CD-ROM software protection system
First Claim
1. A method for protecting an optical disk based application software from illegal copying by use of a specially processed optical disk comprising the step of:
- manufacturing a Glass Master;
treating the Glass Master with a Glass Master production machine to produce application code areas and a protection ring having an inspection ring within a central part of the protection ring, the inspection ring having predefined position parameters including polar coordinates;
storing a composite application code including the inspection ring'"'"'s predefined position parameters on the Glass Master in the application code area and protection ring, the composite application code comprising application software and protection code;
producing a specially processed optical disk from the Glass Master;
checking the position parameters of the inspection ring during use of the specially processed disk;
inspecting the predefined position parameters stored in the protection ring and verifying whether the measured location parameters agree with the stored location parameters in a process that is transparent to a user; and
protecting the optical disk based software application from being illegally copied by terminating execution of the application software if the measured location parameters and the stored location parameters do not agree.
0 Assignments
0 Petitions
Accused Products
Abstract
This Protection System, for PC Software stored in CD-ROM, prevents the illegal copying (hacking) with negligible cost increase of the protected Application. The same CD-ROM that contains the Application Software serves as a "protection key". The CD-ROM disk undergoes a special treatment during its production phase that results in the generation of the Inspection Ring. This system uses a special method for the verification of the authenticity of the Inspection Ring. The existence of the Inspection Ring along with the use of the authenticity verification procedure make impossible the copying of the CD-ROM disk even with the most advanced recording equipment. This system has many advantages over other protection methods like: excellent protection, transparency to the end-user and very low cost since the "protection-key" is the same CD-ROM disk that contains the Application. This system can be used for the protection of every Application Software for PC compatibles that is stored in a CD-ROM and runs under DOS or Windows environments.
18 Citations
11 Claims
-
1. A method for protecting an optical disk based application software from illegal copying by use of a specially processed optical disk comprising the step of:
-
manufacturing a Glass Master; treating the Glass Master with a Glass Master production machine to produce application code areas and a protection ring having an inspection ring within a central part of the protection ring, the inspection ring having predefined position parameters including polar coordinates; storing a composite application code including the inspection ring'"'"'s predefined position parameters on the Glass Master in the application code area and protection ring, the composite application code comprising application software and protection code; producing a specially processed optical disk from the Glass Master; checking the position parameters of the inspection ring during use of the specially processed disk; inspecting the predefined position parameters stored in the protection ring and verifying whether the measured location parameters agree with the stored location parameters in a process that is transparent to a user; and protecting the optical disk based software application from being illegally copied by terminating execution of the application software if the measured location parameters and the stored location parameters do not agree. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A Glass Master for producing optical disk based software applications protected from illegal copying on a specially processed optical disk, the Glass Master comprising:
-
a series of homocentric ring areas, the ring areas being an application code area followed by at least one protection ring in alternating succession with another application code area, with the innermost and outermost rings being application code areas; an application code area containing a composite application code and data, including the software application and a protection code; a protection ring being an area of the Glass Master at a specific position, specially treated to provide at least one homocentric ring area that is reserved for storage of composite application code including the protection code and encrypted data, and to provide an inspection ring; a composite application code which functions to protect the software application from illegal copying, which function is transparent to a user; an inspection ring provided within the protection ring, the inspection ring formed by the permanent destruction of the optical properties of one or more specific ring areas in the middle of the protection ring to form a continuous spiral track that has the form of a continuous pit, and having predefined position parameters; and encrypted data stored in the areas of the protection ring that are adjacent to the inspection ring, which data include the predefined location parameters of the inspection ring and information about the protected application software. - View Dependent Claims (7, 8, 9, 10, 11)
-
Specification