Method and apparatus to inhibit copying from a record carrier

ABSTRACT

A technique to prevent illicit copying of a copy-protected CD-ROM into a computer-readable storage drive is presented. In accordance with the present invention, when an authentic copy-protected CD-ROM is inserted into a CD drive and the content of the copy-protected CD-ROM is installed onto a hard disk drive that is linked to the CD drive, the Central Processor Unit (CPU) executes the installer instructions residing in the CD-ROM to create a license file in the hard disk drive. For security reasons, the content of the CD-ROM (e.g., the executable file of the application) is encrypted. When the content of the CD-ROM is copied into the hard disk drive, it remains encrypted. The license file essentially acts as a timer to monitor a predetermined time interval that has been programmed into the license file. If a user attempts to launch the encrypted copied application residing in the hard drive at any time prior to the expiration of the predetermined time interval, the license file readily supplies the key code to enable a filter to decode the encrypted installed application thereby allowing the application to launch. At the expiration of the predetermined time interval, the license file withholds the key code therefore not allowing the installed application to be decrypted and successfully launched. The predetermined time interval can be reset by reinserting the copy-protected CD-ROM into the CD drive to reset the time interval.

FIELD OF THE INVENTION

The invention generally relates to copy protection and more particularlyto a method to prevent illicit copying of software from record carriersto computer-readable data storage drives.

BACKGROUND OF THE INVENTION

Despite its compact size, each Compact Disc (CD) in its many forms(e.g., CD-ROM, CD-R, CD-RW, CD-DA, CD-I, etc.) can be used to storeenormous amounts of data (i.e., 650 MB) including audio, text, softwarecodes, graphics, etc. In addition, CDs are subject to no mechanical wearand tear and are therefore very reliable. As a result, CDs have becomethe preferred portable data storage format in recent years. Indeed,software products (e.g., application software, video games, etc.) arecurrently distributed by software publishers almost exclusively onCD-ROM format. However, it is estimated that software and video gamepublishers lose billions of dollars worldwide to product piracy eachyear. While most CD-ROM software piracy losses are attributable tocounterfeiting by professional pirates, with the availability of CDRecordable (CD-R) drives at an affordable price, the average consumerscan now make perfect copies of CD-ROM originals for the price of a blankdisc.

One effective solution to the problem of unauthorized (illicit) softwarecopying is provided by Macrovision Corporation of Sunnyvale, Calif.through its C-dilla Subsidiary. This anti-copy solution involvesencrypting the executable file of the application (i.e., CD-ROM'ssoftware content) according to a production key and embedding a digitalsignature corresponding to the production key onto the CD-ROM duringmanufacturing. The hidden digital signature can only be detected usingspecial authentication software provided with the CD-ROM at boot-up.Upon detecting and authenticating the digital signature, information inthe digital signature is used as a key to decrypt the encryptedexecutable file of the software content thereby allowing the applicationto launch. If the digital signature is not detected, the encryptedexecutable file of application cannot be decrypted for launch. Thedigital signature is designed so that it cannot be copied. In otherwords, when a copy protected CD-ROM is copied to another CD or to acomputer-readable storage drive (e.g., computer hard drive), the digitalsignature cannot be transferred to the copied CD or storage drivethereby preventing the copied application from being launched. Hence, acopied CD is essentially useless.

On the other hand, although the digital signature is not transferred toa computer-readable data storage device when the content of acopy-protected CD-ROM is copied into the storage device, the copiedapplication can still be launched as long as the copy-protected CD-ROMremains in the CD-ROM drive because the digital signature residing inthe copy-protected CD-ROM can still be detected and authenticated. Byrequiring the copy-protected CD-ROM to remain in the CD-ROM drive forthe copied application in the storage device to be able to launch,illicit copying of a copy-protected CD-ROM into a storage device ofsomeone other than the rights-owner is prevented. A rights-owner isdefined as someone who is the rightful owner of the copy-protectedCD-ROM. At the same time, the ability of the rights-owner to copy thecontent of the copy-protected CD-ROM into his computer-readable datastorage device is basically preserved because, as the rights-owner, heis assumed to have the copy-protected CD-ROM readily available nearby.However, by requiring the copy-protected CD-ROM to be inserted into theCD-ROM drive each time to launch the copied application, the use of theCD-ROM drive may not be utilized by other applications. At the veryleast, this is an inconvenience. At worst, this prevents therights-owner from concurrently using multiple applications that arecopy-protected. Such inconvenience is exacerbated for laptop usersbecause they are now required to bring along the application softwareCD-ROMs while traveling. As a result, software publishers are tornbetween the desire to protect their intellectual property and the desireto supply the consumers with user-friendly products. In this difficultposition, the software publishers are faced with either lost revenuefrom the illicit copying of their products or lost revenue from losingmarket share.

Thus, a need exists for an improved method to discourage illicit copyingof a copy-protected CD-ROM into a computer-readable data storage devicewithout requiring the copy-protected CD-ROM to be inserted in the CD-ROMdrive to successfully launch the copied application from the datastorage device.

SUMMARY OF THE INVENTION

Accordingly, the present invention provides an improved method todiscourage illicit copying of a copy-protected CD-ROM into acomputer-readable data storage device without requiring thecopy-protected CD-ROM to be inserted in the CD-ROM drive to successfullylaunch the copied application from the data storage device.

The present invention meets the above need with a method to discourageillicit copying from a digital record carrier to a computer-readabledata storage device. As part of the method, the content of the digitalrecord carrier is encrypted. Next, determination is made as to whether apredetermined time interval has lapsed since the digital record carrierwas last inserted for use. If the predetermined time interval has notlapsed, the content of the digital record carrier that has beeninstalled onto the computer-readable data storage device is decryptedinto a random access memory thereby allowing the copied content tolaunch for use. Otherwise, if the predetermined time interval haslapsed, the content of the digital record carrier that has beeninstalled onto the computer-readable data storage device is preventedfrom being decrypted thereby not allowing the copied content to launchfor use. Under the present invention, re-inserting the digital recordcarrier resets the predetermined time interval.

All the features and advantages of the present invention will becomeapparent from the following detailed description of its preferredembodiment whose description should be taken in conjunction with theaccompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagram illustrating an exemplary CD-ROM 100 that iscopy-protected in accordance with the present invention.

FIG. 2 is a block diagram illustrating, as an example, computer system200 upon which the present invention may be practiced.

FIG. 3 is a chart illustrating the functions that the executed installerinstructions 110 perform when copy-protected CD-ROM 100 is inserted intoCD drive 209 for the first time.

FIG. 4 is a flow chart of the steps performed by license managementsystem 320.

FIG. 5 is a flow chart of the steps performed by executed filterinstructions 120.

DETAILED DESCRIPTION OF THE INVENTION

In the following detailed description of the present invention, numerousspecific details are set forth in order to provide a thoroughunderstanding of the present invention. However, it will be obvious toone skilled in the art that the present invention may be practicedwithout these specific details. In other instances well-known methods,procedures, components, and circuits have not been described in detailas not to unnecessarily obscure aspects of the present invention.Although the following description describes the present invention inthe context of preventing illicit copying of the content of a CD-ROM toa hard disk drive, it should be clear to a person of ordinary skill inthe art that the present invention can be used to prevent the illicitcopying from any type of optical record carrier such as CD-Digital Audio(CD-DA), CD-Recordable (CD-R), CD-Rewritable (CD-RW), Digital VersatileDisc (DVD), etc. to any type of computer-readable data storage deviceincluding hard disk drives, tape drives, and others.

In accordance with the present invention, when an authenticcopy-protected CD-ROM is first inserted into a CD drive, the CentralProcessor Unit (CPU) executes the installer instructions residing in theCD-ROM to automatically copy the encrypted application (i.e., encryptedmain application software) into the hard disk drive and to install alicense management system that is used to control license management andto detect the authentic copy-protected CD-ROM. For security reasons, thecontent of the CD-ROM (e.g., the executable file of the application andother relevant files are encrypted. Upon completing the installationphase, when the user attempts to launch the encrypted copied applicationresiding in the hard drive at any time prior to the expiration of thepredetermined time interval, the license management system readilysupplies the key to enable a filter to decode the encrypted copiedapplication thereby allowing the application to launch. Following theexpiration of the predetermined time interval or if the inserted CD-ROMcannot be authenticated, the license management system withholds the keytherefore not allowing the copied application to be decrypted andsuccessfully launched. When prompted by the shell, the predeterminedtime interval can be reset by reinserting the copy-protected CD-ROM intothe CD drive to reset the time interval.

In so doing, the present invention makes the CD drive available to therights-owner (i.e., the CD-ROM owner) for other applications while theapplication copied from the copy-protected CD-ROM is running. Thepresent invention also allows portable computer users to not having tocarry all of their copy-protected CD-ROMs on the road. At the same time,by requiring reinsertion of the copy-protected CD-ROM periodically, thecopy-protected CD-ROM is regularly required nearby thereby discouragingthe illicit copying of a copy-protected CD-ROM into a hard drive ofsomeone other than the rights-owner. This is because it is a majorinconvenience of the illicit copier to keep borrowing the copy-protectedCD-ROM from the rights-owner.

As an alternate embodiment, the key can be obtained through a remotetransaction via the Internet, the telephone, email, fax, etc. In thisembodiment, following the expiration of the predetermined time interval,the user can communicate with a known remote central depository,maintained by the software publisher or developer to obtain a key inexchange for some information (e.g., a password) to decrypt the copiedapplication thereby allowing it to be launched for use. The alternateembodiment, which also allows the rights-owner to enjoy most if not allof the benefits provided by the present invention as discussed above, isdesirable especially if the original CD-ROM is not available (e.g.,misplace) or if a directly connected CD-ROM drive is temporarilyunavailable.

Reference is now made to FIG. 1 illustrating an exemplary CD-ROM 100that is copy-protected in accordance with the present invention. Inaddition to an encrypted executable file of the application softwareproduct (not shown), copy-protected CD-ROM 100 stores at least installerinstructions 110 (not shown) and filter instructions 120 (not shown)that are needed to prevent illicit copying of CD-ROM 100 into a harddisk drive. To further prevent illicit copying of CD-ROM 100 to anotherCD, copy-protected CD-ROM 100 may further include embedded digitalsignature 130 (not shown) and authentication instructions 140 (notshown). In the preferred embodiment, digital signature 130 is added tothe Glass Master with the software publisher's content (e.g.,application) already in place using a Laser Beam Recorder (LBR) by amastering facility or replicator using the Master Interface Software(MIS) developed by Doug Carson Associates (DCA). Using the glass master,a CD Replicator can mass-produce Silver Discs with digital signature 130and the encrypted content ready for use by the consumers. Theaforementioned manufacturing steps are well known and should be obviousto a person of ordinary skill in the art.

Digital signature 130 is hidden and can only be detected using executedauthentication instructions 140. Upon detecting and authenticatingdigital signature 130, information in digital signature 130 is used as akey to decrypt the encrypted executable file of the software contentthereby allowing the application to launch. If digital signature 130 isnot detected, the encrypted executable file of application cannot bedecrypted for launch. Digital signature 130 is designed so that itcannot be copied. In other words, when copy protected CD-ROM 100 iscopied to another CD or to a computer-readable storage drive (e.g.,computer hard drive), the digital signature cannot be transferred to thecopied CD or storage drive thereby preventing the encrypted copiedapplication from being launched. In accordance with the presentinvention, a license file storing the decryption key/code derived fromdigital signature 130 is used to provide the decryption key/code tolaunch a copied application in a hard disk drive. Such license file andother components relevant to the present invention are discussed ingreater detail below.

Referring now to FIG. 2 illustrating a block diagram of exemplarycomputer system 200 upon which the present invention may be practiced.It is to be appreciated that computer system 200 is exemplary only andthat the present invention can operate within a number of differentcomputer systems and computerized devices including general-purposecomputer systems and others. In the following discussions of the presentinvention, certain processes and steps are realized as a series ofinstructions (e.g., software program) that reside within computerreadable storage devices and memory units of system 200 and executed byprocessor 201.

In general, computer system 200 upon which the present invention ispracticed comprises address/data bus 212 for conveying information andinstructions, central processor 201 coupled with bus 212 for processinginformation and instructions, a random access memory (RAM) 202 forstoring digital information and instructions, a read only memory (ROM)203 for storing information and instructions of a more permanent nature.In addition, computer system 200 further include hard disk drive 204 forstoring vast amounts of data such as the data copied from a CD-ROM, a CDdrive 209 for reading copy-protected CD-ROM 100 in accordance with thepresent invention, I/O interface 208 for interfacing with peripheraldevices (e.g., computer network, modem, etc.). Moreover, computer system200 may include display device 205 for displaying information to acomputer user, an alphanumeric input device 206 (e.g., keyboard), and acursor control device 207 (e.g., mouse, trackball, lightpen, etc.) forcommunicating user input information and command selections.

Reference is now made to FIG. 3 illustrating the functions that theexecuted installer instructions 110 perform when copy-protected CD-ROM100 is inserted into CD drive 209 for the first time. Installerinstructions 110 may be an executable file. When installer instructions110 are executed by central processor 201, the encrypted application(i.e., encrypted main application software) is automatically copied intohard disk drive 204. The executed installer instructions 110 alsoinstall license management system 320 onto the hard disk drive 204. Ingeneral, license management system 320 is designed to control licensemanagement and to detect an authentic copy-protected CD-ROM. Licensemanagement system 320 may be an executable file that is executed bycentral processor 201 whenever a user attempts to launch thecopy-protected application software. The implementation of installerinstructions 110 to carry out the aforementioned functions using systemfacilities available on computer system 200 should be obvious to aperson of ordinary skill in the art. Hence, specific detail of suchimplementation is not further discussed for brevity and simplicity sake.

Referring now to FIG. 4 illustrating a flow diagram of the licensemanagement system 320. When a user attempts to launch the copy-protectedapplication software, central processor 201 executes shell program 330to determine whether a correct copy-protected CD-ROM (e.g., a CD-ROMwhose identification number matches the application software content inthe CD-ROM) is in CD drive 209 (step 410). If a correct copy-protectedCD-ROM cannot be ascertained, shell program 450 (not shown) prompts forthe correct CD-ROM (step 413) before continues the monitoring.Otherwise, if a correct copy-protected CD-ROM is ascertained, executedshell program 450 determines whether a valid license file 460 (notshown) has already been created for CD-ROM 100 carrying the applicationsoftware (step 415). If license file-420 has already existed, executedshell program 450 updates the information in license file 460 (step420). Otherwise, if license file 460 has not been created, executedshell program 450 creates a new license file 460 in hard disk drive 204(step 425).

License file 420 is essentially a data file that includes the value ofthe predetermined time interval, the time and date when copy-protectedCD-ROM 100 was last inserted into CD-ROM drive 209, the present time anddate, the identity of the software product in copy-protected CD-ROM 100,the software product's protection information, and others. When CD-ROM100 is first inserted into hard disk drive 204, the time and date atthat moment is recorded in license file 420 as the time and date whenCD-ROM 100 was last inserted. At each subsequent insertion of CD-ROM100, the installer instructions update the time and date when CD-ROM 100was last inserted. In the preferred embodiment, the present time anddate is updated every 20 minutes. Accordingly, using the storedinformation on the time and date when CD-ROM 100 was last inserted andthe present time and date, a determination of whether the predeterminedtime interval has been reached can be made (step 425). Hence, the mainfunction of the license file is to monitor the time duration sincecopy-protected CD-ROM 100 was last inserted into CD-ROM drive 209.

For security reason, the license file is also encrypted to preventunauthorized access to the predetermined time interval and/or thepresent time and date. The exact encryption method employed is notimportant as long as its identity is kept confidential from hackers forsecurity reasons. This is so because access to the aforementionedinformation means that the information may be altered to defeat thecopy-protected aspect of the present invention. For example, thepredetermined time interval, the time and date when CD-ROM 100 was lastinserted, and/or the present time and date can be changed to fool thesystem into thinking that the time interval has not expired. Theidentity of the software product may be a code name or number and isused to ensure that the proper CD-ROM is inserted before access to thelicense file is allowed for alteration. This prevents a hacker to getaccess to the license file by using a different copy-protected CD-ROM.In the preferred embodiment, product protection information is adecryption code/key used in decrypting the application. Such decryptioncode/key is derived from digital signature 130 that was embedded inCD-ROM 100 during manufacturing. When digital signature 130 is detectedby authentication instruction 140, which may be an executable file,during the detection and authentication process, it is passed to shellprogram 450 to record into the license file as the decryption code/key.In an alternate embodiment, the code/key can be obtained through aremote transaction via the Internet, the telephone, email, fax, etc. Inthis alternate embodiment, following the expiration of the predeterminedtime interval, the user can communicate with a known remote centraldepository, maintained by the software publisher or developer to obtaina code/key in exchange for some information (e.g., a password) or alicense fee to use in decrypting the copied application thereby allowingit to be launched for use. Such remote central depository may be a keycomputer server connecting to the World Wide Web if the transaction isan Internet transaction. Such remote central depository may also be adata base operated by a service operator if the transaction is a manualone that involves the use of telephone, email, fax, etc. The alternateembodiment, which also allows the rights-owner to enjoy most if not allof the benefits provided by the present invention as discussed above, isdesirable especially if the original CD-ROM is misplaced. Theimplementation of shell program 450 to carry out the aforementionedfunctions using system facilities available on computer system 200should be obvious to a person of ordinary skill in the art. Hence,specific detail of such implementation is not further discussed forbrevity and simplicity sake.

The executable file of the software application is encrypted prior tomanufacturing of CD-ROM 100. In so doing, the copied application cannotbe launched from the hard disk drive unless a valid license file ispresent in order to allow the application to be decrypted. In accordancewith the present invention, decryption is allowed only if the set timeinterval has not expired. In the preferred embodiment, decryption iscarried out using filter instructions 120 which may be an executablefile. In the preferred embodiment, encrypted files are decrypted byexecuting filter instructions 120 to perform as an operating systemfilter into RAM 202 (not hard disk drive 204). As such, the decryptionis performed on in real time. In other words, the parts of an encryptedfile are decrypted as the operating system requests it. Filterinstructions 120 are enabled to decrypt only if the set time intervalhas not expired. Preferably, filter instructions 120 are enabled inresponse to the decryption code/key that is provided by the licensefile. The license management system makes available the decryptioncode/key only if the set predetermined time interval is not yet expired(step 430). Otherwise, if the time interval has already expired, thelicense management system does not make available the decryptioncode/key to the filter but rather prompts the user to re-insertcopy-protected CD-ROM 100 by going back to step 413. Filter instructions120 may be installed from CD-ROM 100 onto hard disk drive 204. Whenenabled by the decryption code/key and executed by central processor201, filter instructions 120 decrypt the encrypted executable file forthe application.

Referring now to FIG. 5 illustrating the steps performed by filterinstructions 120 when executed by central processor 201. In step 505,filter instructions 120 monitor the input to determine whether thedecryption code/key from the license file has been received. If thedecryption code/key has not been received, filter instructions 120continue to monitor the input. Otherwise, the decryption code/key hasbeen received, filter instructions compare the code/key received with aninternal stored code/key to determine whether there is a match (step510). If there is no match indicating an error condition (e.g., someonemay have tampered with the license file, etc.), filter instructions 120reject the encryption code/key and aborts the effort to decrypt theencrypted executable file of the application (step 515). Otherwise, ifthere is a match, filter instructions 120 perform the reverse of theencrypted steps that were carried out to encrypt the executable file ofthe application (step 520). Because the software developers were theones who encrypted the application, they know the encrypted steps.Accordingly, decrypted steps to basically reverse to process can easilybe implemented into filter instructions 120. As an example, a simplisticencryption of the executable file of the application may involveinverting the binary values of the executable file. Hence, to decryptthe encrypted executable file simply involves inverting the binaryvalues of the encrypted executable file back to their original values.The implementation of filter instructions 120 to perform theaforementioned functions using system facilities available on computersystem 200 should be obvious to a person of ordinary skill in the art.Hence, specific detail of such implement is not further discussed forbrevity and simplicity sake.

The preferred embodiment of the present invention, a technique todiscourage illicit copying of a copy-protected CD-ROM into acomputer-readable data storage device without requiring thecopy-protected CD-ROM to be inserted in the CD-ROM drive to successfullylaunch the installed application from the storage drive, is thusdescribed. While the present invention has been described in particularembodiments, the present invention should not be construed as limited bysuch embodiments, but rather construed according to the below claims.

1-18. (canceled)
 19. A method to discourage illicit copying from adigital record carrier playable upon a drive to a computer-readable datastorage device, wherein at least a portion of a content of the digitalrecord carrier is encrypted, the method comprising: copying the contentof the digital record carrier to the computer-readable data storagedevice upon insertion of the digital record carrier into the drive;monitoring whether a predetermined time interval has lapsed since thedigital record carrier was inserted into the drive; if the predeterminedtime interval has not lapsed, decrypting the content of the digitalrecord carrier that has been copied thereby allowing the copied contentto launch for use with the digital record carrier not inserted in thedrive; and if the predetermined time interval has lapsed, preventing thecontent of the digital record carrier that has been copied from beingdecrypted thereby not allowing the copied content to launch for use. 20.The method of claim 19, further comprising re-inserting the digitalrecord carrier into the drive to reset the predetermined time interval.21. The method of claim 19, wherein a digital signature is embedded intothe digital record carrier and wherein the digital signature is nottransferable during the copying of the digital record carrier to anotherdigital record carrier or to the computer-readable data storage device,and further comprising: if the digital signature is detected andauthenticated, decrypting the content of the digital record carrierthereby allowing the content of the digital record carrier to belaunched for use; and if the digital signature is not detected andauthenticated, preventing the content of the digital record carrier frombeing decrypted thereby not allowing the content of the digital recordcarrier to be launched for use.
 22. The method of claim 20, wherein themonitoring includes: creating a file for storing a predetermined timeinterval value, time information on when the digital record carrier wasinserted, current time information, a decryption code or key, andidentification information for the digital record carrier; determiningwhether the predetermined time interval has lapsed; providing thedecryption code or key if the predetermined time interval has notlapsed; and withholding the decryption code or key if the predeterminedtime interval has lapsed.
 23. The method of claim 22, wherein the fileis encrypted.
 24. The method of claim 23, wherein the decryption code orkey is obtained from the file.
 25. The method of claim 23, wherein thedecryption code or key is obtained from a remote depository.
 26. Themethod of claim 23, wherein the current time information is updatedevery 20 minutes.
 27. The method of claim 23, wherein the decryptingincludes using the decryption code or key when made available to enablea filter to decrypt the content of the digital record carrier that hasbeen installed onto the computer-readable data storage device into arandom access memory.
 28. The method of claim 19, wherein the digitalrecord carrier is a CD or DVD.
 29. A digital record carrier playableupon a drive and storing an encrypted content having at least a portionencrypted, the record carrier further storing instructions, that whenexecuted by a processor following insertion of the digital recordcarrier into the drive and a copying of the content of the digitalrecord carrier into a computer-readable data storage device upon theinsertion of the digital record carrier into the drive, the instructionsinclude monitoring whether a predetermined time interval has lapsedsince the digital record carrier was inserted into the drive, if thepredetermined time interval has not lapsed, decrypting the copiedcontent of the digital record carrier thereby allowing the copiedcontent to launch for use with the digital record carrier not insertedin the drive, and if the predetermined time interval has lapsed,preventing the copied content of the digital record carrier from beingdecrypted thereby not allowing the copied content to launch for use. 30.The digital record carrier of claim 29, wherein the predetermined timeinterval is reset by re-inserting the digital record carrier into thedrive.
 31. The digital record carrier of claim 30, wherein themonitoring includes installing a file in the computer-readable datastorage device, the file storing a predetermined time interval value,time information on when the digital record carrier was inserted,current time information, a decryption code or key, and identificationinformation for the digital record carrier, the file determining whetherthe predetermined time interval has lapsed, and if the predeterminedtime interval has not lapsed, the file providing the decryption code orkey, and if the predetermined time interval has lapsed, the filewithholding the decryption code or key.
 32. The digital record carrierof claim 31, wherein the file is encrypted.
 33. The digital recordcarrier of claim 32, wherein the decryption code or key is obtained fromthe file.
 34. The digital record carrier of claim 32, wherein thedecryption code or key is obtained from a remote depository.
 35. Thedigital record carrier of claim 32, wherein the current time informationis updated every 20 minutes.
 36. The digital record carrier of claim 32,wherein the decrypting includes using the decryption code or key whenmade available to enable a filter to decrypt the content of the digitalrecord carrier that has been installed onto the computer-readable datastorage device into a random access memory.
 37. The digital recordcarrier of claim 29, having a digital signature embedded into thedigital record carrier during manufacturing wherein the digitalsignature is not transferable during the copying of the digital recordcarrier to another digital record carrier or to the computer-readabledata storage device, wherein if the digital signature is detected andauthenticated, the instructions, when executed by the central processor,include decrypting the content of the digital record carrier therebyallowing the content of the digital record carrier to be launched foruse, and if the digital signature is not detected and authenticated, theinstructions, when executed by the central processor, preventing thecontent of the digital record carrier from being decrypted thereby notallowing the content of the digital record carrier to be launched foruse.
 38. The digital record carrier of claim 29, wherein the digitalrecord carrier is a CD or DVD.
 39. A method to inhibit copying from adigital record carrier playable upon a drive to a computer-readable datastorage device, wherein at least a portion of a content of the digitalrecord carrier is encrypted, the method comprising: copying the contentof the digital record carrier to the computer-readable data storagedevice upon insertion of the digital record carrier into the drive;monitoring whether a predetermined time interval has lapsed since thedigital record carrier was inserted into the drive; if the predeterminedtime interval has not lapsed, decrypting the content of the digitalrecord carrier that has been copied thereby allowing use of theinstalled content with the digital record carrier not inserted in thedrive; and if the predetermined time interval has lapsed, preventing thecontent of the digital record carrier that has been copied from beingdecrypted thereby not allowing use of the content.
 40. The method ofclaim 39, further comprising re-inserting the digital record carrierinto the drive to reset the predetermined time interval.
 41. The methodof claim 39, wherein a digital signature is embedded into the digitalrecord carrier wherein the digital signature is not transferable duringcopying of the digital record carrier to another digital record carrieror to the computer-readable data storage device, and further comprising:if the digital signature is detected and authenticated, decrypting thecontent of the digital record carrier thereby allowing the content ofthe digital record carrier to be launched for use; and if the digitalsignature is not detected and authenticated, preventing the content ofthe digital record carrier from being decrypted thereby not allowing thecontent of the digital record carrier to be launched for use.
 42. Themethod of claim 40, wherein the monitoring includes: creating a file forstoring a predetermined time interval value, time information on whenthe digital record carrier was inserted into the drive, current timeinformation, a decryption code or key, and identification informationfor the digital record carrier; determining whether the predeterminedtime interval has lapsed; providing the decryption code or key if thepredetermined time interval has not lapsed; and withholding thedecryption code or key if the predetermined time interval has lapsed.43. The method of claim 41, wherein the file is encrypted.
 44. Themethod of claim 42, wherein the decryption code or key is obtained fromthe file.
 45. The method of claim 43, wherein the current timeinformation is updated every 20 minutes.
 46. The method of claim 43,wherein the decryption code or key is obtained from a remote depository.47. The method of claim 43, wherein the decrypting includes using thedecryption code or key when made available to enable a filter to decryptthe content of the digital record carrier that has been installed ontothe computer-readable data storage device into a random access memory.48. The method of claim 39, wherein the digital record carried is a CDor DVD.
 49. A digital record carrier playable upon a drive and storingcontent at least a portion of which is encrypted, the digital recordcarrier further storing instructions that when executed by a processorfollowing insertion of the digital record carrier into the drive andinstallation of the content of the digital record carrier into acomputer-readable data storage device upon the insertion of the digitalrecord carrier into the drive, the instructions include monitoringwhether a predetermined time interval has lapsed since the digitalrecord carrier was inserted in the drive, and if the predetermined timeinterval has not lapsed, the instructions decrypt the copied content ofthe digital record carrier thereby allowing the copied content to beused with the digital record carrier not inserted in the drive, and ifthe predetermined time interval has lapsed, the instructions prevent thecopied content of the digital record carrier from being decryptedthereby not allowing the installed content to be used.
 50. The digitalrecord carrier of claim 49, wherein the predetermined time interval isreset by re-inserting the digital record carrier into the drive.
 51. Thedigital record carrier of claim 50, wherein the instructions thatperform the monitoring install a file in the computer-readable datastorage device, the file storing a predetermined time interval value,time information on when the digital record carrier was inserted intothe drive, current time information, a decryption code or key, andidentification information for the digital record carrier, the filedetermining whether the predetermined time interval has lapsed, and ifthe predetermined time interval has not lapsed, the file providing thedecryption code or key, and if the predetermined time interval haslapsed, the file withholding the decryption code or key.
 52. The digitalrecord carrier of claim 51, wherein the file is encrypted.
 53. Thedigital record carrier of claim 52, wherein the decryption code or keyis obtained from the file.
 54. The digital record carrier of claim 52,wherein the decryption code or key is obtained from a remote depository.55. The digital record carrier of claim 52, wherein the current timeinformation is updated every 20 minutes.
 56. The digital record carrierof claim 52, wherein decrypting includes using the decryption code orkey when made available to enable a filter to decrypt the content of thedigital record carrier that has been installed onto thecomputer-readable data storage device into a random access memory. 57.The digital record carrier of claim 49, having a digital signatureembedded into the digital record carrier wherein the digital signatureis not transferable during the copying of the digital record carrier toanother digital record carrier or to the computer-readable data storagedevice, wherein if the digital signature is detected and authenticated,the instructions, when executed by the central processor, includedecrypting the content of the digital record carrier thereby allowingthe content of the digital record carrier to be launched for use, if thedigital signature is not detected and authenticated, the instructions,when executed by the central processor, preventing the content of thedigital record carrier from being decrypted thereby not allowing thecontent of the digital record carrier to be launched for use.
 58. Thedigital record carrier of claim 49, wherein the digital record carrieris a CD or DVD.