the unique and/or nonstandard data structures and capable of accessing the concealed content and reveal its content. Whenever attempting to access the CD, the authentication module is activated, and if the unique and/or nonstandard data structures are found on the CD, the concealed content is revealed and accessed.
-
Citations
29 Claims
-
1. A method for preventing the illegal copying of a copy protected content by a computerized system, comprising:
-
a) installing a driver in the operating system of said computerized system, where said driver is capable of intercepting any attempt of the I/O routines of said operating system to access the device drivers of said Operating System;
b) whenever an attempt to read data from said device drivers is intercepted performing the following steps;
b.1) performing an authentication test to determine if the accessed device contain an original copy, and if it is determined that the accessed device contain an illegal copy terminating the requested I/O operation;
b.2) if it is determined that the accessed device contains an original copy allowing access to said device and calculating and storing in the memory of said computerized system the CRC codes of the data read from said device;
c) whenever an attempt to write data to said device drivers is intercepted performing the following steps;
c.3) calculating CRC code of the data to be written to said device;
c.4) if the calculated CRC code equals to one of the CRC codes that were previously stored in the memory of said computerized system terminating said write data attempt; and
c.5) if the calculated CRC code does not equal to any one of the CRC codes that were previously stored in the memory of said computerized system allowing said write data to be performed. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for protecting content stored on a recordable CD, comprising:
-
a) reading the values of the disc ID and the Lead-in start time from said recordable CD;
b) generating an encryption key from said read values;
c) encrypting the content that should be stored on said CD using said encryption key and writing the encrypted content to the recordable CD;
d) whenever attempting to read the content of a CD carrying out the following steps;
d.1) reading the values of the disc ID and the Lead-in start time from said CD;
d.2) generating a decryption key from said read values; and
d.3) decrypting the content of said CD with said decryption key. - View Dependent Claims (7)
-
-
8. a method for protecting the content stored on a recordable CD, comprising:
-
a) recording on said CD a first session including one or more Tracks, each of which includes unique and/or nonstandard data structures;
b) recording on said CD the protected contented in a concealed form and an authentication module capable of determining the existence or non-existence of said unique and/or nonstandard data structures and capable of accessing the concealed content and reveal its content; and
c) activating said authentication module whenever attempting to access said CD, and if said unique and/or nonstandard data structures are found on said CD allowing said concealed content to be revealed and accessed. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for preventing the illegal copying of a copy protected content by a computerized system comprising:
- setting a flag to a logical ON state whenever an active process attempts to read data from said content, where said flag is generally in a logical OFF state and it is associated with said process; and
checking the status of the flag associated with a process attempting to output data and preventing said data output if said flag is in the logical ON state.
- setting a flag to a logical ON state whenever an active process attempts to read data from said content, where said flag is generally in a logical OFF state and it is associated with said process; and
-
17. A copy protected recordable CD, comprising:
-
a) a pre-burned session comprising one or more Tracks;
b) unique and/or nonstandard data structures in the User Data field and/or the Sub Channels of predetermined frames within said Track, where only portion of said data structures can be copied by conventional recorders;
c) one or more additional sessions comprising content encrypted by an encryption key which is generated from values obtained from said data structures; and
d) a software module capable of identifying the existence or non-existence of said data structures in the first session of a CD and determining if said CD is an original or a copy, whenever an original CD determination is obtained said software module generates a decryption key from values obtained from said data structures and decrypts the content of said additional sessions. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. a method for producing a copy protected storage medium, comprising:
-
a) writing data into a first set of a predetermined number of consecutive sectors having consecutive addresses; and
b) following said first set, writing different data into a second set of the same predetermined number of consecutive sectors having the same consecutive addresses as said first set, such that any attempt to copy said medium results in copying only one of said sets.
-
-
28. a method for producing a copy protected storage medium, comprising:
-
a) designating a sector address as a starting location for writing authenticating data sectors;
b) following said starting location writing data into a first set of a predetermined number of consecutive sectors having consecutive addresses;
c) following said first set, writing different data into a second set of the same predetermined number of consecutive sectors having the same consecutive addresses as said first set; and
d) following said second set, designating a sector as an ending location and setting the address of said sector to the consecutive address following said first set, such that any attempt to copy said medium results in copying said starting location sector, one of said sets, and said ending location sector. - View Dependent Claims (29)
-
Specification