Security marking system and method for minimizing pirating of data on data media including compact discs and digital versatile discs

ABSTRACT

The present invention is a method and system of marking data media products by introducing a predetermined tracing substance constituting a security marking into a polycarbonate (or polystyrene) composition during the manufacturing stages of the polycarbonate material into a data media, such as a compact disc (CD) or digital versatile disc (DVD). This marking technique is useful in tracking pirated data and/or sources, such as CDs or DVDs, to thereby prevent future pirating of data. Using mass spectrometry, specific types and/or quantities of isotopes of each tracing substance, on a structural level, are used to indicate a specific marking and product identity characteristics, such as a specific lot number, batch number, manufacturer identity, shipping date and the like. The security marking is preferably invisible to the naked eye. The security marking technique is also useful for tracking, authenticating and quality control purposes.

RELATED APPLICATION

This application is a divisional application of U.S. application Ser.No. 09/448,409 filed Nov. 23, 1999 is now 6,477,134 which is acontinuation of International Application No. PCT/US99/14621, filed Jun.29, 1999, which in turn claims priority from U.S. ProvisionalApplication No. 60/091,036, filed Jun. 29, 1998, each of which isincorporated herein by reference.

This application is also related to: U.S. Non-provisional Applicationentitled, “Data Disc Modulation for Minimizing Pirating and/orUnauthorized Copying and/or Unauthorized Access of/to Data on/from DataMedia including Compact Discs and Digital Versatile Discs”, filed May20, 1999, Application No. 09/315,104; U.S. Nonprovisional Applicationentitled, “Method for Minimizing Pirating and/or Unauthorized Copyingand/or Unauthorized Access of/to Data on/from Data Media includingCompact Discs and Digital Versatile Discs, and System and Data Media forSame”, filed May 20, 1999, application Ser. No.09/315,012; and U.S.Nonprovisional Application entitled, “Method for Minimizing Piratingand/or Unauthorized Copying and/or Unauthorized Access of/to Dataon/from Data Media including Compact Discs and Digital Versatile Discs,and System and Data Media for Same”, filed May 20, 1999, applicationSer. No.09/315/102, all three of which are incorporated herein byreference.

FIELD OF INVENTION

This invention relates generally to anti-data pirating technology. Morespecifically, the invention relates to a method and system of markingdata discs by introducing, into the polycarbonate material, apredetermined tracing substance known as a security marking during themanufacturing stage of the polycarbonate material. This markingtechnique is useful in tracking pirated data and/or sources, such ascompact discs (CDs) or digital versatile discs (DVDs), to therebyprevent future pirating of data.

BACKGROUND OF THE INVENTION

There are two basic methods for recording sound and music—analog anddigital. See e.g. Ken C. Pohlmann, “The Compact Disc”, THE COMPUTERMUSIC & DIGITAL AUDIO SERIES, Volume 5. The above-mentioned audioseries, which was published by A-R Editions, Inc., in Madison, Wis., is,along with all volumes therein, incorporated by reference.

In analog recording, the recording medium (a tape) varies continuouslyaccording to the sound signal. In other words, an analog tape storessound signals as a continuous stream of magnetism. The magnetism, whichmay have any value within a limited range, varies by the same amount asthe sound signal voltage.

In digital recording, the sound signal is sampled electronically andrecorded as a rapid sequence of separately coded measurements. In otherwords, a digital recording comprises rapid measurements of a soundsignal in the form of on-off binary codes represented by ones and zeros.In this digital system, zeros are represented by indentations or pits ina disc surface, and ones are represented by unpitted surfaces or landreflections of the disc, such that a compact disc contains a spiraltrack of binary codes in the form of sequences of minute pits producedby a laser beam.

Music that is input to a digital recording and the requisite series ofreproduction processes, must pass through the recording side of a pulsecode modulation (PCM) system. A master recording of the music is storedin digital form on a magnetic tape or optical disc. Once the magnetictape has been recorded, mixed and edited, it is ready for reproductionas a CD. The CD manufacturer then converts the master tape to a masterdisc, which is replicated to produce a desired number of CDs. At the endof the PCM system is the reproduction side, the CD player, which outputsthe pre-recorded music.

If digital technology is used in all intermediate steps between therecording and reproduction sides of the PCM system, music remains inbinary code throughout the entire chain; music is converted to binarycode when it enters the recording studio, and stays in binary code untilit is converted back to analog form when it leaves the CD player and isaudible to a listener. In most CD players, digital outputs therefrompreserve data in its original form until the data reaches the poweramplifier, and the identical audio information that recorded in thestudio is thereby preserved on the disc.

Optical Storage

The physical specifications for a compact disc system are shown in PriorArt FIG. 1. They were developed jointly by Sony and Philips, and aredefined in the standards document entitled Red Book, which isincorporated herein by reference. The CD standard is also contained inthe International Electrotechnical Commission standard entitled, CompactDisc Digital Audio System, also incorporated herein by reference. Discmanufacturers, as well as CD player manufacturers, obtain a CD licenseto use these specifications.

All disc dimensions, including those pertaining to pit and physicalformations, which encode data, are defined in the CD standard. Forexample, specifications information on sampling frequency, quantizationword length, data rate, error correction code, and modulation scheme areall defined in the standard. Properties of the optical system that readsdata from the disc using a leaser beam are also defined in the standard.Moreover, basis specifications relevant to CD player design is locatedin the signal format specifications.

Referring to Prior Art FIGS. 2A and 2B, the physical characteristics ofthe compact disc surface structure are described. Each CD is less than 5inches in diameter whose track thickness is essentially thinner than ahair and whose track length averages approximately 3 and a half miles.The innermost portion of the disc is a hole, with a diameter of 15 mm,that does not hold data. The hole provides a clamping area for the CDplayer to hold the CD firmly to the spindle motor shaft.

Data is recorded on a surface area of the disc that is 35.5 mm wide. Alead-in area rings the innermost data area, and a lead-out area ringsthe outermost area. Both lead-in and lead-out areas contain non-audiodata used to control the CD player. Generally, a change in appearance inthe reflective data surface of a disc marks the end of musicalinformation.

A transparent plastic substrate comprises most of the CD's 1.2 mmthickness. Viewing a magnified portion of the CD surface, as shown inPrior Art FIG. 2A and 2B, the top surface of the CD is covered with avery thin metal layer of generally aluminum, silver or gold. Data isphysically contained in pits impressed along the CD's top surface. Abovethis metalized pit surface and disc substrate lies another thinprotective lacquer coating (10 to 30 micrometers). An identifying label(5 micrometers) is printed on top of the lacquer coating.

A system of mirrors and lenses sends a beam of laser light to read thedata. A laser beam is applied to the underside of a CD and passesthrough the transparent substrate and back again. The beam is focused onthe metalized data surface that is sandwiched or embedded inside thedisc. As the disc rotates, the laser beam moves across the disc from thecenter to the edge. This beam produces on-off code signals that areconverted into, for example, a stereo electric signal.

The Pit Track

Prior Art FIG. 3 shows a typical compact disc pit surface. Each CDcontains a track of pits arranged in a continuous spiral that runs fromthe inner circumference to the outer edge. The starting point begins atthe inner circumference because, in some manufacturing processes, tracksat the outer diameter of a CD is more generally prone to manufacturingdefects. Therefore, CDs with shorter playing time provide a greatermanufacturing yield, which has led to adoption of smaller diameter discs(such as 8 cm CD-3 discs) or larger diameter discs (such as 20 and 30 cmCD-Video discs).

Prior Art FIG. 4 shows a diagram of a typical track pitch. The distancebetween successive tracks is 1.6 micrometers. That adds up toapproximately 600 tracks per millimeter. There are 22,188 revolutionsacross a disc's entire signal surface of 35.5 millimeters. Hence, a pittrack may contain 3 billion pits. Because CDs are constructed in adiffraction-limited manner—creating the smallest formations of the wavenature of light—track pitch acts as a diffraction grating; namely, byproducing a rainbow of colors. In fact, CD pits are among the smallestof all manufactured formations.

The linear dimensions of each track on a CD is the same, from thebeginning of a spiral to the end. Consequently, each CD must rotate withconstant linear velocity (CLV), a condition whereby uniform relativevelocity is maintained between the CD and the pickup.

To accomplish this, the rotational speed of a CD varies depending on theposition of the pickup. The disc rotates at a playing speed which variesfrom 500 revolutions per minute at the center, where the track starts,to 200 revolutions per minute at the edge. This difference in speed isaccounted for by the number of tracks at each position.

For example, because each outer track revolution contains more pits thaneach inner track revolution, the CD must be slowed down as it plays inorder to maintain a constant rate of data. So, when the pickup isreading the inner circumference of the CD, the disc rotates at thehigher speed of 500 rpm. And as the pickup moves outwardly towards thedisc's edge, the rotational speed gradually decreases to 200 rpm. Thus,a constant linear velocity is maintained, such that all of the pits areread at the same speed. The CD player constantly reads fromsynchronization words from the data and adjusts the disc speed to keepthe data rate constant.

A CD's constant linear velocity (CLV) system is significantly differentfrom an LP's system. A major difference stems from the fact that aturntable's motor rotates at a constant velocity rate of 33⅓ grooves.This translates into outer grooves having a greater apparent velocitythan inner grooves, probably explained by the occurrence thathigh-frequency responses of inner grooves is inferior to that of outergrooves. If a CD used constant angular velocity (CAV) as opposed to theCLV system, pits on the outside diameter would have to be longer thanpits on the inner diameter of the disc. This latter scenario wouldresult in decreased data density and decreased playing time of a CD.

Like constant linear velocity, light beam modulation is also importantto the optical read-out system that decodes the tracks. See Prior ArtFIG. 5. A brief theoretical discussion on the distinctions between pitand land light travel explains this point.

Generally, when light passes from one medium to another with a differentindex of refraction, the light bends and its wavelength changes. Thevelocity at which light passes is important, because when velocity isslow, the beam bends and focusing occurs. Owing to several factors, suchas the refractive index, disc thickness and laser lens aperture, thelaser beam's size on the disc surface is approximately 800 μm. However,the laser beam is focused to approximately 1.7 μm at the pit surface. Inother words, the laser beam is focused to a point that is a littlelarger than a pit width. This condition minimizes the effects of dust orscratches on the CD's outer surface, because the size of dust particlesor scratches are effectively reduced along with the laser beam. Anyobstruction less than 0.5 ml are essentially insignificant and causes noerror in the readout.

As previously noted, a CD's entire pit surface is metalized. Inaddition, the reflective flat surface between each pit, (i.e. a land),causes almost 90 percent of laser light to be reflected back into thepickup. Looking at a spiral track from a laser's perspective on theunderside of a disc, as shown in Prior Art FIG. 5, pits appears asbumps. The height of each bump is generally between 0.11 and 0.13 μm,such that this dimension is smaller than the laser beam's wavelength(780 nanometers) in air. The dimension of the laser beam's wavelength inair is larger than the laser's wavelength (500 nanometers) inside thedisc substrate, with a refractive index of 1.55. In short, the height ofeach bump is, therefore, one-quarter of the laser's wavelength in thesubstrate.

Scientifically, this means that light striking a land will travel twiceas far than light striking a bump. This discrepancy in light traveldistances serve to modulate the intensity of a light beam. This allowsdata physically encoded on the disc to be recoverable by the laser.

Also, the pits and intervening reflective lands on the disc's surface donot directly designate ones and zeros. Rather, it is each pit's edge,whether leading or trailing, that is a 1 and all areas in between,whether inside or outside a pit, that are designated as zeros. Still,each pit and reflective land lengths vary incrementally. Thecombinations of 9 different pit and land lengths of varying dimensionsphysically encode the data.

Presently, there are three principal types of optical storage media forwhich there may be a need to provide security for the data stored on theoptical storage media. The first type is a read-only memory (ROM) mediawhere the disc is manufactured with the information already storedthereon in the form of depressions formed in the polycarbonatesubstrate. Read-only discs include CD-audio, CD-ROM, CD-interactive andCD-video discs.

The second type of optical storage media is a writable optical storagedisc, which has the capability of having information recorded (orwritten) thereon after fabrication of the media.

And the third type is a re-writable or erasable optical storage disc,which has the capability of having information erased or modified afterfabrication of the media.

In general, it is desired that the disc containing information isprovided with a security marking or marker that is permanent,unalterable without damaging the disc medium, and could be determined byand/or related to the marking. The following prior patents represent thestate of the art.

U.S. Pat. No. 4,961,077 to Wilson et al., incorporated herein byreference, discloses a method of affixing information characters onread-only optical discs by means of a pulsed scanning laser beam, whichtransmits light in a patterned array through a transparent layer of themedium, and indelibly marks the reflective layer of the medium withoutdisrupting the surface continuity of the substrate and protective layer.

U.S. Pat. No. 5,625,816 to Burdick et al., incorporated herein byreference, discloses a method and system for tracking a manufacturedproduct or group of manufactured products through a manufacturingprocess comprising a series of manufacturing steps performed atdifferent physical locations.

U.S. Pat. No. 5,671,202 to Brownstein et al. relates to a method forproviding security for the data stored in the optical informationstorage and retrieval system. The increased system security is providedby the inclusion in the medium of a visible and indelible identifyingcode and the storage of related data files on the storage medium. Thevisible identifying code is used in conjunction with the related filesby the apparatus accessing the data files to protect the data filesstored on the media against unauthorized access to the data files and/orunauthorized copying of the data files.

In U.S. Pat. No. 5,706,047 to Lentz et al., incorporated herein byreference, the invention relates generally to media upon whichinformation is stored in an optical information storage and retrievalunit, and more particularly, to the inclusion in the media of anindelible identifying code embedded therein.

U.S. Pat. No. 5,706,266 to Brownstein et al., incorporated herein byreference, relates to a writable optical storage disc used in an opticalinformation storage and retrieval system to provide security for thedata stored in the storage and retrieval system.

The problem in one or more of the prior art references, I havedetermined, is that identification markings have been applied to thesurface of the disc by means of mechanical disruption of the surface orby deposition of legible material on the surface. This information,however, being on the disc's surface can be compromised eitheraccidentally or intentionally.

An additional problem in one or more of the prior art references is thatthe marking process is too sensitive to the energy level of the laserbeam, such that too small an energy in the laser beam will not providean identifiable marking, and too much energy can disrupt the lacquerovercoat layer and/or the polycarbonate layer used to protect thereflective layer.

Yet another problem in one or more of the prior art references is thatthe affixing or identifying marking information is easily applied toexterior, non-information surfaces of the substrate or protective layer,such as by printing. However, because the labeling or patterns are onthe surface of the disc, they are susceptible to damage, alteration andcan be removed too easily.

Accordingly, I have determined that it is desirable to solve one or moreof the above problems. For example, I have determined that it isdesirable to provide a system and method where identification markingsneed not be applied to the surface of the disc by means of mechanicaldisruption of the surface or by deposition of legible material on thesurface.

I have also determined that it is desirable to provide a marking processthat is not significantly sensitive to the energy level of the laserbeam, and that will not disrupt the lacquer overcoat layer and/or thepolycarbonate layer used to protect the reflective layer.

It is also desirable to provide a marking mechanism and/or process wherethe labeling or marking of the disc is not susceptible to damage,alteration, detection and/or removal.

SUMMARY OF THE INVENTION

It is a feature and advantage of the present invention to provide amethod and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that is inexpensive.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that is capable of detecting asecurity marking that could be determined by and/or related to thesecurity marking itself, for piracy related issues.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that is manageable and practical inits implementation.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that does not require significantadditional hardware and/or software in its implementation.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that is unreadable by the human eyeand is indelible in the sense that it is permanent and, for allpractical purposes, unalterable without damaging the disc medium.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that is impressed into the discduring the injection molding operation.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that can be advantageously used toprevent unauthorized access to the data on the data disc; that is, forauthentication purposes.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that provides an identifying markingfor discs storing optical information that is both relativelyinsensitive to the power of the radiation beam and reduces damage to theoptical disc.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that provides manufacturer identifierinformation, such as manufacturer identity, manufacture date, batchnumber and the like, useful for quality control purposes.

It is another feature and advantage of the present invention to providea method and/or system for tracking and/or minimizing pirating of, orunauthorized access to, data media that provides product identifierinformation, such as lot or batch identity, shipping date, senderidentity, recipient identity, manufacturer identity, manufacture date,and the like, to assist in tracking the origin of piracy related issues.

Consequently, a feature and advantage of the present invention is toinhibit disc piracy; that is to provide greatly enhanced securitymeasures against CD or DVD pirating. The present invention is based, inpart, on my discovery that an identifier marking can be embedded in eachdata disc using conventional hardware. The present invention is alsobased on my discovery that the identifier marking or tracing may be, forexample, embedded in the data disc in a manner that inhibits itsdetection. The present invention is further based on my discovery thatuse of a marker embedded in a data disc, when the data disc ismanufactured, reduces or simplifies the problem of determining ortracking where/when the data disc was pirated, thereby making itpractical to determine valuable information regarding the origin ofpirating of the data disc.

The above features and advantages are accomplished generally byintroducing a tracing or marking substance constituting a securitymarking into a polycarbonate composition during the manufacturing stageof the polycarbonate material into a data media, such as a CD or DVD.The tracing substance is preferably at the isotope level, where variousdifferent quantities of isotopes are used. Thus, various markingsubstances may be used.

Specific types and/or quantities of isotopes are used to indicate aspecific marker, as described above, such as a specific lot,manufacturer and the like. The specific types and/or quantities ofisotopes may be determinable with respect to each other and/or,alternatively, with respect to the total polycarbonate composition.Optionally, the type and/or quantities of isotopes may be determined bya specific order of composition. Advantageously, the isotope number(s)are detectable using spectrometry techniques.

According to the present invention, there are two alternative ways ofidentifying the tracing substance, as well as its structuralcomposition, contained in the end-product ultimately made of thepolycarbonate material. Each alternative method is easily employed viaconventional spectrometry techniques.

One exemplary way is to perform a mass spectrometry analysis of thepolycarbonate itself. If the polycarbonate includes one or two opticallyclear substances in, for example, crystalline form, this is evidence ofa tracing substance, which is likely a heavy element.

Another method is to perform a mass spectrometry analysis of thepolycarbonate, to determine or detect a heavy element and also toidentify the ratio of the isotopes in a given element. The accuracy ofthe spectrometry, which is very high, would be a function of the ratiobetween the isotopes of the element itself.

Other methods may alternatively be used to detect a tracing substanceembedded in the data disc that perform the similar overall intendedfunction described herein.

The advantage of using one or more of the above two methods on a datamedium, such as a compact disc, is that it eliminates an obvious methodthat a pirate could use to reproduce discs. That is, a pirate will haveto initially fabricate a disc that meets the exact structuralpredetermined requirements of the disc to be copied, in order to bedeemed a non-pirated disc.

The present invention employs methods of manufacturing traceable datadiscs that are a function of the structural characteristics of each discthat is relatively unchangeable after fabrication. Thus, another dischaving the same structural or chemical characteristics is required inorder for it to be considered an authenticated CD or DVD.

Another feature of the present invention is the combinative use of theabove methods for generating a security marking in each data disc. Forexample, a single data disc may comprise the combination of one or moretracing substances where each tracing substance may constitute aseparate and/or different security marking as desired, to indicatespecific lot, polycarbonate or raw material manufacturer, date ofmanufacture, intended data disc presser/manufacturer, and the like,described in more detail below.

To achieve these and other objects, the present invention provides acomputer program product that stores computer instructions thereon forinstructing a computer to perform a process of tracking a data media,such as a CD or DVD, and determining whether it is fraudulent/pirated ornon-fraudulent. Alternatively, the present invention provides a datadisc having modified data stored thereon, including the tracing ormarking substance(s).

In accordance with one embodiment of the invention, a method isdisclosed for providing a security marking for a data disc productcomprised of polycarbonate material and storing data thereon, such asCDs or DVDs. The method is used for tracking purposes to inhibit atleast one of piracy, unauthorized access and unauthorized copying of thedata stored on the data disc product.

The method includes the following sequential, non-sequential and/orsequence independent steps of introducing at least one predeterminedtracing substance as a predetermined marking in the polycarbonatematerial of the data disc product in quantities that will not adverselyaffect at least one of performance, structure of, and the data storedon, the data disc product; and manufacturing the data disc product withthe at least one predetermined tracing substance introduced therein saidintroducing step (a).

The introducing step (a) further comprises the step of introducing theat least one predetermined tracing substance as a security marking inthe polycarbonate material including predetermined concentration amountsof at least one of an isotope, a plurality of isotopes and a pluralityof stable isotopes.

Furthermore, the method encompasses a process wherein at least onepredetermined tracing substance comprises at least two predeterminedtracing substances, and wherein the introducing step (a) furthercomprises the step of introducing the at least two predetermined tracingsubstances as a security marking in the polycarbonate material includingpredetermined concentration amounts of at least one of an isotope, aplurality of isotopes and a plurality of stable isotopes.

Each tracing substance may comprise a transparent oxide of at least oneof a silicate, a lead dioxide, tin cadmium 12 and iridium 5, orcombination thereof.

The method also includes the step of identifying by inspecting the datadisc product the at least one tracing substance for tracking purposes toinhibit at least one of piracy, unauthorized access and unauthorizedcopying of the data stored on the data disc product. Alternatively, theproduct could be identified on a basis of the ratio of concentrationamounts of each tracing substance in the product, or on the basis of theratio of concentration amounts of each tracing substance to the totalpolycarbonate composition of the product. Furthermore, the product couldalternatively be identified on the basis of a specific composition ofeach tracing substance in the product.

The method also includes a step of attributing distribution of each datadisc product to a manufacturer such that identification of each tracingsubstance in the data disc product indicates whether the manufacturer isan authorized manufacturer. The predetermined marking is substantiallytransparent.

In accordance with another embodiment of the invention, a method isdisclosed for marking a protective layer of a product, which comprisesat least one of a portion of a polymer, where the method is used totrack the product and inhibit at least one of piracy, unauthorizedaccess and unauthorized copying of the product.

The method according to this embodiment comprises the steps ofintroducing at least one predetermined tracing substance as apredetermined marking in the polycarbonate material of the protectivelayer of the product in quantities that will not adversely affect atleast one of performance, structure of, and the data stored on, theproduce; and manufacturing the product with the at least onepredetermined tracing substance introduced therein in introducing step(a).

In yet another embodiment of the present invention is disclosed, in asecurity marking method for marking a polycarbonate-based product toinhibit at least one of piracy, unauthorized access and unauthorizedcopying of the product, a data disc impregnated with at least onepredetermined tracing substance providing the security marking used forat least one of tracking and authenticating the data disc. Eachpredetermined tracing substance includes predetermined concentrationamounts of at least one of an isotope, a plurality of isotopes and aplurality of stable isotopes, where the predetermined tracing substanceis indicative of product information including at least one of a lotnumber, batch number, shipper, recipient, shipping date, manufactureridentity, manufacturing date and designated product purpose.

In accordance with another embodiment of the present invention isdisclosed a system of marking a protective layer of a product, whichcomprises and includes at least one of a portion of polymer, where thesystem is used to track the product and inhibit at least one of piracy,unauthorized access and unauthorized copying of the product.

The system according to this embodiment comprises: means for introducingat least one predetermined tracing substance as a predetermined markingin the polycarbonate material of the protective layer of the product inquantities that will not adversely affect performance and/or structureand/or the data stored on the product; and means for manufacturing theproduct with the at least one predetermined tracing substance introducedtherein by the means for introducing.

The marking system according to yet another embodiment of the presentinvention comprises: a substance introduction system introducing atleast one predetermined tracing substance as a predetermined marking inthe polycarbonate material of the product in quantities that will notadversely affect performance and/or structure and/or the data stored onthe product; and a product manufacturing system, operatively andstructurally responsive to the substance introduction system, andmanufacturing the product with each predetermined tracing substanceintroduced therein by the substance introduction system.

In yet another embodiment of the present invention, the tracingsubstance, which can be introduced into any product that usespolycarbonate or polystyrene, serves as a security marking for a desirednumber of non-data disc products, such as CD cases, films, or MYLAR. Inaddition, the markings of the present invention may also be used inplexiglass, eyeglasses, sunglasses, helmets and the like.

In yet another embodiment of the present invention, the predeterminedtracing substance constituting a security marking that is introducedinto a polycarbonate composition during the manufacturing stage of thecomposition into CDs and DVDs, can also be used for authenticationpurposes in order to prevent unauthorized access to data on the disc.

In accordance with this embodiment of the invention, a method isdisclosed for authenticating a data media in order to prevent piracyand/or unauthorized access and/or unauthorized copying of the datamedia, wherein the media is impregnated with at least one predeterminedtracing substance including a predetermined concentration of at leastone of an isotope, a plurality of isotopes and a plurality of stableisotopes, to form at least one security marking used for at least one oftracking and authenticating the data media.

The authenticating method here comprises the steps of: detecting atleast one security marking in the data media; authenticating the datamedia responsive to the above detecting step using at least one securitymarking; and outputting the data stored on the data media as at leastone of audio, video, audio data, video data and digital datasubstantially free of each security marking when the data media has beensuccessfully authenticated by the above authenticating step.

The authenticating method further includes the steps of authenticatingthe data media via at least two different security markings, each ofwhich successively must be authenticated before the data is finallyoutput via the outputting step, and of authenticating the data mediaover a plurality of interconnected computer networks comprising at leastone of a local network, global network and Internet.

In yet another embodiment is disclosed, in a security marking method formarking a polycarbonate-based product to prevent piracy and/orunauthorized access and/or unauthorized copying of the product, a datadisc impregnated with at least one predetermined tracing substanceproviding a security marking used for tracking and/or authenticating thedata disc. Each predetermined tracing substance includes predeterminedconcentration amounts of at least one isotope, a plurality of isotopesand a plurality of stable isotopes. The predetermined tracing substanceis indicative of product information including at least one of a lotnumber, batch number, shipper, recipient, shipping date, manufactureridentity, manufacturing date and designated product purpose.

Finally, in accordance with another embodiment of the present invention,a data message is disclosed. In a security marking method for marking apolycarbonate-based product to prevent piracy and/or unauthorized accessand/or unauthorized copying of the product, a data disc is impregnatedwith at least one predetermined tracing substance providing a securitymarking used for tracking and/or authenticating the data disc. Eachpredetermined tracing substance includes predetermined concentrationamounts of at least one isotope, a plurality of isotopes and a pluralityof stable isotopes. The predetermined tracing substance is indicative ofproduct information including at least one of a lot number, batchnumber, shipper, recipient, shipping date, manufacturer identity,manufacturing date and designated product purpose.

A computer or processor driven system, tangible medium includinginstructions thereon, and process is also provided.

There has thus been outlined, rather broadly, the important features ofthe invention in order that the detailed description thereof thatfollows may be better understood, and in order that the presentcontribution to the art may be better appreciated. There are, of course,additional features of the invention that will be described hereinafterand which will perform the subject matter of the claims appended hereto.

In this respect, before explaining at least one embodiment of theinvention in detail, it is to be understood that the invention is notlimited in its application to the details of construction and to thearrangements of the components set forth in the following description orillustrated in the drawings. The invention is capable of otherembodiments and of being practiced and carried out in various ways.Also, it is to be understood that the phraseology and terminologyemployed herein are for the purposes of description and should not beregarded as limiting.

As such, those skilled in the art will appreciate that the conception,upon which this disclosure is based, may readily be used as a basis forthe designing of other structures, methods and systems for carrying outthe several purposes of the present invention. It is important,therefore, that the claims be regarded as including such equivalentconstructions insofar as they do not depart from the spirit and scope ofthe present invention.

Further, the purpose of the foregoing abstract is to enable the U.S.Patent and Trademark Office and the public, generally, and especiallyscientists, engineers and practitioners in the art, who are not familiarwith patent or legal terms or phraseology, to determine quickly from acursory inspection, the nature and essence of the technical disclosureof the application. The abstract is neither intended to define theinvention of the application, which is measured by the claims, nor is itintended to be limiting as to the scope of the invention in any way.

The above objects of the invention, together with other apparent objectsof the invention, along with the various features of novelty thatcharacterize the invention, are pointed out with particularity in theclaims annexed to and forming a part of this disclosure. For a betterunderstanding of the invention, its operating advantages and thespecific objects attained by its uses, reference should be had to theaccompanying drawings and descriptive matter, which illustrate preferredembodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a conventional specification table for a conventionalcompact disc system.

FIGS. 2A and 2B show a scale drawing of a conventional CD data surface.

FIG. 3 shows a typical compact disc pit surface.

FIG. 4 shows a diagram of a conventional pit track.

FIG. 5 shows a conventional bump height on a CD surface.

FIG. 6 illustrates three graphic presentations of a mass spectrum tracedby a five-element galvanometer.

FIG. 7 illustrates a block diagram of the overall distribution path of apolycarbonate product, such as a CD or DVD, from manufacture todistribution to a customer.

FIG. 8 illustrates the hierarchical relationship and the number ofentities involved in the overall distribution of a polycarbonate productfrom manufacture to distribution to a customer.

FIG. 9 shows eight (8) countries where music piracy is of particularconcern, along with data on the estimated capacity for manufacturing alldata discs, and data on legitimate demand for all data discs.

FIG. 10 is a tabular listing of 10 countries and data on reportedinstances of piracy in 1996.

FIG. 11 shows different levels of domestic piracy (in units) for Europe,the Middle East/Turkey, Asia, Africa, Australasia, Latin America andNorth America.

FIGS. 12-13 illustrate a process of embedding a tracing substance in thepolycarbonate composition at the manufacturing stage.

FIGS. 14 through 19 are six illustrations of different compositioncombinations that may be used in the present invention as a securitymarking.

FIG. 20 is an illustration of a main central processing unit forimplementing the computer processing in accordance with a computerimplemented embodiment of the present invention.

FIG. 21 illustrates a block diagram of the internal hardware of thecomputer of FIG. 20.

FIG. 22 is a block diagram of the internal hardware of the computer ofFIG. 20 in accordance with a second embodiment.

FIG. 23 is an illustration of an exemplary memory medium which can beused with disc drives illustrated in FIGS. 20-22.

FIG. 24 shows a flow chart of the decision logic describing theauthentication process of a CD, which contains the security marking ofthe present invention, to be played on a CD player.

FIGS. 25-28 illustrate a flow chart of the decision logic describingoperations when a first CD, which contains the security marking of thepresent invention, plays data to be recorded by a second CD, which doesnot contain the security marking of the present invention.

FIG. 29 shows a plurality of disc players, disc recorders and workstations connected to a global network, such as the Internet, via anInternet Service Provider, in accordance with one embodiment.

FIG. 30 shows a block diagram of the architecture through which one ormore security markings of the present invention are stored in anelectronic file, and are used for authenticating the existence of anon-pirated efile.

FIG. 31 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file,containing the security marking of the present invention, retrieved viathe Internet for playing.

FIG. 32 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file,containing the security marking of the present invention, retrieved viathe Internet for copying.

FIG. 33 is an illustration of the architecture of the combined Internet,POTS, and ADSL architecture for use with a product manufacturedaccording to the present invention in accordance with another embodiment

The same reference numerals refer to the same parts throughout thevarious Figures.

NOTATIONS AND NOMENCLATURES

The detailed description that follows may be presented in terms ofprogram procedures executed on a computer or network of computers. Theseprocedural descriptions and representations are the means used by thoseskilled in the art to most effectively convey the substance of theirwork to others skilled in the art.

A procedure is here, and generally, conceived to be a self-consistentsequence of steps leading to a desired result. These steps are thoserequiring physical manipulations of physical quantities. Usually, thoughnot necessarily, these quantities take the form of electrical ormagnetic signals capable of being stored, transferred, combined,compared and otherwise manipulated. It proves convenient at times,principally for reasons of common usage, to refer to these signals asbits, values, elements, symbols, characters, terms, numbers, or thelike. It should be noted, however, that all of these and similar termsare to be associated with the appropriate physical quantities and aremerely convenient labels applied to these quantities.

Further, the manipulations performed are often referred to in terms,such as adding or comparing, which are commonly associated with mentaloperations performed by a human operator. No such capability of a humanoperator is necessary, or desirable in most cases, in any of theoperations described herein which form part of the present invention;the operations are machine operations. Useful machines for performingthe operation of the present invention include general purpose digitalcomputers or similar devices.

The present invention also relates to an apparatus for performing theseoperations. This apparatus may be specially constructed for the requiredpurpose or it may comprise a general purpose computer as selectivelyactivated or reconfigured by a computer program stored in a computer.The procedures presented herein are not inherently related to aparticular computer or other apparatus. Various general purpose machinesmay be used with programs written in accordance with the teachingsherein, or it may prove more convenient to construct more specializedapparatus to perform the required method steps. The required structurefor a variety of these machines will appear from the description given.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention relates generally to a method of marking productsby introducing, into the polycarbonate composition, a predeterminedsubstance during the manufacturing stage of the product.

One application of the above is directed to the manufacture of datadiscs, such as CDs and DVDs, where there is a need for improved securityagainst piracy. Hence, this marking technique is helpful in preventingpiracy of data, such as audio and/or video data from data sources, suchas CDs and DVDs.

The specific types and/or quantities of isotopes of each tracingsubstance are used to indicate a specific marker, as described above,such as a specific lot number, batch number, manufacturer identity,shipping date, shipper, recipient and the like. The specific typesand/or quantities of isotopes may be determinable with respect to eachother and/or, alternatively, with respect to the total polycarbonatecomposition.

Optionally, the types and/or quantities of isotopes may be determined bya specific order of composition. Advantageously, the isotope number(s)is/are detectable using conventional spectrometry techniques.

In this regard, the present invention is grounded on the idea that datadiscs can be marked with one or more identifiers at a structural levelwith, for example, a substance introduced into the polycarbonate orpolystyrene composition that comprises each disc. Each disc can then belater distributed with one or more dissimilar identifiers or markings,which are preferably and optionally invisible to the eye andtransparent. Additionally, the markings would not affect the opticalqualities of the polycarbonate.

Generally, very small quantities of a tracing substance described beloware introduced into the polycarbonate, polystyrene and the like,composition. With respect to the issue of detecting a security markingthat could be determined by and/or related to the marking, there areseveral conventional techniques that are useful for substanceidentification and structure determination. An exemplary technique ismass spectrometry. Then, a mass spectrometry analysis, which is veryinexpensive, of the polycarbonate is performed to identify evidence ofheavy elements, for instance, that generally comprise the tracingsubstance(s).

The principles of mass spectral measurements are simple and easilyunderstood. A mass spectrometer bombards a substance under investigationwith an electron beam and quantitatively records the result as aspectrum of positive ion fragments. This record is a mass spectrum.These rapidly moving ions, which are usually positive, and resolved onthe basis of their mass-to-charge ratio.

The utility of mass spectrometry arises from the fact that theionization process generally produces a family of positive particleswhose mass distribution is characteristic of the parent species.Consequently, a mass spectrum of a particular substance providesinformation that is useful for determining chemical structures.

For instance, a unique molecular formula (or fragment formula) can oftenbe derived from a sufficiently accurate mass measurement alone, such ashigh-resolution mass spectrometry. This is possible because the atomicmasses are not integers. In this regard, a mass spectrum is apresentation of the masses of the positively charged fragments(including the molecular ion) versus their relative concentrations.

The most intense peak in the spectrum, called the base peak, is assigneda value of 100 percent, and the intensities (height times sensitivityfactor) of the other peaks, including the molecular ion peak, arereported as percentages of the base peak. Prior Art FIG. 6 illustrates agraphic presentation of a mass spectrum traced by a five-elementgalvanometer.

Because the task of finding a molecular formula by trial-and-error fromthe output of a high-resolution mass spectrometer is a tedious one,tables, algorithms and computer programs have been assembled for thispurpose. Unit mass resolution results and intensities of isotope peaksare used to arrive at molecular formulas. Consequently, computerizedmass spectrometry of a particular substance is a conventional techniquefor determining chemical structures.

Optionally and preferably, the mass spectrometry is used not only toidentify the existence or bare presence of the elements detected, butalso to identify the ratio of isotopes in any given element. Theaccuracy of mass spectrometry is very high for relatively inexpensivecosts. The accuracy would preferably not be a function of theconcentration amounts of each tracing substance with respect to thepolycarbonate, such as a dilution ratio, but rather the ratio betweenthe isotopes of the tracing substance itself.

Alternatively, or in addition thereto, the ratio of isotopes in eachtracing substance with respect to each other can be assayed to within 1or 2 percent accuracy. Scientifically, this means that for any givensubstance, by varying those isotopes, an accurate identification of abatch can actually be made.

If three or four tracing substances are used, and each substance hasthree or four different isotopes, then the number of permutations andcombinations would be very large, since each substance can be assayed towithin one or two percent accuracy. Exemplary substances that can beused may include transparent oxides of some of the heavier elements,such as silicate, a lead dioxide and tin.

The polycarbonate marking technique described herein can be used onvarious materials, and is not restricted to data discs like CDs andDVDs. For example, the marking technique and process for implementingsame, could be used in any material that uses polycarbonate. That is, itcould be used in products made of polycarbonate or polystyrene, such asCD cases, films or MYLAR. In addition, the marking technique of thepresent invention may also be used in plexiglass, eyeglasses,sunglasses, helmets and the like.

Moreover, an alternative and more sensitive method of analyzing and/orperforming spectrometry on substances is called neutron absorption, orneutron spectrometry. This method of spectrometry is becoming moreprevalent in use and is very accurate; within 0.1 percent accuracy. Thismethod is still applicable for analysis of heavy-typeelements/substances embedded in polycarbonate during the manufacturingprocess described below.

Another important aspect of the present invention is its practicalapplication as a quality control measure for products, such as CDs orDVDs. Reference is made to FIG. 7, which illustrates a block diagram ofthe overall distribution path of a polycarbonate product, such as a CDor DVD, from manufacture to distribution to a customer. For simplicity,the following steps are identified in the drawings by the letter “S”preceding the reference numeral; that is, Step 10 is shown in thedrawing as “S10”, etc.

At inception, each data disc is manufactured at a designated plant (Step10), before transportation to a record or disc pressing plant, where thepolycarbonate composition is pressed into the form of a CD or DVD, (Step12). From the pressing plant, the CDs or DVDs are forwarded/sold to adistribution center or wholesaler (Step 14), which dispatches theCDs/DVDs to retail outlets (Step 16), before ultimate delivery to acustomer.

As a mechanism for providing quality control, for example, each discmanufacturer may be given a certain type or well-known type of a tracingsubstance, such that the plant which assays the polycarbonate andtracing substance is considered the only authorized plant for the discsthe plant produces. Other manufacturers of the polycarbonate or presserswould not be considered authorized.

Alternatively, an optional intermediate step of disc analysis onoutgoing deliveries from a distribution center may be needed if adistribution center is positioned between the polycarbonate manufacturerand the pressing plant.

FIG. 8 illustrates the hierarchical relationship and the number ofentities involved in the overall distribution of polycarbonate products,like CDs, from manufacture to distribution to a customer. At 20 is shownthe approximate number of polycarbonate manufacturers in the world,which totals less than 10. At 22, is shown the approximate number ofdisc pressing plants, which totals in the vicinity of 400. The number ofpolycarbonate manufacturers is obviously relatively small compared withthe number of pressing plants, or the number of wholesalers (e.g.,400-10,000) as at 24, and the like.

At the bottom end of the hierarchy, as at 26, is shown the number ofdisc retailers, which approximates 1 million, and the number of discconsumers, as at 28, which ranges from 1 to 5 billion. Accordingly, thepresent invention targets the more realistic components in the data discdistribution chain; namely, the polycarbonate manufacturers andoptionally the disc pressing plants.

The impact of the present invention, with respect to piracy and qualitycontrol issues, can also be appreciated from current statistics shown inFIGS. 9 through 11, which depicts the alarming levels of the musicpiracy problem. FIG. 9 shows eight (8) countries where music piracy isof particular concern, along with data on the estimated capacity formanufacturing all data discs, and data on legitimate demand for all datadiscs. So, for instance, in Taiwan where total legitimate demand for CDROMs, audio and video CDs are 32 million units, the total manufacturingcapacity for all CDs is more than 10 fold, at 350 million units.

In FIG. 10, a listing of 10 countries and data on reported instances ofpiracy in 1996 is shown. According to the table, Russia leads Brazil,China, Italy, India and Mexico, in having the highest dollar value oflost revenues due to piracy, at $350 million US dollars. Other countrieson IFPI's top priority list for preventing music piracy are Argentina,Saudi Arabia, Greece and Malaysia.

FIG. 11 shows different levels of domestic piracy (in units) for Europe,the Middle East/Turkey, Asia, Africa, Australasia, Latin America andNorth America.

In this regard, the present invention provides a method/system fortracking instances of music piracy. Referring to FIG. 12, a process ofembedding a tracing substance in the polycarbonate composition at themanufacturing stage is illustrated. At Step 30, the raw materialscomprising the polycarbonate composition is provided. The tracingsubstance (Step 32) is also provided and is preferably at the isotopelevel, where various different quantities of isotopes are used. FIG. 12shows the tracing substance as being a heavy element isotope. Thespecific types and/or quantities of isotopes with respect to each other,are used to indicate a security marking, as described above.

Alternatively, the isotope ratio could be analyzed with respect to thetotal polycarbonate composition, or optionally to a specific order ofcomposition. The security marking can indicate a specific lot,manufacturer and the like. Advantageously, the isotope numbers aredetectable using spectrometry techniques.

Referring to FIG. 12, once the tracing substance, comprising one or moremarkers, is combined with the raw materials comprising a polycarbonatecomposition, the mixture is brewed chemically (Step 34), purified anddried (Step 36). Once dried, the mixture becomes a polycarbonate powder,which contains a tracing substance (Step 38).

In FIG. 13, this powder is liquified (Step 40), where the liquid isinjected into a mold (Step 42). Each CD or DVD is then pressed with thepolycarbonate-tracing substance composition (Step 44).

Advantageously, all this is generally stored, for example, on a centralor distributed database system, including spectrometry results performedon each disc or fraction of a disc that is suspected as being pirated.Accordingly, when mass or neutron spectrometry results are obtained,this information is fed to the database to find out additionalinformation associated with the object disc. Alternatively, a search forlot or batch information could be done manually on the spectrometryresults, albeit less efficiently.

For example, there are approximately 300 CD plants in the world.Additional facts that would be associated with a particularly marked CDmay include where the polycarbonate powder was manufactured, where thepolycarbonate batch was shipped for subsequent pressing, the identity ofthe plant, the date of manufacture or shipping, and the like. The lotdate collected may be, for example, the date at which the polycarbonatepower was manufactured and/or the date it was shipped to the pressingplant or an optional intermediary distributor. Similarly, themanufacturer could be making various lots of polycarbonate compositions,and the information collected may optionally be classified with aspecific lot.

That is, in the present invention, the lot identity, manufacture date,ship date, manufacturer identity, who it was shipped to, and the like,is collected to assist in determining piracy related issues. Inaddition, if there were intermediate steps, then data on theseintermediate steps may optionally be collected as well.

Data may also be embedded into the polycarbonate powder and/orassociated therewith in a database, and collected with respect todesignating certain lots for recording purposes, for example, such asfor a specific music originator. Alternatively, the polycarbonate powdermay be marked with information pertaining to where the lot/batch isgoing, and optionally with information directed to the specific music,title, group of titles, or other data to be pressed thereon by thepressing company.

The above information does not necessarily indicate whether a specificdata disc was, in fact, pirated. Rather the above information indicatesa source of origin of piracy for tracking purposes, and to determinewhether any patterns of piracy may be established. In this manner, themarking technique of the present invention, using a tracing substance orother suitable material, provides a trail to a manufacturer and possiblya pressing plant, once a pirated CD is found, or once a CD/DVD issuspected of being pirated. Thus, the present invention advantageouslyprovides evidence that a CD or DVD was dispatched to a particularpressing plant and manufacturer.

Additional information that may be collected may include informationdisclosed in U.S. Pat. No. 5,625,817 for the semiconductor manufacturingfor the present invention, which generally relates to quality controlissues, and which disclosure is incorporated herein by reference.

Various elements or substances may be used as a security marking, suchas transparent oxides of some of the heavier elements like a silicate,lead dioxide, tin, cadmium (e.g., cadmium 12) and iridium (iridium 5).Each of these elements advantageously have many isotopes.

Another alternative is a silicate composition that has similarproperties as glass; it is transparent, stable under high temperatures(e.g., 260 degrees Celsius) and the like. Similarly, a lead dioxide has,for example, 14 stable isotopes, small quantities of which will notsubstantially affect the appearance of a data disc.

Thus, in the present invention, any isotope or number of isotopes havingsimilar properties of the above may be used. In addition, anyconcentration amounts and/or relative concentration amounts (to the datadisc and/or to each other) of the isotopes or number of isotopes, may beused that effectuate the goals of the present invention. For example,there may be 10 suitable heavy elements, each of which has 4 to 8 stableisotopes, and each of the isotopes being able to be used at differentconcentration levels.

FIGS. 14 through 18 are illustrations of different compositioncombinations that may be used in the present invention as a securitymarking. FIG. 14 is an illustration of a first example of a tracingsubstance combination with different percentages of five elements A, B,C, D an E illustrated with respect to each other.

FIG. 15 is an illustration of a second example of a tracing substancecombination with the same elements A-E of FIG. 14, but with a differentorder of elements and different concentration percentages.

FIG. 16 is an illustration of a third example of a tracing substancecombination with the same elements A-E of FIG. 14, but with yet anotherdifferent order of elements and different concentration percentages.Here, element D has the highest composition concentration.

FIG. 17 is an illustration of a fourth example of a tracing substancecombination with the same elements A-E of FIG. 14 and with the sameorder, but with different concentration percentages.

FIG. 18 is an illustration of a fifth example of a tracing substancecombination with the same number of elements (e.g., 5), but withdifferent elements X, Y, P, R, and G, and differing concentrationpercentages.

FIG. 19 is an illustration of a sixth example of a tracing substancecombination with different elements A, B, D and E only, and withdifferent concentration percentages. Here, four elements comprise thecomposition, rather than five.

The above examples are exemplary structural composition combinationsthat can be used to comprise the tracing substance constituting asecurity marking. Moreover, the combinative use of the above differentcompositions may comprise the combination of one or more tracingsubstances where each tracing composition may constitute a separateand/or different security marking as desired, to indicate specific lot,polycarbonate or raw material manufacturer, date of manufacture, and thelike.

Alternatively, or in addition, the above different compositionsconstituting a plurality of security markings, may be encoded, therebyrequiring uncoding, or may be used as an authentication key in anencryption algorithm to derive the specific data associated with thetracking of the data disc and/or to determine whether the data disc isin fact authentic.

The present invention applies to CDs, DVDs and all classes of opticaldisc carriers. In addition, the present invention applies to the type ofmarking used in the organic polymer overcoating. Accordingly, thepresent invention is not just a tracing substance only security markingthat is mixed with the polycarbonate during manufacture of thepolycarbonate powder. Rather, it is possible to use the presentinvention as a marking technique for a polymer overcoating product aswell. The results for this alternative would be the same so thatspecified batch numbers and lots with the desired polymer overcoat canbe traced.

As indicated above, any substance or material may be used as the markingsubstance, as long as the substance provides stable, reliable andrepeatable performance over a substantial period of time. The selectionof the marking substance or material is preferably a very stablematerial, and it is very important that the marking material isnon-chemically reactive with the metalized glare.

For instance, free oxygen and chlorine and similar substances were earlyproblems with compact discs resulting in laser rot. Laser rot describesa condition in which a data disc coatings deteriorates by impuritiesgradually over time such that the discs would stop playing. On the otherhand, oxides are exemplary of substances that are very stable withheavier elements. Thus, the addition of the marking material isgenerally chemically stable and not cause deterioration of, for example,the standard metal reflective glare on the data disc, if present.

FIG. 20 is an illustration of a main central processing unit forimplementing the computer processing in accordance with a computerimplemented embodiment of the present invention. The proceduresdescribed above may be presented in terms of program procedures executedon, for example, a computer or network of computers.

Viewed externally in FIG. 20, a computer system designated by referencenumeral 140 has a central processing unit 142 having disc drives 144 and146. Disc drive indications 144, 146 are merely symbolic of a number ofdisc drives that might be accommodated by the computer system. Typicallythese would include a floppy disc drive such as 144, a hard disc drive(not shown externally) and a CD ROM indicated by slot 146. The numberand type of drives varies, typically with different computerconfigurations. Disc drives 144, 146 are in fact optional, and for spaceconsiderations, may be easily omitted from the computer system used inconjunction with the production process/apparatus described herein.

The computer also has an optional display 148 upon which information isdisplayed. In some situations, a keyboard 150 and a mouse 152 may beprovided as input devices to interface with the central processing unit142. Then again, for enhanced portability, the keyboard 150 may beeither a limited function keyboard or omitted in its entirety. Inaddition, mouse 152 may be a touch pad control device, or a track balldevice, or even omitted in its entirety as well. In addition, thecomputer system also optionally includes at least one infraredtransmitter 176 and/or infrared receiver 178 for either transmittingand/or receiving infrared signals, as described below.

FIG. 21 illustrates a block diagram of the internal hardware of thecomputer of FIG. 20. A bus 156 serves as the main information highwayinter-connecting the other components of the computer. CPU 158 is thecentral processing unit of the system, performing calculations and logicoperations required to execute a program. Read only memory (ROM) 160 andrandom access memory (RAM) 162 constitute the main memory of thecomputer. Disc controller 164 interfaces one or more disc drives to thesystem, bus 156. These disc drives may be floppy disc drives such as170, or CD ROM or DVD (digital video disc) drives such as 166, orinternal or external hard drives 168. As indicated previously, thesevarious disc drives and disc controllers are optional devices.

A display interface 172 interfaces display 148 and permits informationfrom the bus 156 to be displayed on the display 148. Again as indicated,display 148 is also an optional accessory. For example, display 148could be substituted or omitted. Communication with external devices,for example, the components of the apparatus described herein, occursusing communications port 174. For example, optical fibers and/orelectrical cables and/or conductors and/or optical communication (e.g.,infrared and the like) and/or wireless communication (e.g., radiofrequency (RF) and the like) can be used as the transport medium betweenthe external devices and communication port 174.

In addition to the standard components of the computer the computer alsooptionally includes at least one of infrared transmitter 176 or infraredreceiver 178. Infrared transmitter 176 is used when the computer systemis used in conjunction with one or more of the processingcomponents/stations that transmits/receives data via infrared signaltransmission.

FIG. 22 is a block diagram of the internal hardware of the computer ofFIG. 20 in accordance with a second embodiment. In FIG. 22, instead ofutilizing an infrared transmitter or infrared receiver, the computersystem uses at least one of a low power radio transmitter 180 and/or alow power radio receiver 182. The low power radio transmitter 180transmits the signal for reception by components of the productionprocess, and receives signals from the components via the low powerradio receiver 182. The lower power radio transmitter and/or receiver180, 182 are standard devices in industry.

FIG. 23 is an illustration of an exemplary memory medium which can beused with disc drives illustrated in FIGS. 20-22. Typically, memorymedia such as floppy discs, or a CD ROM, or a digital video disc willcontain, for example, a multi-byte locale for a single byte language andthe program information for controlling the computer to enable thecomputer to perform the functions described herein. Alternatively, ROM160 and/or RAM 162 illustrated in FIGS. 20-21 can also be used to storethe program information that is used to instruct the central processingunit 158 to perform the operations associated with the productionprocess.

Although processing system 140 is illustrated having a single processor,a single hard disc drive and a single local memory, processing system140 may suitably be equipped with any multitude or combination ofprocessors or storage devices. Processing system 140 may, in point offact, be replaced by, or combined with, any suitable processing systemoperative in accordance with the principles of the present invention,including sophisticated calculators (and hand-held), laptop/notebook,mini, mainframe and super computers, as well as processing systemnetwork combinations of the same.

Conventional processing system architecture is more fully discussed inComputer Organization and Architecture, by Williams Stallings, McMillanPublishing Co. (3rd ed. 1993); conventional processing system networkdesign is more fully discussed in Data Network Design, by Darren L.Spohn, McGraw-Hill, Inc. (1993), and conventional data communications ismore fully discussed in Data Communications Principles, by R. D. Gitlin,J. F. Hayes and S. B. Weinstein, Plenum Press (1992) and The IrwinHandbook of Telecommunications, by James Harry Green, Irwin ProfessionalPublishing (2nd ed. 1992). Each of the foregoing publications isincorporated herein by reference.

Alternatively, the hardware configuration may be arranged according tothe multiple instruction multiple data (MIMD) multiprocessor format foradditional computing efficiency. The details of this form of computerarchitecture are disclosed in greater detail in, for example, U.S. Pat.No. 5,163,131; Boxer, A., “Where Buses Cannot Go”, IEEE SPECTRUM,February 1995, pp. 41-45; and Barroso, L. A. et al., “RPM: A RapidPrototyping Engine for Multiprocessor Systems”, IEEE COMPUTER, February1995, pp. 26-34, all of which are incorporated herein by reference.

In alternate preferred embodiments, the above-identified processor, andin particular microprocessing circuit 158, may be replaced by orcombined with any other suitable processing circuits, includingprogrammable logic devices, such as PALs (programmable array logic) andPLAs (programmable logic arrays), DSPs (digital signal processors),FPGAs (field programmable gate arrays), ASICs (application specificintegrated circuits), VLSIs (very large scale integrated circuits) orthe like.

It is important to recognize that the security marking method and systemof the present invention, can be used for authentication purposes inorder to prevent unauthorized access to the data on the disc. FIG. 24 isillustrative. It shows a flow chart of the decision logic describing theauthentication process of a CD, containing a security marking, to beplayed on a CD player

For simplicity, the following steps are identified in the drawings bythe letter “S” preceding the reference numeral; that is, Step 50 isshown in the drawing as “S50”, etc.

In FIG. 24, the process begins at Step 50 when a CD is inserted into aCD player. The player begins reading the CD, (Step 52), by detectingbits from the disc's surface (Step 54). Once the data is recovered, thedata is modulated using, for example, eight-to-fourteen modulation (Step56). The demodulated data is sent to a buffer (Step 58).

At Step 60, (S60), the player's circuitry or processes must determinewhether the CD contains a predetermined tracing substance comprising thesecurity marking. If no security marking exists, the disc is determinedto be fraudulent (Step 62), and the disc player ends playback activity(Step 64). On the other hand, if it is found that the disc contains thepredetermined security marking, the player's circuitry is triggered tobegin the error removal process (Step 66) in which errors are removed,data is filtered (Step 68) and ultimately converted to sensible audibleoutput data (Steps 70, 72). While the above description focuses on aparticular sequence of process steps, the present invention mayalternatively be used via a different sequence of the above describedsteps.

FIG. 25 illustrates a flow chart of the decision logic describingoperations when a first CD, containing the security marking of thepresent invention, plays the data to be recorded by a second CD, whichdoes not contain the security marking of the present invention. Forsimplicity, the CD player will be referenced as player #1, and the CDrecorder will be referenced as recorder #2. Also, the first CD played byplayer #1 will be referenced as CD #1, and the second CD recorded byrecorder #2 will be referenced as CD #2.

At inception, (Step 80 or S80), CD player #1 is connected to the outputport of recorder #2, or other standard means for capturing the output ofplayer #1. Playback begins when CD #1 is inserted into player #1 (Step82). Recording begins when CD #2 is inserted into recorder #2 (Step 84).The next step in CD player #1 is the reading of CD #1, (Step 86), bydetecting bits contained on the surface of CD #1 (Step 88).

Once the data is recovered, the data is demodulated using, for example,eight-to-fourteen modulation or other standard modulation (Step 90). Thedemodulated data is transferred and stored in a buffer, (Step 92).

At Step 94 (S94) depicted in FIG. 24, it is determined whether the disccontains the security marking. If no security marking is detected, thedisc is determined to be fraudulent (Step 96), and the disc player endsplayback activity (Step 98), as earlier stated. See FIG. 25.

On the other hand, if it is found that the disc contains the securitymarking, the next Step 100, the player's circuitry is triggered to beginthe error removal process in which errors are removed, data is filtered(Step 102) and ultimately converted to sensible audible output data(Steps 104). See FIG. 27.

Referring to FIG. 28, at this juncture, the authentication process forplaying the CD is completed, and recorder #2 receives the audio datafrom CD #1 (Step 106). Upon receipt, CD recorder #2 records the dataonto CD #2, which is a copy (Step 108). If CD #2 is later inserted intoa CD player, it will be determined to be a fraudulent CD pursuant to theabove-mentioned process of FIG. 24, because CD #2 does not contain therequisite security marking, (Step 110).

FIG. 29 shows a plurality of disc players and disc recorders 186, 188,190, 192, 194, 196 and work stations 198, 200, 202 connected to a globalnetwork, such as the Internet 220, via an Internet Service Provider 204,in accordance with one embodiment. The above system also accommodatesInternet access to electronic audio/video data files through homeelectronic equipment, such as television/stereos 206 and cable/modem208. Thus, data may emanate from, or be transmitted to, any one of thesestations or devices.

FIGS. 30-31 shows the authentication process as it applies toInternet-related playing and copying. For instance, FIG. 30 shows ablock diagram of the architecture through which one or more securitymarkings are stored in an electronic file, and are used forauthenticating the existence of a non-pirated efile. The architecturebegins with a data media, which may be a CD, DVD, a computer or networkof computers, such as the Internet, capable of storing data.

In this embodiment, the data is an electronic video or audio data file(“efile”) 210 into which a predetermined tracing substance comprising asecurity marking is embedded therein.

The resulting data (“efile data”) 212 containing security marking(s) istransmitted into an authentication module 216 when efile 210 isrequested by a user over the Internet. Authentication module 216 isdisposed, for example, at the ISP's web site 214, which uses the tracingsubstance in efile data 212 for authenticating whether efile 210 is anon-pirated file. Once efile 210 is authenticated, authentication module216 transfers data 212 to a decoder web crawler 218, which intakes thedata, manipulates it, performs error correction and outputs correcteddata efile 219.

The above description is one example of the architecture used toimplement the present invention. Other architectures may also be used.For example, the ISP website and/or server need not physically house orcontain the authentication or decoder modules, but one or both of thesedevices may be disposed remote to the ISP website and/or server.

FIG. 31 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file retrievedvia the Internet for playing. The process begins at Step 112 (S112) whena user accesses music and/or video file(s) on the Internet via an ISP'sweb site 214. The ISP's decoder web crawler 218 begins reading the efile210, (Step 114), looking for one or more security markings. (Step 116).If no security marking is detected, efile 210 is determined to befraudulent, (Step 118), and efile 210 is not transmitted to the user;the process ends, (Step 120). Thus, unauthorized access is prevented.

On the other hand, if it is found that efile 210 contains a securitymarking, error correction occurs, (Step 122), the data is filtered,converted to sensible audio and/or video output data, and ultimatelytransmitted to the user at his/her computer (Step 124).

FIG. 32 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file,containing the security marking of the present invention, retrieved viathe Internet for copying. The process begins at Step 126 (S126) when auser accesses music and/or file(s) on the Internet via an ISP's web site214. The ISP's decoder web crawler 218 begins reading the efile 210(Step 128) looking for one or more security markings (Step 130). If nosecurity marking(s) is/are found, efile 210 is determined to befraudulent (Step 132), and efile 210 is not transmitted to the user; theprocess ends (Step 134). Thus, unauthorized access is prevented.

On the other hand, if it is found that efile 210 contains a securitymarking, error correction occurs (Step 136), the data is filtered,converted to, for example, audio and/or video output data, andultimately transmitted to the user (Step 138). The user's computerreceives efile 210, (Step 140) at which point a user may record theefile 120 (Step 142). This efile 210 is considered fraudulent forpurposes of future Internet use (S144), pursuant to the process outlinedin FIG. 31, because it does not contain a security marking forsubsequent authentication.

FIG. 33 is an illustration of the architecture of the combined Internet,POTS, and ADSL architecture for use in the present invention inaccordance with another embodiment. In FIG. 33, to preserve POTS and toprevent a fault in the ADSL equipment 254, 256 from compromising analogvoice traffic 226, 296 the voice part of the spectrum (the lowest 4 kHz)is optionally separated from the rest by a passive filter, called a POTSsplitter 258, 260. The rest of the available bandwidth (from about 10kHz to 1 MHZ) carries data at rates up to 6 bits per second for everyhertz of bandwidth from data equipment 262, 264, 294. The ADSL equipment256 then has access to a number of destinations including significantlythe Internet 268, and other destinations 270, 272.

To exploit the higher frequencies, ADLS makes use of advanced modulationtechniques, of which the best known is the discrete multitone technology(DST). As its name implies, ADSL transmits data asymmetrically—atdifferent rates upstream toward the central office 252 and downstreamtoward the subscriber 250.

Cable television providers are providing analogous Internet service toPC users over their TV cable systems by means of special cable modems.Such modems are capable of transmitting up to 30 Mb/s over hybridfiber/coax systems, which use fiber to bring signals to a neighborhoodand coax to distribute it to individual subscribers.

Cable modems come in many forms. Most create a downstream data streamout of one of the 6-MHZ television channels that occupy spectrum above50 MHZ (and more likely 550 MHz) and carve an upstream channel out ofthe 5-50 MHZ band, which is currently unused. Using 64-state quadratureamplitude modulation (64 QAM), a downstream channel can realisticallytransmit about 30 Mb/s (the oft-quoted lower speed of 10 Mb/s refers toPC rates associated with Ethernet connections). Upstream rates differconsiderably from vendor to vendor, but good hybrid fiber/coax systemscan deliver upstream speeds of a few megabits per second. Thus, likeADSL, cable modems transmit much more information downstream thanupstream.

The Internet architecture 220 and ADSL architecture 254, 256 may also becombined with, for example, user networks 222, 224, 228. As illustratedin this embodiment, users may access or use or participate in theadministration, or management computer assisted program in computer 240via various different access methods. In this embodiment, the variousdatabases 285, 286, 287 and/or 288, which may be used to store content,data and the like, are accessible via access to and/or by computersystem 240, and/or via Internet/local area network 220.

The above embodiments are only to be construed as examples of thevarious different types of computer systems that may be utilized inconnection with the computer-assisted and/or—implement process of thepresent invention.

Further, while the above description has focused on introducing atracing substance into a polycarbonate composition that is manufacturedinto a specific media, such as a CD, the security marking system of thepresent invention may also be used as a marking technique for a digitalbit stream that is in the process of being transmitted from anoriginating area or device to a destination device. In this situation,the digital bit stream would be marked with a specific code responsiveto the embedded markings on the data disc that were detected via one ormore of the above processes. Alternatively, or in addition, the derivedsecurity marking may be required to be uncoded, or may be used as anauthentication in an encryption algorithm to derive the specific dataassociated with the tracking of the data disc and/or to determinewhether the CD is, in fact, authentic.

Moreover, the exemplary authentication process disclosed herein may beused with the security marking system of the present invention toauthenticate a data stream or collection of data, as opposed-to, or inaddition to, authenticating a specific media that has been used to playthe data.

The many features and advantages of the invention are apparent from thedetailed specification. Thus, it is intended by the appended claims tocover all such features and advantages of the invention that fall withinthe true spirit and scope of the invention.

Further, since numerous modifications and variations will readily occurto those skilled in the art, it is not desired to limit the invention tothe exact construction illustrated and described. Accordingly, allsuitable modifications and equivalents may be resorted to as fallingwithin the scope of the invention.

1. A method for authenticating a data media storing data in order toprevent at least one of piracy, unauthorized access and unauthorizedcopying of said data media, wherein at least a data area of said mediais impregnated with at least one predetermined tracing substanceincluding a predetermined concentration of at least one of an isotope, aplurality of isotopes and a plurality of stable isotopes to form atleast one security marking used for at least one of tracking andauthenticating said data media, said method comprising the steps of: (a)detecting the at least one security marking in said data area of saiddata media (b) authenticating said data media responsive to saiddetecting step (a) using the at least one security marking; and (c)outputting said data stored on said data media as at least one of audio,video, audio data, video data and digital data substantially free ofsaid at least one security marking when the data media has beensuccessfully authenticated by said authenticating step (b).
 2. Theauthenticating method according to claim 1, and further including thestep of authenticating said data media via at least two differentsecurity markings, each of which successively must be authenticatedbefore said data is finally output via said outputting Step (C).
 3. Theauthenticating method according to claim 1, and further including thestep of authenticating said data media over a plurality interconnectedcomputer networks comprising at least one of a local network, globalnetwork and Internet.
 4. The authenticating method according to claim 1,wherein said step of detecting the at least one security markingcomprises detecting at least one af a transparent oxide of at least oneof a silicate, a lead dioxide, tin, cadmium 12 and iridium 5, orcombination thereof.
 5. The authenticating method according to claim 1,wherein said step of detecting the at least one security markingcomprises detecting using at least one of mass spectrometry, neutronabsorption and neutron spectrometry techniques.
 6. The authenticatingmethod according to claim 1, wherein said step of detecting the at leastone security marking comprises reading information from said data areaof said data media.
 7. A system for authenticating a data media storingdata in order to prevent at least one of piracy, unauthorized access andunauthorized copying of said data media, wherein as least a data area ofsaid media is impregnated with at least one predetermined tracingsubstance including a predetermined concentration of at least one of anisotope, a plurality of isotopes and a plurality of stable isotopes, toform at least one security marking used for at least one of tracking andauthenticating said data media, said system comprising; a sensor thatdetects the presence of the at least one security marking in said dataarea of said data media; a processor that is capable of authenticatingsaid data media using the at least one security marking; and a playbackdevice that is capable of outputting said data stored on said data mediaas at least one of audio, video, audio data, video data and digital datasubstantially free of said at least one security marking when the datamedia has been successfully authenticated.
 8. The system according toclaim 7, wherein said processor authenticates said data media via atleast two different security markings, each of which successively mustbe authenticated before said data is finally outputted.
 9. The systemaccording to claim 7, wherein said processor authenticates said datamedia over a plurality of interconnected computer networks comprising atleast one of a local network, global network and Internet.
 10. Thesystem according to claim 7, wherein said sensor detects the at leastone security marking by detecting at least one of a transparent oxide ofat least one of a silicate, a lead dioxide, tin, cadmium 12 and iridium5, or combination thereof.
 11. The system according to claim 7, whereinsaid sensor detects the at least one security marking by using at leastone of mass spectrometry, neutron absorption and neutron spectrometrytechniques.
 12. The system according to claim 7, wherein said sensordetects the at least one security marking by reading information fromsaid data area of said data media.
 13. The system according to claim 7,wherein said outputted at least one of said audio, video, audio data,video data and digital data is stored in said data area of said datamedia.
 14. A system for authenticating a data media storing data inorder to prevent at least one of piracy, unauthorized access andunauthorized copying of said data media, wherein at least a data area ofsaid media is impregnated with at least one predetermined tracingsubstance including a predetermined concentration of at least one of anisotope, a plurality of isotopes and a plurality of stable isotopes, toform at least one security marking used for at least one of tracking andauthenticating said data media, said system comprising: means fordetecting the at least one security marking in said data area of saiddata media means for authenticating said data media responsive to saidmeans for detecting using the at least one security marking; and meansfor outputting said data stored on said data media as at least one ofaudio, video, audio data, video data and digital data substantially freeof said at least one security marking when the data media has beensuccessfully authenticated by said means for authenticating.
 15. Thesystem according to claim 14, wherein said means for authenticatingauthenticates said data media via at least two different securitymarkings, each of which successively must be authenticated before saiddata is finally outputted.
 16. The system according to claim 14, whereinsaid means for authenticating authenticates said data media over aplurality of interconnected computer networks comprising at least one ofa local network, global network and Internet.
 17. The system accordingto claim 14, wherein said means for detecting the at least one securitymarking comprises means for detecting at least one of a transparentoxide of at least one of a silicate, a lead dioxide, tin, cadmium 12 andiridium 5 or combination thereof.
 18. The system according to claim 14,wherein said means for detecting the at least one security markingcomprises means for detecting using at least one of mass spectrometry,neutron absorption and neutron spectrometry techniques.
 19. The systemaccording to claim 14, wherein said means for detecting the at least onesecurity marking comprises means for reading information from said dataarea of said data media.
 20. The system according to claim 14, whereinsaid outputted at least one of said audio, video, audio data, video dataand digital data is stored in said data area of said data media.
 21. Acomputer readable medium for authenticating a data media storing data inorder to prevent at least one or piracy, unauthorized access andunauthorized copying of said data media, wherein at least a data area ofsaid media is impregnated with at least one predetermined tracingsubstance including a predetermined concentration or at least one of anisotope, a plurality of isotopes and a plurality of stable isotopes, toform at least one security marking used far at least one of tracking andauthenticating said data media, said computer readable mediumcomprising: computer readable instructions for detecting the at leastone security marking in said data area of said data media; computerreadable instructions for authenticating said data media responsive tosaid computer readable instructions for detecting using the at least onesecurity marking; and computer readable instructions for outputting saiddata stored on said data media as at least one of audio, video, audiodata, video data and digital data substantially free of said at leastone security marking when the data media has been successfullyauthenticated.
 22. The computer readable medium according to claim 21wherein said computer readable instructions for detecting the at leastone security marking comprises computer readable instructions fordetecting at least one of a transparent oxide of at least one of asilicate, a lead dioxide, tin, cadmium 12 and iridium 5, or combinationthereof.
 23. The computer readable, medium according to claim 21,wherein said computer readable instructions for detecting the at leastone security marking comprises computer readable instructions fordetecting using at lease one of mass spectrometry, neutron absorptionand neutron spectrometry techniques.
 24. The computer readable mediumaccording to claim 21, wherein said computer readable instructions fordetecting least one security marking comprises computer readableinstructions for detecting the at least one security from said data areaof said data media.
 25. The computer readable medium according to claim21, wherein said outputted at least one of said audio, video, audiodata, video data and digital data is stored in said data area of saiddata media.