Data disc modulation for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs
First Claim
1. A method for authenticating at least one of a media and data stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, wherein said media is modulated via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof for authenticating whether at least one of said media and said data is authenticated, said method comprising the steps of:
- (a) reading the data from said media;
(b) detecting the modulation of the at least one of said pit depth, pit width and pit track;
(c) deriving an embedded authentication key or component thereof responsive to said detecting step (b);
(d) comparing the embedded authentication key or component thereof to at least one authentication key or component thereof;
(e) authenticating at least one of said media and said data responsive to said comparing step (d); and
(f) outputting said data as at least one of audio, video, audio data, video data and digital data substantially free of the modulation of the at least one of the pit depth, pit width and pit track.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method and system for authenticating a media and/or the data stored on the media in order to prevent piracy and/or unauthorized access and/or unauthorized copying of the data stored on the media, including CDs and DVDs. According to the present invention, there are three ways that authentication keys can be formed and remain hidden without being transferred in the audio/video. These three methods are employed using conventional hardware and/or software in CD or DVD players, which may optionally be modified. Each method of producing authentication keys according to the present invention is a function of the physical characteristics of a disc that does not normally travel with the audio or video or graphics data. Authentication systems of the present invention optionally encompass singular, multiple or multi-level authentication systems, each of which successively must be deciphered before the audio/video is finally available, or, alternatively where each key component must be found in order to build the whole key to perform the entire decryption or authentication process.
-
Citations
44 Claims
-
1. A method for authenticating at least one of a media and data stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, wherein said media is modulated via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof for authenticating whether at least one of said media and said data is authenticated, said method comprising the steps of:
-
(a) reading the data from said media;
(b) detecting the modulation of the at least one of said pit depth, pit width and pit track;
(c) deriving an embedded authentication key or component thereof responsive to said detecting step (b);
(d) comparing the embedded authentication key or component thereof to at least one authentication key or component thereof;
(e) authenticating at least one of said media and said data responsive to said comparing step (d); and
(f) outputting said data as at least one of audio, video, audio data, video data and digital data substantially free of the modulation of the at least one of the pit depth, pit width and pit track. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
(g) physically altering the at least one of pit depth, pit width and pit track of the media on at least one of a per track basis and interval basis throughout said media such that said authentication step (e) is performed for at least one of each track to be played, throughout playback and throughout recording.
-
-
5. A method according to claim 1, wherein said authenticating step (e) further includes a step of authenticating using a different authentication key or component thereof for each disc track.
-
6. A method according to claim 1, said method comprises the step of authenticating the at least one of the data and the media via at least two different authentication keys, each of which successively must be authenticated before said data is finally output via said outputting step (f).
-
7. A method according to claim 1, wherein said method authenticates the at least one of the media and the data over a plurality of interconnected computer networks comprising at least one of a local network, global network and Internet.
-
8. A method according to claim 1, wherein said authenticating step (e) further includes a step of using at least three different sources for compiling long or compound authentication keys.
-
9. A method according to claim 1 wherein said deriving step (c) further comprises the step of at least one of decoding and decrypting-the embedded authentication key or component thereof.
-
10. A method according to claim 1 wherein said comparing step (d) further comprises the step of comparing a modulated signal derived from at least one of pit depth, pit width and pit track modulation, to a table of valid modulated signals derived from at least one of pit depth, pit width and pit track modulation.
- 11. In a method for authenticating at least one of a media and data stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, a data disc comprising media that is modulated via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof for authenticating whether at least one of said media and said data is authenticated.
-
12. In a method for authenticating at least one of a media and data stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, wherein said media is modulated via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof, for authenticating whether the at least one of said media and said data is authenticated, a data player comprising a data processor performing the steps of:
-
(a) reading the data from said media;
(b) detecting the modulation of the at least one of pit depth, pit width and pit track;
(c) deriving an embedded authentication key or component thereof responsive to said detecting step (b);
(d) comparing the embedded authentication key or component thereof to at least one authentication key or component thereof;
(e) authenticating at least one of said media and said data responsive to said comparing (d) step; and
(f) outputting said data as at least one of audio, video, audio data, video data and digital data substantially free of the modulation of the at least one of the pit depth, pit width and pit track. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
(g) physically altering the at least one of pit depth, pit width and pit track of the media on at least one of a per track basis and an interval basis throughout said media such that said authentication step (e) is performed for at least one of each track to be played, throughout playback and throughout recording.
-
-
25. The data player of claim 12, wherein said authentication step (e) further includes a step of authenticating using a different authentication key or component thereof for each disc track.
-
26. The data player of claim 12, wherein the data processor further performs the step of authenticating the at least one of the data and the media via at least two different authentication keys, each of which successively must be authenticated before said data is finally output via said outputting step (f).
-
27. The data player of claim 12, wherein the data processor further performs the step of authenticating the at least one of the data and the media over a plurality of interconnected computer networks comprising at least one of a local network, global network and Internet.
-
28. The data player of claim 12, wherein said authenticating step (e) further includes a step of using at least three different sources for compiling long or compound authentication keys.
-
29. The data player of claim 12, wherein said deriving step (c) further comprises the step of at least one of decoding and decrypting the embedded authentication key or component thereof.
-
30. The data player of claim 12, wherein said comparing step (d) further comprises the step of comparing a modulated signal derived from at least one of pit depth, pit width and pit track modulation, to a table of valid modulated signals derived from at least one of pit depth, pit width and pit track modulation.
- 13. In a method for authenticating at least one of a media and data to be stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, a data message comprising modulation via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof lo for authenticating whether said data message is authenticated, and wherein the modulation of the at least one of the pit depth, pit width and pit track cannot be readily altered, obscured nor removed from said data without simultaneously degrading or impairing a quality of an audible component of said data message, and wherein the data message is transmitted substantially free of the modulation of the at least one of the pit depth, pit width and pit track, thereby preventing a destination processor from reading and subsequently authenticating the data message.
-
14. A system for authenticating at least one of a media and data stored on said media, in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media, wherein said media is modulated via at least one of pit depth, pit width and pit track comprising at least one authentication key or component thereof for authenticating whether at least one of said media and said data is authenticated, said system including a data player containing a data processor comprising:
-
(a) first detecting means for detecting all pit modulated data from a data stream;
(b) second detecting means for determining authentication key data that has been pit depth modulated based on a physical characteristic of a data disc;
(c) third detecting means for determining authentication key data that has been pit width modulated based on a physical characteristic of a data disc;
(d) fourth detecting means for determining authentication key data that has been pit track modulated based on a physical characteristic of a data disc;
wherein the first, second, third and fourth detecting means are interconnected via a focus server, tracking server, laser, lens and mirror, further comprising a portion of a disc reader housed in a data player device. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
Specification