Method and apparatus for authenticating recorded media
First Claim
1. A method of authenticating recorded media comprising the steps of:
- reading a first recorded media identifier from a first recorded media using a playback unit having a non-volatile memory;
storing the first recorded media identifier in a list of previously played recorded media identifiers in the playback unit non-volatile memory;
comparing the list of previously played recorded media with a list of counterfeit media identifiers stored on the first recorded media;
executing a counterfeit media response routine where an identifier in the previously played recorded media list matches an identifier in the counterfeit media list.
1 Assignment
0 Petitions
Accused Products
Abstract
An authentic media protection system is described. Every recorded media includes a digital signature, a list of known counterfeit media identifiers, and counterfeit media response information. The digital signature is a unique encrypted combination of a recorded media serial number and samples of substantive information recorded on the media. The playback unit performs a series of authenticating steps before playing or reading recorded media. The playback unit independently verifies the encrypted digital signature to detect forgeries. The playback unit stores a recorded media identifier for each recorded media that is played in a cumulative list. This cumulative list is compared with the lists of known counterfeit media stored on each recorded media to determine whether the playback unit has played a counterfeit media. If the playback unit determines it has played a counterfeit media then it executes a counterfeit media response routine. Playback units can also store a cumulative list of known counterfeit media that it reads from each recorded media it plays. It then can check the authenticity of each new recorded media based on the internally stored list of known counterfeit media. Upon detection of counterfeit media a counterfeit response routine can be executed ranging in severity from merely displaying a warning message to shutting down the playback unit and requiring an authorized technician to unlock the unit.
112 Citations
18 Claims
-
1. A method of authenticating recorded media comprising the steps of:
-
reading a first recorded media identifier from a first recorded media using a playback unit having a non-volatile memory; storing the first recorded media identifier in a list of previously played recorded media identifiers in the playback unit non-volatile memory; comparing the list of previously played recorded media with a list of counterfeit media identifiers stored on the first recorded media; executing a counterfeit media response routine where an identifier in the previously played recorded media list matches an identifier in the counterfeit media list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of authenticating recorded media comprising the steps of:
-
reading a first recorded media identifier from a writeable layer of a recorded media; reading samples from predetermined locations on said writeable layer of said recorded media; reading a recorded digital signature from said writeable layer of said recorded media; verifying said recorded digital signature using said first recorded media identifier and samples; and executing a counterfeit media response routine where said computer digital signature does not verify said recorded digital signature. - View Dependent Claims (12, 13)
-
-
14. A method of authenticating recorded media comprising the steps of:
-
storing an encrypted digital signature on a recorded media; storing a list of counterfeit media on said recorded media; reading a recorded media identifier from said recorded media using a playback unit having a non-volatile memory; storing said recorded media identifier in a list of previously played recorded media in the playback unit non-volatile memory; comparing the list of previously played recorded media with said list of counterfeit media identifiers stored on the recorded media; and executing a counterfeit media response routine where an identifier in the previously played recorded media list matches an identifier in the list of counterfeit media identifiers. - View Dependent Claims (15, 16, 17, 18)
-
Specification