Method and system for data security of recording media
First Claim
Patent Images
1. A method of encoding data on a data storage medium, comprising:
- receiving a quantity of data to be stored on the data storage medium, the quantity of data including payload data and data delimiters;
determining a unique identifier of the data storage medium;
allocating an encoding key to the data storage medium, the encoding key being associated with the unique identifier;
dividing the quantity of data into a plurality of data blocks of a predetermined size;
encoding each data block using the encoding key to generate an encoded data block of the predetermined size; and
storing all encoded data blocks on the data storage medium so that the quantity of data is stored on the data storage medium in encoded form.
1 Assignment
0 Petitions
Accused Products
Abstract
Described embodiments generally relate to methods of encoding data on a data storage medium and methods of decoding and reading such encoded data. Other aspects relate to systems or apparatus for performing these methods. Still other aspects relate to systems and methods for monitoring use of data recorded on data storage media. These aspects are particularly suited to protecting proprietary data against unauthorized or excessive copying, where the proprietary data is embodied on a data storage medium that is publicly available for rent or sale.
73 Citations
39 Claims
-
1. A method of encoding data on a data storage medium, comprising:
-
receiving a quantity of data to be stored on the data storage medium, the quantity of data including payload data and data delimiters;
determining a unique identifier of the data storage medium;
allocating an encoding key to the data storage medium, the encoding key being associated with the unique identifier;
dividing the quantity of data into a plurality of data blocks of a predetermined size;
encoding each data block using the encoding key to generate an encoded data block of the predetermined size; and
storing all encoded data blocks on the data storage medium so that the quantity of data is stored on the data storage medium in encoded form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 39)
-
-
13. A method of decoding encoded data stored on a data storage medium, the encoded data including payload data and data delimiters, the method comprising:
-
a) providing a reading device for reading the data storage medium;
b) determining a first unique identifier of the data storage medium;
c) determining a second unique identifier of the reading device;
d) providing the first and second unique identifiers to a validation entity;
e) receiving a decryption code from the validation entity in response to step d);
f) reading the encoded data from the data storage medium; and
g) decoding the encoded data in data blocks of a predetermined size using the decryption code to generate decoded data blocks. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of monitoring use of data stored on a data storage medium using an encoding key, the data storage medium having a unique identifier, the method comprising:
-
receiving a decryption key request from a data reading entity in relation to the data storage medium, the decryption key request including a reading device identifier and the unique identifier;
determining a use number of the data storage medium based on the unique identifier;
comparing the use number with a predetermined use limit of the data storage medium; and
incrementing the use number if the use number is less than the predetermined use limit. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A data processing device for an encrypted data storage medium, the device comprising:
-
a reader for reading encrypted data stored on the data storage medium; and
a processor in communication with the reader for processing the encrypted data and controlling the reader, the processor being configured to determine a first unique identifier of the data processing device and a second unique identifier of the data storage medium, and to receive a decryption code generated by a code provider based on the first and second unique identifiers, the processor being further configured to decrypt the encrypted data based on the decryption code. - View Dependent Claims (36, 37, 38)
-
Specification