Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same

ABSTRACT

A method authenticates at least one of a media and data stored on said media in order to prevent at least one of piracy, unauthorized access and unauthorized copying of the data stored on said media. At least one predetermined error is introduced with the data resulting in mixed data. The mixed data is optionally stored on the media. The at least one predetermined error includes at least one authentication key or component thereof, for authenticating whether the media and/or data is authorized. The method includes the following sequential, non-sequential and/or sequence independent steps: reading the mixed data from the media, detecting the at least one predetermined error from the mixed data, and comparing the at least one predetermined error to the at least one authentication key or component thereof. The method also includes the steps of authenticating the media and/or the data in the mixed data responsive to the comparing, removing the at least one predetermined error from the mixed data resulting in substantially the data, and outputting the data as at least one of audio, video, audio data, video data and digital data substantially free of the at least one predetermined error.

RELATED APPLICATIONS

This application is a continuation of and claims priority from U.S.patent application Ser. No. 10/660,547 filed on Sep. 12, 2003 and issuedas U.S. Pat. No. 7,069,246 on Jun. 27, 2006, which is a continuation ofU.S. patent application Ser. No. 09/315,012 filed on May 20, 1999 andissued as U.S. Pat. No. 6,684,199 on Jan. 27, 2004, which claimspriority from U.S. Provisional Application No. 60/086,132, filed on May20, 1998, all of which are incorporated herein by reference.

FIELD OF INVENTION

This invention relates generally to anti-data pirating technology. Morespecifically, the invention relates to a method and system forpreventing piracy and/or unauthorized access and/or unauthorized copyingof data, such as audio and/or video data from a data source, such ascompact discs (CDs), digital versatile discs (DVDs), hard drive discs,an Internet Service Provider (ISP), and other data discs and/or datasources via direct connection, or via a local and/or global network,such as the Internet.

BACKGROUND OF THE INVENTION

There are two basic methods for recording sound and music—analog anddigital. See e.g. Ken C. Pohlmann, “The Compact Disc”, THE COMPUTERMUSIC & DIGITAL AUDIO SERIES, Volume 5. The above-mentioned audioseries, which was published by A-R Editions, Inc., in Madison, Wis., is,along with all volumes therein, incorporated by reference.

In analog recording, the recording medium (a tape) varies continuouslyaccording to the sound signal. In other words, an analog tape storessound signals as a continuous stream of magnetism. The magnetism, whichmay have any value within a limited range, varies by the same amount asthe sound signal voltage.

In digital recording, the sound signal is sampled electronically andrecorded as a rapid sequence of separately coded measurements. In otherwords, a digital recording comprises rapid measurements of a soundsignal in the form of on-off binary codes represented by ones and zeros.In this digital system, zeros are represented by indentations or pits ina disc surface, and ones are represented by unpitted surfaces or landreflections of the disc, such that a compact disc contains a spiraltrack of binary codes in the form of sequences of minute pits producedby a laser beam.

Music that is input to a digital recording and the requisite series ofreproduction processes, must pass through the recording side of a pulsecode modulation (PCM) system. A master recording of the music is storedin digital form on a magnetic tape or optical disc. Once the magnetictape has been recorded, mixed and edited, it is ready for reproductionas a CD. The CD manufacturer then converts the master tape to a masterdisc, which is replicated to produce a desired number of CDs. At the endof the PCM system is the reproduction side, the CD player, which outputsthe pre-recorded music.

If digital technology is used in all intermediate steps between therecording and reproduction sides of the PCM system, music remains inbinary code throughout the entire chain; music is converted to binarycode when it enters the recording studio, and stays in binary code untilit is converted back to analog form when it leaves the CD player and isaudible to a listener. In most CD players, digital outputs therefrompreserve data in its original form until the data reaches the poweramplifier, and the identical audio information recorded in the studio isthereby preserved on the disc.

Optical Storage

The physical specifications for a compact disc system are shown in PriorArt FIG. 1. They were developed jointly by Sony and Philips, and aredefined in the standards document entitled Red Book, which isincorporated herein by reference. The CD standard is also contained inthe International Electrotechnical Commission standard entitled, CompactDisc Digital Audio System, also incorporated herein by reference. Discmanufacturers, as well as CD player manufacturers, generally use thesespecifications.

All disc dimensions, including those pertaining to pit and physicalformations, which encode data, are defined in the CD standard. Forexample, specifications information on sampling frequency, quantizationword length, data rate, error correction code, and modulation scheme areall defined in the standard. Properties of the optical system that readsdata from the disc using a leaser beam are also defined in the standard.Moreover, basic specifications relevant to CD player design are locatedin the signal format specifications.

Referring to Prior Art FIG. 2, the physical characteristics of thecompact disc surface structure are described. Each CD is less than 5inches in diameter whose track thickness is essentially thinner than ahair and whose track length averages approximately 3 and a half miles.The innermost portion of the disc is a hole, with a diameter of 15 mm,that does not hold data. The hole provides a clamping area for the CDplayer to hold the CD firmly to the spindle motor shaft.

Data is recorded on a surface area of the disc that is 35.5 mm wide. Alead-in area rings the innermost data area, and a lead-out area ringsthe outermost area. Both lead-in and lead-out areas contain non-audiodata used to control the CD player. Generally, a change in appearance inthe reflective data surface of a disc marks the end of musicalinformation.

A transparent plastic substrate comprises most of the CD's 1.2 mmthickness. Viewing a magnified portion of the CD surface, as shown inPrior Art FIG. 2, the top surface of the CD is covered with a very thinmetal layer of generally aluminum, silver or gold. Data is physicallycontained in pits impressed along the CD's top surface. Above thismetalized pit surface and disc substrate, lies another thin protectivelacquer coating (10 to 30 micrometers). An identifying label (5micrometers) is printed on top of the lacquer coating. A system ofmirrors and lenses sends a beam of laser light to read the data. A laserbeam is applied to the underside of a CD and passes through thetransparent substrate and back again. The beam is focused on themetalized data surface that is sandwiched or embedded inside the disc.As the disc rotates, the laser beam moves across the disc from thecenter to the edge. This beam produces on-off code signals that areconverted into, for example, a stereo electric signal.

The Pit Track

Prior Art FIG. 3 shows a typical compact disc pit surface. Each CDcontains a track of pits arranged in a continuous spiral that runs fromthe inner circumference to the outer edge. The starting point begins atthe inner circumference because, in some manufacturing processes, tracksat the outer diameter of a CD are more generally prone to manufacturingdefects. Therefore, CDs with shorter playing time provide a greatermanufacturing yield, which has led to adoption of smaller diameter discs(such as 8 cm CD-3 discs) or larger diameter discs (such as 20 and 30 cmCD-Video discs).

Prior Art FIG. 4 shows a diagram of a typical track pitch. The distancebetween successive tracks is 1.6 micrometers. That adds up toapproximately 600 tracks per millimeter. There are 22,188 revolutionsacross a disc's entire signal surface of 35.5 millimeters. Hence, a pittrack may contain 3 billion pits. Because CDs are constructed in adiffraction-limited manner—creating the smallest formations of the wavenature of light—track pitch acts as a diffraction grating; namely, byproducing a rainbow of colors. In fact, CD pits are among the smallestof all manufactured formations.

The linear dimensions of each track on a CD is the same, from thebeginning of a spiral to the end. Consequently, each CD must rotate withconstant linear velocity, a condition whereby uniform relative velocityis maintained between the CD and the pickup.

To accomplish this, the rotational speed of a CD varies depending on theposition of the pickup. The disc rotates at a playing speed which variesfrom 500 revolutions per minute at the center, where the track starts,to 200 revolutions per minute at the edge. This difference in speed isaccounted for by the number of tracks at each position.

For example, because each outer track revolution contains more pits thaneach inner track revolution, the CD must be slowed down as it plays inorder to maintain a constant rate of data. So, when the pickup isreading the inner circumference of the CD, the disc rotates at thehigher speed of 500 rpm. And as the pickup moves outwardly towards thedisc's edge, the rotational speed gradually decreases to 200 rpm. Thus,a constant linear velocity is maintained, such that all of the pits areread at the same speed. The CD player constantly reads fromsynchronization words from the data and adjusts the disc speed to keepthe data rate constant.

A CD's constant linear velocity (CLV) system is significantly differentfrom an LP's system. A major difference stems from the fact that aturntable's motor rotates at a constant velocity rate of 33−⅓ grooves.This translates into outer grooves having a greater apparent velocitythan inner grooves, probably explained by the occurrence thathigh-frequency responses of inner grooves are inferior to that of outergrooves. If a CD used constant angular velocity (CAV) as opposed to theCLV system, pits on the outside diameter would have to be longer thanpits on the inner diameter of the disc. This latter scenario wouldresult in decreased data density and decreased playing time of a CD.

Like constant linear velocity, light beam modulation is also importantto the optical read-out system that decodes the tracks. See Prior ArtFIG. 5. A brief theoretical discussion on the distinctions between pitand land light travel explains this point.

Generally, when light passes from one medium to another with a differentindex of refraction, the light bends and its wavelength changes. Thevelocity at which light passes is important, because when velocity isslow, the beam bends and focusing occurs. Owing to several factors, suchas the refractive index, disc thickness and laser lens aperture, thelaser beam's size on the disc surface is approximately 800 μm. However,the laser beam is focused to approximately 1.7 μm at the pit surface. Inother words, the laser beam is focused to a point that is a littlelarger than a pit width. This condition minimizes the effects of dust orscratches on the CD's outer surface, because the size of dust particlesor scratches are effectively reduced along with the laser beam. Anyobstruction less than 0.5 ml are essentially insignificant and causes noerror in the readout.

As previously noted, a CD's entire pit surface is metalized. Inaddition, the reflective flat surface between each pit, (i.e. a land),causes almost 90 percent of laser light to be reflected back into thepickup. Looking at a spiral track from a laser's perspective on theunderside of a disc, as shown in Prior Art FIG. 5, pits appear as bumps.The height of each bump is generally between 0.11 and 0.13 μm, such thatthis dimension is smaller than the laser beam's wavelength (780nanometers) in air. The dimension of the laser beam's wavelength in airis larger than the laser's wavelength (500 nanometers) inside the discsubstrate, with a refractive index of 1.55. In short, the height of eachbump is, therefore, one-quarter of the laser's wavelength in thesubstrate.

Scientifically, this means that light striking a land will travel twiceas far than light striking a bump. This discrepancy in light traveldistance serve to modulate the intensity of a light beam. This allowsdata physically encoded on the disc to be recoverable by the laser.

Also, the pits and intervening reflective land on the disc's surface donot directly designate ones and zeros. Rather, it is each pit's edge,whether leading or trailing, that is a 1 and all areas in between,whether inside or outside a pit, that are designated as zeros. Still,each pit and reflective land lengths vary incrementally. Thecombinations of 9 different pit and land lengths of varying dimensionsphysically encode the data.

Error Correction

Error correction is one of the major advantages of digital audio storagemedia, such as compact discs, over analog media, like LPs. Errorcorrection simply corrects the error.

When an LP is scratched, for instance, the grooves are irrevocablydamaged, along with the information contained in them. On every replayof that record, there will be a click or pop when the damaged part ofthe groove passes beneath the needle.

This is not the case for CDs. The data on every disc is speciallyencoded with an error correction code. When a scratched CD is played,the CD player uses the error correction code to perform error correctionevery time the disc is played. Thus, it delivers the original undamageddata, instead of the damaged data.

Cross Interleave Reed-Solomon Code (CIRC)

As indicated above, error correction is essential to the success ofdigitized audio information. Otherwise, any digital recording, whetheron tape or disc, would sound like a badly scratched LP.

The raw error rate from a CD is approximately 10⁻⁵ to 10⁻⁶; that is,about one error for ever 1 million bits. To put this in perspective, adisc will output over 4 million bits per second. So, while the raw errorrate is impressive, the need for error correction is obvious.

With error correction, approximately 200 errors per second will becompletely corrected. To achieve these results, each compact discemploys interleaving to distribute errors, and parity to correct them.Interleaving is the process of arranging data in time. Parity is aredundant error detection method in which the total number of binaryones (or zeros) is always even or odd. Interleaving and parity are thecornerstones of error correction.

The particular algorithm used for correcting errors in all compact discsystems is the Cross Interleave Reed-Solomon Code, (“CIRC”). In short,CIRC is a method of error detection and correction using data delay,rearrangement, and the Reed-Solomon coding algorithm. The CIRC circuituses two correction codes for additional correcting capability, andthree interleaving stages to encode data before it is placed on a disc.CIRC also performs error correction while decoding audio data duringplayback.

Reed-Solomon Codes:

The Reed-Solomon code used in CIRC is an error correcting code. It isparticularly suited for the CD system because its decoding requirementsare relatively simple. To detect errors in the received data, forexample, two syndromes, or error patterns, are calculated using decodingequations. An error results in non-zero syndromes. Further, the value oferroneous words can be determined by the difference of the weighting indecoding equations.

Cross Interleaving:

As stated in its acronym, CIRC employs cross interleaving, which is theprocess of rearranging data in time. Cross interleaving permits moreefficient correction of errors by decoders. This is accomplished by theseparation of two error correction codes by an interleaving stage. Thus,one code can check the accuracy of the other code. Another importantaspect about cross interleaving is that error correction is enhanced atthe expense of redundancy; that is, the amount of redundancy is notincreased.

CIRC Encoding:

The objective of this encoding algorithm is the cross-interleaving ofbits from the audio signal, so that two encoding stages can generateparity symbols, or data values. Error correction encoding begins withthe first stage of interleaving, which is designed to assistinterpolation, an error concealment technique.

First, twenty-four 8-bit symbols are applied to the CIRC encoder. Adelay of two symbols is placed between even and odd samples, such thateven samples are delayed by two blocks, for instance. In the case wheretwo uncorrectable blocks occur, standard interpolation techniques can beused. Interpolation is a method used to conceal errors by using adjacentdata to determine the approximate value of missing/uncorrectable data.

Next, symbols are scrambled in order to separate even and odd numbereddata words. This whole process facilitates concealment, a strategy usedto supply approximate data in lieu of missing or incorrect data.

The next step involves the following symbols, which represent thefollowing: (1) P and Q are parity values, which represent ones andzeros; and (2) C1 and C2 are correction encoders capable of correctingone and two symbols, respectively.

Proceeding with the process flow, a C2 encoder accepts a 24-byteparallel word and produces 4 bytes of Q parity. Q parity is designed tocorrect one erroneous symbol, or up to four erasures in one word, whichcomprises zeros and ones. An erasure is a word that has been erased bythe decoders because detection has determined its value is unreliable.

Generally, the parity symbols are placed in the center of the CIRCencoding scheme block to increase the odd/even distance. This placementoccurs because it enhances interpolation in the case of burst errors,which refers to a large number of data bits lost on a medium because ofexcessive damage to, or obstruction on, the medium.

After the Q parity symbol is generated by the C2 encoder, crossinterleaving follows. The 28 bytes, (e.g., the 24 byte parallel wordplus the 4-byte Q parity word), are delayed by different periods, whichare integer multiples of four blocks. As a result of this convolutionalinterleave, each C2 word is stored in 28 different blocks anddistributed over 109 blocks.

Next, a different encoder, C1, accepts the 28-byte word from 28different C2 words, and produces 4 additional bytes of P parity. The C1encoder is then used to correct single symbol errors. It is also used todetect and flag double and triple errors for Q correction.

The final interleave stage introduces a fixed odd/even delay of onesymbol to alternate symbols. This delay spreads the output words/valuesover two data blocks, in effect, preventing random errors fromdisrupting more than one symbol in one word. Random errors are preventedeven if two adjacent symbols in one block are erroneous.

Finally, the P and Q parity symbols generated by encoders C1 and C2,respectively, are inverted to provide non-zero P and Q symbols with zerodata. The inversion process assists data readout during areas with mutedaudio program. At the end of the CIRC encoding process, which began witha 24 eight-bit symbols, 32 eight-bit symbols leave the CIRC encoder.

CIRC Decoding:

At playback, and following de-modulation, data is sent to a CIRC decoderfor de-interleaving, error detection, and correction. Essentially, theCIRC decoding process reverses many of the processing steps accomplishedduring encoding. The CIRC decoding process employs parity from twoReed-Solomon decoders, and de-interleaving. Upon de-interleaving, forexample, errors in consecutive bits or words are distributed to a widerarea to guard against consecutive errors in the storage media.

The first decoder, C1, is designed to correct random errors and todetect burst errors, (i.e. data bits lost because of adamaged/obstructed medium). It puts a flag on all burst errors to alertthe second decoder, C2. Given this prior knowledge, and help fromde-interleaving, C2 can adequately correct burst errors, as well asrandom errors that C1 was unable to correct.

During reproduction of a digital recording to a CD, the CIRC decoderaccepts one frame of thirty-two 8-bit symbols. Recall that thisthirty-two 8-bit symbol is comprised of 24 bytes of audio data and 8bytes of generated parity symbols. Odd numbered symbols are delayed, andparity symbols are inverted. Each delay line has a delay equal to theduration of a single symbol. Consequently, information of even numberedsymbols of a frame is de-cross-interleaved with information of the oddnumbered symbols on the next frame. The de-interleaving process servesto place even and odd numbered audio symbols back into their originalorder by essentially re-arranging the order as read from a disc. Anysequence of errors on the disc are distributed among valid data.

In the C1 decoder, errors are detected and corrected by the 4 bytes of Pparity symbols previously generated by the C1 encoder. This includescorrection for short duration random errors; longer burst errors arepassed along. More specifically, the C1 decoder can correct a symbolerror in every word/value of 32 symbols. If there is more than oneerroneous symbol, then all 28 data symbols are marked with an erasureflag and passed on. Only valid symbols, which are those adhering to C1'sencoding rules, are passed along unprocessed.

Delays between decoders C1 and C2 are of unequal length, and longer thanthe delays at the input to the C1 decoder. This interleaving enables theC2 decoder to correct longer burst errors. Moreover, because the wordarriving at the C2 decoder contains symbols from the C1 decoder that isdecoded at different times, those symbols that are marked with anerasure flag get distributed among valid symbols. This situation helpsthe C2 decoder to correct burst errors. Symbols without an erasure flagare assumed error free and passed through unprocessed.

Contrary to the C1 decoder, where the P parity symbols are used todetect and correct errors, in the C2 decoder, errors are corrected byfour Q parity symbols. If symbols are properly flagged, the C2 decodercan detect and correct single symbol errors; it can even correct up tofour symbols. Burst errors arriving at C2 are also corrected, as areerrors that might have occurred in the encoding process itself ratherthan in the medium.

Further, C2 can correct symbols that were incorrect by C1 decoding. Inthe event that the C2 decoder cannot accomplish correction because morethan four symbols are flagged, 24 data symbols are flagged asuncorrected and passed on for interpolation, an error concealmenttechnique. Final de-scrambling and delay is performed to assist withinterpolation.

Using two correction decoders and cross interleaving helps tackle anotherwise particularly difficult error scenario. Interleavingdistributes burst errors, sometimes caused by disc surfacecontamination, over different words for easier correction. This does notdiminish the fact that correction is difficult when a burst errorcoincides with a random error introduced by a manufacturing defect, forexample. However, since random errors are defined to be single symbolerrors and any longer are burst errors, EFM (8-14 modulation) codingguarantees that a random error will never corrupt more than two symbols.The even/odd interleave guarantees that a 2-symbol random error willalways appear as a single error in two different C1 words afterde-interleaving. In short, this means that random errors are alwayscorrectable with the C2 decoder retaining its burst error correctioncapability.

CD Player Overview

The CD player contains two primary systems: an audio data processingsystem and a control system. Prior Art FIG. 6 depicts a block diagram ofa CD player showing an audio path as well as servo and controlfunctions. Generally, the data path, which directs modulated light fromthe pickup through a series of processing circuits, consists of severalelements that ultimately produces a stereo analog signal. These elementsof the data path include a data separator, buffer, de-interleaving RAM,error correction circuit, concealment circuit, oversampling filter, D/Aconverters, and output filters.

The servo and control system, in addition to a display system, directsthe mechanical operation of the CD player, such as the player's spindledrive, and the auto-tracking and auto-focusing functions. The servo,control and display system also directs the user interface to the CDplayer's controls and displays.

A CD player uses a sophisticated optical read-out system to read data,control motor speed, track the pit spiral and adjust pickup positionsand timings. While a spindle motor is used to rotate the disc withconstant linear velocity, in another servo loop, information from thedata itself determines correct rotating speed and data output rate.

User controls and their interface to the player's circuitry is monitoredby a microprocessor. A software program controls several modes of playeroperation. Subcode data is also used to direct the pickup to the properdisc location. For example, a time code is used to locate the start ofany track.

Once data is recovered from the CD, the player must go through a seriesof activities to decode audio information in order to reconstruct anaudio signal; namely, the EFM (eight-to-fourteen modulation) data ismodulated, and errors are detected and corrected using an errorcorrection algorithm. Additionally, using interpolation and muting, theaudibility of gross errors is minimized.

Subsequent to decoding of the audio information, the digital data mustbe converted to a stereo analog signal. This conversion process requiresone or two D/A converters and low-pass filters (in analog or digitaldomain).

An audio de-emphasis circuit exists in the audio output stages of everyCD player. Some CDs are configured for improved signal-to-noise ratio.This configuration is accomplished by encoding the CD with an audiopre-emphasis flag in the subcode, where high frequencies on a mastertape is slightly boosted (50/15 μs characteristic). The result, on CDplayback, is inverse attenuation of the disc's high frequencies, becausethe player switches in the de-emphasis circuit when required, so thatthe signal-to-noise ratio is slightly improved.

The final output circuit is the buffer, which ensures that the CDplayer's line level output is appropriate to drive necessary externalamplifiers with a minimum amount of analog distortion.

Pickup Design

With respect to a player's pickup design, a CD may contain as many asthree billion pits, all orderly arranged on a spiral track. Each opticalread-out system, which comprises an entire lens assembly and pickup,must focus, track and read data stored on a spiral track. The lensassembly, which is a combination of the laser beam and a reader, must besmall enough to move across the underside of a disc in response totracking information and user random-access programming. Moreover,movement of the pickup from a CD's center to its edge must be focuseddespite adverse playing conditions, such as when a CD is dirty orvibrating.

Auto-Tracking

Unlike an LP, which has grooves to guide the pickup, a CD has a singularspiral pit track running from a center circle to its outer edge. Theonly object that touches the disc surface is an intensity-modulatedlaser light, which carries data and which is susceptible toobstructions, such as vibrations. Four standard methods have beendesigned for tracking pit spiral: (1) one-beam push-pull; (2) one-beamdifferential phase detection; (3) one-beam high frequency wobble; and(4) three-beam.

Auto-Focusing

The optical pickup must be precise in order to accommodate approximately600,000 pits per second. Even the flattest disc is not perfectly flat;disc specifications acknowledge this by allowing for a verticaldeflection of ±600 μm. In addition, a ±2 μm tolerance is required forthe laser beam to stay focused, otherwise the phase interference betweendirected and reflected light is lost, along with audio data, trackingand focusing information. Therefore, the objective lens must be able tore-focus while the disc's surface deviates vertically.

An auto-focus system, driven by a servo motor, manages this deviation,using control electronics and a servo motor to drive the objective lens.Three techniques are available for generating a focusing signal: (1) acylindrical lens using astigmatism; (2) a knife edge using Foucaultfocusing; and (3) critical angle focusing.

Any pickup must perform both tracking and focusing functionssimultaneously. Therefore, a completed pickup design would use acombination of the above-mentioned auto-tracking and auto-focusingtechniques. Two standard pickup designs stand out from the rest whenauto-tracking and auto-focusing functions are combined: (1) one-beampush-pull tracking with Foucault focusing, (hereinafter “one-beampickup”); and (2) three-beam tracking with astigmatic focusing,(hereinafter “three-beam pickup”).

Both of these designs have been commercialized among manufacturers.One-beam pickups, which are usually mounted on a distal end of apivoting arm, swings the pickup across a disc in an arc. On the otherhand, three-beam pickups are mounted on a sled, which slides linearlyacross the disc.

The following exemplary prior art discussion will be limited tothree-beam pickups only.

Three-Beam Pickup Optical Design

Prior Art FIG. 7 shows the optical path of a three-beam pickup, whichuses a laser as the light source. A laser is used, rather than a bulb,for a number of reasons. First, a laser uses an optical resonator tostimulate atoms to a higher energy level that induces them to radiate inphase, a condition necessary to achieving sharper data surface focus andproper intensity modulation from the pit height.

Second, a laser light, unlike a bulb's light, which radiates all thefrequencies of a spectrum at all different phases, is composed of asingle frequency and is coherent in phase. An important advantage ofphase coherency is phase cancellation in the beam that is produced bydisc pits, so that disc data can be read. Most CD pickups use analuminum gallium arsenide semiconductor laser with a 0.5 milliwattoptical output that radiates a coherent-phase laser beam with a 780nanometer wavelength, because the beam is comprised of near-infraredlight.

Referring to Prior Art FIG. 7, a laser diode is positioned adjacent thefocal point of a collimator lens with a long focal distance, for thepurpose of making the divergent light rays parallel. A monitor diode(not shown) is also placed adjacent the laser diode in order to controlpower to the laser. The monitor diode stabilizes the laser's output intwo important ways; first, by compensating for temperature changes so asto prevent thermal runaway; and second, by conducting current inproportion to the light output of the laser.

The three-beam pickup is so termed because it uses three beams fortracking and reading a CD. To generate these beams, a laser light firstpasses through a diffraction grating, which resembles a screen withevenly-spaced slits of a few laser wavelengths apart. As the beam passesthrough the grating, the light diffracts into fringes of parallel lightbeams. When the collection of these beams is re-focused, the collectionappears as a single, bright centered beam with a series of successivelyless intense beams on either side of the center beam.

It is this diffraction pattern that actually strikes the CD, where thecenter beam is used for both reading data and focusing. In a three-beampickup, two of the series of successively less intense beams, or twosecondary beams, are used for tracking only. In a one-beam pickup, datareading, focusing and tracking is accomplished with just one beam.

Another element in the three-beam optical design is the polarizationbeam splitter, or PBS, which consists of two prisms having a common 45degree facing that acts as a polarizing prism. The purpose of the PBS isto direct the laser light to the disc, and to angle the reflected light(from the disc) to the photosensor. In some designs, a half-silveredmirror is used.

In Prior Art FIG. 7, the collimator lens is shown as following the PBS,even though it can precede the PBS in other designs. Once the lightexits the collimator lens, it then passes through a quarter-wave plate(QWP). The QWP is an anisotropic material that exhibits properties withdifferent values when measured in different directions, so that whenlight passes through the QWP, it rotates the plane of polarization ofeach passing light beam. This rotation is required to make the PBS work.

The anisotropic quality of the quarter-wave plate is equally importantto the process occurring on the right-hand side of the plate. Lightpassing through the QWP to the CD, will be reflected from the CD backagain through the QWP and become polarized. More importantly, the lightis polarized in a plane at right angles to that of the incident light.

In other words, the reflected polarized light re-entering thequarter-wave plate (from right to left) will pass through the collimatorand strike the polarization beam splitter. Because the polarization beamsplitter passes light in one plane only (e.g., horizontally) butreflects light in the other plane (e.g., vertically), the PBS willproperly deflect the reflected beam toward the photodiode sensor to readthe digital data.

The final optics element in the path to the CD is the objective lens.The objective lens is used to focus laser beams into a convergent coneof light onto the CD's data surface, taking into account the refractiveindex of the polycarbonate substrate of the disc. Convergence is afunction of the numerical aperture (NA) of the lens, with most pickupsusing an objective lens having an NA of about 0.5.

As mentioned earlier, the laser beam's size on the outer surface of theCD's transparent polycarbonate substrate is approximately 800micrometers in diameter. Since the refractive index of the substrate is1.55 and its thickness is 1.2 millimeters, the laser beam's size isnarrowed to 1.7 micrometers at the reflective surface, a size slightlywider than the pit width of 0.5 micrometer and comparable in width tothe light's wavelength.

When the laser beam strikes a land, (the smooth surface between twopits), light is almost totally reflected. When the light strikes a pit(viewed as a bump by the laser), diffraction and destructiveinterference cause less light to be reflected.

In short, all three intensity-modulated light beams pass through theobjective lens, the QWP, collimator lens, and the PBS. Before hittingthe photodiode, they pass through a singlet lens and a cylindrical lens.

In any optical pickup system, automatic focusing is an absoluteprerequisite. Disc warpage and other irregularities causes verticaldeflections in the CD's data surface. Such movement would place the dataout of the pickup's depth of focus, essentially making it impossible forthe pickup to distinguish between pit height and land phase differences.

The unique properties of astigmatism are used to achieve auto-focusingin a three-beam CD player. This is illustrated in Prior Art FIG. 8.

The cylindrical lens, (see Prior Art FIG. 7), which prefaces thephotodiode array, detects an out-of-focus condition. The condition isdirectly related to the distance between the objective lens and the CD'sreflective surface. As this distance varies, the focal point changes,and the image projected by the cylindrical lens changes its shape. Theinter-relationship of the above elements is illustrated in Prior ArtFIG. 8.

Changes in an image on the photodiode generates a focus correctionsignal. For example, when the distance between the objective lens andthe CD decreases, the image projected by the lens moves further from thecylindrical lens, and the pattern becomes elliptical. Conversely, whenthe distance between the objective lens and the CD increases, the imageprojected by all lenses (e.g., the objective lens, an intermediateconvex lens and the cylindrical lens) moves closer to the lens. However,the elliptical pattern that is formed is now rotated 90 degrees from thefirst elliptical pattern.

In the third and final scenario, which is when the disc surface liesexactly at the focal point of the objective lens, the image reflectedthrough the intermediate convex lens and cylindrical lens is unchanged,and a circular spot strikes the center of the photodiode.

An important aspect of the three-beam auto-focus system is correctionvoltages. A photodiode uses a laser beam's intensity level to generate afocus correction voltage, which in turn generates a control signal.These electrical signals control the mechanical motion of a servo motor,which is responsible for moving the objective lens along an optical axisin response to any vertical disc motion. Servo-controlled movement ofthe objective lens during disc motion results in automatic focusing.

Prior Art FIG. 9 illustrates a typical servo motor used to move theobjective lens in the optical path. The servo motor consists of a coiland magnet structure generally used in loudspeakers.

Operation of a CD player begins when a CD is first loaded into theplayer. Technically, an electrical control signal is sent into theoptical pickup system, which causes the laser to turn on, and theobjective lens to move vertically until a focus condition is reached.

Then, the auto-focusing system takes over, except if two negativesituations occur. If no CD is detected, the automatic focusing systemtries again, and cuts off if it fails to detect a CD again. If theauto-focus is inoperative, such as when the CD tray is open, the systempulls back the objective lens to prevent damage to the lens or CD.Otherwise, the automatic focusing system performs its operation smoothlyby keeping the pickup properly positioned beneath the spinning disc, ineffect maintaining focus to within a tolerance of approximately ±0.5micrometers.

Content Scrambling System

Currently, encryption for data media, such as DVDs, involves one key. Itis a fairly simple 40-bit scheme. There is good authentication of theplatform, which is performed by various key exchanges within themechanisms between the source drive and the actual platform decryptingthe data.

A content scrambling system (CSS) is included in every DVD player. CSSis a method of encrypting a disc that the information technology (IT)and motion picture industries agreed upon. In order to be licensed tomanufacture DVD players, a company is required to obey certain rulespertaining to the uses (and non-uses) that a platform can perform, aspart of a license agreement.

While the present invention is not required to incorporate the CSSencryption system, it could be one level of encryption, if a multi-levelencryption is employed. Audio information is generally encrypted priorto being burned into a disc, such as a CD. Hence, there is no plaintext; encrypted information only is contained on a CD. So, if a userseeks to access information contained on the CD, whether for listeningor copying purposes, the user would have to decrypt the data in order tohear sensible audio data.

In general, existing ideas in the field appear to bury authenticationkeys within encrypted information that is burned into the disc.Authentication keys are buried using various authentication processes,which verify that the platform device—whether a computer, CD player, DVDplayer, or the like—is a licensed device and, consequently, obeyscertain copyright rules. Eventually, the licensed device uncovers theburied authentication key(s) and decrypts the data contained on thedisc. So, the system needs to find the key before being eligible fordecrypting the audio data.

The following prior patents represent the state of the art of preventingunauthorized copying of data, and are all hereby incorporated byreference:

U.S. Pat. No. 4,811,325 to Sharples, Jr. et al. discloses a high speedcopying of audio programs on optical CDs. The master CD is encoded usingAdaptive Delta Modulation (ADM).

U.S. Pat. No. 4,879,704 to Takagi et al. prevents copying of an opticaldisc. Data is stored in a record protected area and in a recordunprotected area, where each such sector has a representative addressthat helps to determine whether the data is in the record protected areaor in the record unprotected area. Only data from the record unprotectedarea with an appropriate address can be copied.

U.S. Pat. No. 4,937,679 to Ryan discloses a video recording and copyprevention system. The video signal includes a copy-protect signal.Designated detectors detect the presence of copy-protected signal(s) andinhibit copying of such signals. A video correlate enables one toplayback a copy-protected program for viewing only and generates aninhibit signal to prevent copying of a copy-protected signal.

In U.S. Pat. No. 4,975,898 to Yoshida, an erasing program erases thenon-rewritable portion so that it cannot be copied on a copy disc duringunauthorized copying of an optical disc.

U.S. Pat. No. 5,319,735 to Preuss et al. uses a digital code signalembedded with the original audio signal. The digital code getstransferred to the copy disc.

In U.S. Pat. No. 5,412,718 to Narasimhalu et al., non-uniformities andtheir attributes in the storage medium is used as a unique signature.This signature is used to derive a key for encrypting the information onthe storage medium. During copying, the signature gets mutated and theinformation cannot be decrypted. During authorized copying, theinformation is decrypted by generating a key from the signature of thedistribution medium.

In U.S. Pat. No. 5,418,852 to Itami et al., data is stored in a useraccessible area and in a user inaccessible area, which are both comparedto determine the authenticity of the recording medium.

In U.S. Pat. No. 5,513,260 to Ryan, copy-protected CDs haveauthenticating signature recorded on them. An authentication signatureis obtained by a deliberately induced radial position modulation givingan error voltage corresponding to the elliptical errors. When playingthe CD, the signature causes the player to correctly decrypt the programwhereas, when playing an unauthorized copy of the CD, the absence of thesignature is detected and false data is generated and the player doesnot play.

U.S. Pat. No. 5,538,773 to Kondo discloses the recording of datatogether with a cipher key information for copy protection.

U.S. Pat. No. 5,570,339 to Nagano discloses a system that converts datato digital data, which is then FM modulated with key information to varythe widths of the pits at the time of recording. During reproduction,the data is read out and if the key information is determined to bemissing, copying is prevented.

U.S. Pat. No. 5,608,717 to Ito et al. discloses a CD-ROM that has acharacter/graphic pattern for copy protection. Password and informationon the position of the character/graphic pattern bearing area of theCD-ROM are stored beforehand in a memory included in the CD-ROM'scontroller of the playback system. The CD-ROM controller, therefore,will have the means for deciphering the enciphered password. Data aremodulated by the EFM modulation method into bits of predetermined widthand height having values corresponding to the EFM.

U.S. Pat. No. 5,608,718 to Schiewe discloses an optical disc havingshallow pits bearing an identification/logo/watermark. The lands andpits are of different lengths for identification/authorization purposeswhen copying a CD.

U.S. Pat. No. 5,636,276 to Brugger discloses the distribution of digitalmusic with copyright protection. An encryption table is embedded in themusic CD player and includes a decryption module that uses theencryption table for authorized playing of music/information.

U.S. Pat. No. 5,636,281 to Antonini discloses an authorized access thatuses mingling of data elements of the program memory to be protectedaccording to a secret order. To use this memory, a transcending deviceis used. The transcending device is in the form of a memory containingseveral tables, only one of which gives the right transconding dataelements.

The problem with one or more of the above-mentioned conventionalencryption/decryption system is that a pirate or hacker seeking to hackinto the encryption process on a disc could do so by playing theencrypted music, finding the decryption key, which is buried, mixed andinterleaved with the audio data or the encrypted audio data, and usingthat key to decrypt the audio on the disc.

In other words, accompaniment of the decryption key within the audiodata lends itself to discovery, even if the audio data is played in anencrypted form. A hacker could obtain decryption key(s) even if theencrypted audio data was placed onto an unlicensed computer platformhaving a DVD ROM drive that did not obey copyright protection rules,because if the audio is later played back, the key would be output alongwith the encrypted audio data.

An additional problem in one or more of the prior art references is thatkeys specific to, or derived from, the physical construction of the CDare not constructed or determined in a manner that is difficult todetect by a hacker. A further problem in the prior art is that thephysical characteristics of the CD which are used to derive a key forauthorized copying, are transferred in the audio and may be accessibleto the hacker.

Yet another problem in one or more of the prior art references is thatthe solutions proposed therein require significant additional hardwareand/or software to be implemented. That is, these prior art techniquesdo not take advantage of existing hardware/software within the CD or DVDplayer that can be used effectively to prevent unauthorized copying.

Yet another problem in one or more of the prior art references is thatthe solutions proposed therein are expensive, and incompatible withexisting CD or DVD players. Hence, current solutions to unauthorizedcopying are difficult and impractical in their implementation.

Yet another problem in one or more of the prior art references is thatthe solutions proposed therein are limited to CD and/or DVD players, anddoes not consider or structure such techniques when data is transmittedfrom, to, and/or, or over local and/ore global networks, such as theInternet.

SUMMARY OF THE INVENTION

It is a feature and advantage of the present invention to provide amethod and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that is inexpensive, and compatible withexisting CD and/or DVD players, and other forms of data recording and/orplaying devices.

It is another feature and advantage of the present invention to providea method and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that is manageable and practical in itsimplementation.

It is another feature and advantage of the present invention to providea method and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that does not require significantadditional hardware and/or software in its implementation.

It is another feature and advantage of the present invention to providea method and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that uses and/or adapts existinghardware/software within, for example, the CD or DVD player, that can beused effectively to prevent unauthorized copying.

It is another feature and advantage of the present invention to providea method and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that uses or creates data keys specificto, or derived from, the physical construction of the CD in a mannerwhich is difficult to detect by a hacker.

It is another feature and advantage of the present invention to providea method and/or apparatus for minimizing pirating of, or unauthorizedaccess to, data on a data media that uses the physical characteristicsof the CD to derive a key for authorized copying, and which key isprevented from being transferred in the audio and, therefore, notaccessible to the hacker.

The present invention relates to a method/system of preventingunauthorized copying of data on data media, including CDs and DVDs.Generally, an authorized CD is designed to require decoding by anauthorized disc player. The authorized CD includes certain informationused by an authorized CD player for playing music. An unauthorizedcopied CD, however, does not have the requisite encryption/decryptionkey(s) necessary for decoding.

Consequently, a feature and advantage of present invention is to preventpiracy of audio and/or video data from discs; that is, to providegreatly enhanced security measures against CD pirating. The presentinvention is based, in part, on my discovery that the authorizationkey(s) need not necessarily be transferred in the audio usingconventional hardware and/or software in CD or DVD players that may beadapted in one or more ways described below.

The above features and advantages are accomplished generally byintentionally embedding, in the data, predetermined errors that are usedas a decryption key, and using, for example, a Reed-Solomon decoder toremove the predetermined errors/decryption key(s) from the audio data ina natural manner.

Singular or multi-level decryption systems may be used for preventingunauthorized copying of audio data on a disc. Similarly, two or threedifferent decryption systems, each of which successively must bedecrypted before the audio is finally available, may also be used.

Advantageously, the present invention optionally uses three or fourdifferent sources for making or compiling a long or compound keys. Thus,in other words, instead of having a multi-layered decryption orauthorization system, the present invention optionally includes amulti-level decryption key, each component of which must be found inorder to build the whole key to perform the entire decryption orauthorization process.

According to the present invention, the standard Reed-Solomon decodingmethod, for example, is used to remove the predetermined errors that areintentionally embedded on an original authorized CD from the audio.Thus, the predetermined errors are prevented from being transferred inthe audio output from the CD player or DVD player, and the like. Thepredetermined errors are configured as an authorization and/ordecryption key(s) or a component thereof.

Advantageously, the predetermined errors are corrected before the audioinformation is output via, for example, a conventional Reed-Solomondecoder, which is present in all CD players. Upon playback, theReed-Solomon decoder, in correcting the predetermined errors, alsoautomatically removes, from the audio, the key(s) or code(s), orcomponents thereof appearing as predetermined errors, intentionallyembedded in the audio data.

Accordingly, the audio data contained on this particular CD is strippedof all necessary keys required for subsequent playback on another CDplayer or recorder. Thus, because predetermined errors have already beenremoved by the Reed-Solomon decoder, the second CD player/recorder, ifpositioned to intercept the audio, does not receive any predeterminederrors (or the authorization and/or decryption keys/codes), andtherefore, cannot play the data thereon. The second CD player/recordercannot also record the audio data onto an unauthorized CD with the keysthat have been previously filtered. Therefore, the present inventionalso prevents the manufacture and/or distribution of pirated CDs.

A further advantage of the present invention is that the predeterminederrors are optionally embedded in the data disc on a per track basis, orat intervals throughout the disc. This means that the same type ofauthorization process may be performed for each track to be played, ormay be performed throughout the playing/recording process. Thus, it isimportant to note that each track of a CD can optionally include adifferent authorization or decryption key.

To achieve these and other objects, the present invention provides acomputer program product that stores computer instructions thereon forinstructing a computer to perform a process of authenticating a datamedia, such as a CD or DVD, as fraudulent/pirated or non-fraudulent.

In accordance with one embodiment of the invention, a methodauthenticates at least one of a media and data stored on said media inorder to prevent at least one of piracy, unauthorized access andunauthorized copying of the data stored on said media. At least onepredetermined error is introduced with the data resulting in mixed data.The mixed data is optionally stored on the media. The at least onepredetermined error includes at least one authentication key orcomponent thereof, for authenticating whether the media and/or data isauthorized. The method includes the following sequential, non-sequentialand/or sequence independent steps: reading the mixed data from themedia, detecting the at least one predetermined error from the mixeddata, and comparing the at least one predetermined error to the at leastone authentication key or component thereof. The method also includesthe steps of authenticating the media and/or the data in the mixed dataresponsive to the comparing, removing the at least one predeterminederror from the mixed data resulting in substantially the data, andoutputting the data as at least one of audio, video, audio data, videodata and digital data substantially free of the at least onepredetermined error.

In accordance with another embodiment of the invention, a data playerincludes a data processor reading mixed data including data and at leastone predetermined error from a media, detecting at least onepredetermined error from the mixed data, and comparing the predeterminederror to at least one authentication key or component thereof. The dataplayer authenticates the media and/or the data in the mixed dataresponsive to the comparing, and removes the predetermined error fromthe mixed data resulting in substantially the original data. The dataplayer outputs the data as at least one of audio, video, audio data,video data and digital data substantially free of the predeterminederror.

According to another embodiment of the invention, a data messagecomprises at least one predetermined error introduced in the datamessage comprising a mixed data message. The at least one predeterminederror comprises at least one authentication key or component thereof,used in authenticating whether the data message is authorized. Thepredetermined errors are sufficiently minimal such that the at least onepredetermined error is capable of being removed therefrom withoutsubstantially altering an audible component of the data message. Thedata message is advantageously transmitted substantially free of the atleast one predetermined error preventing a destination processor fromthe at least one predetermined error comprising the at least oneauthentication key or component thereof, used in the authenticatingwhether the data message is authorized.

According to another embodiment of the invention, a data disk comprisesat least one predetermined error introduced in the data disk with thedata as mixed data. The mixed data is stored on the data disk. The atleast one predetermined error includes at least one authentication keyor component thereof, used in authenticating whether the at least one ofsaid data disk and data is authorized.

A computer or processor driven system, tangible medium includinginstructions thereon, and process is also provided.

There has thus been outlined, rather broadly, the important features ofthe invention in order that the detailed description thereof thatfollows may be better understood, and in order that the presentcontribution to the art may be better appreciated. There are, of course,additional features of the invention that will be described hereinafterand which will form the subject matter of the claims appended hereto.

In this respect, before explaining at least one embodiment of theinvention in detail, it is to be understood that the invention is notlimited in its application to the details of construction and to thearrangements of the components set forth in the following description orillustrated in the drawings. The invention is capable of otherembodiments and of being practiced and carried out in various ways.Also, it is to be understood that the phraseology and terminologyemployed herein are for the purpose of description and should not beregarded as limiting.

As such, those skilled in the art will appreciate that the conception,upon which this disclosure is based, may readily be used as a basis forthe designing of other structures, methods and systems for carrying outthe several purposes of the present invention. It is important,therefore, that the claims be regarded as including such equivalentconstructions insofar as they do not depart from the spirit and scope ofthe present invention.

Further, the purpose of the foregoing abstract is to enable the U.S.Patent and Trademark Office and the public generally, and especiallyscientists, engineers and practitioners in the art, who are not familiarwith patent or legal terms or phraseology, to determine quickly from acursory inspection, the nature and essence of the technical disclosureof the application. The abstract is neither intended to define theinvention of the application, which is measured by the claims, nor is itintended to be limiting as to the scope of the invention in any way.

The above objects of the invention, together with other apparent objectsof the invention, along with the various features of novelty thatcharacterize the invention, are pointed out with particularity in theclaims annexed to and forming a part of this disclosure. For a betterunderstanding of the invention, its operating advantages and thespecific objects attained by its uses, reference should be had to theaccompanying drawings and descriptive matter, which illustratespreferred embodiments of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a conventional specification table for a conventionalcompact disc system.

FIG. 2 shows a scale drawing of a conventional CD data surface.

FIG. 3 shows a typical compact disc pit surface.

FIG. 4 shows a diagram of a conventional pit track.

FIG. 5 shows a conventional bump height on a CD surface.

FIG. 6 shows a block diagram of a conventional CD player showing audiopath as well as servo and control functions.

FIG. 7 shows an optical path of a conventional three-beam pickup system.

FIG. 8 shows the properties of astigmatism used to generate anauto-focus correction signal in a conventional three-beam pickup system.

FIG. 9 shows a conventional servo motor used to move the objective lensin an optical path.

FIG. 10 shows a Reed-Solomon decoder of the present invention.

FIG. 11 shows a block diagram of the process by which predeterminederrors are intentionally embedded in data to be stored on a disc, andare used as a key or keys for authenticating a disc.

FIG. 12 shows a block diagram of a CD player of the present invention,which includes a fraud detector.

FIG. 13 shows a flow chart of the decision logic describing theauthentication process of a CD to be played on a CD player.

FIGS. 14-17 show a flow chart of the decision logic describing theauthentication process of a CD to be copied by CD recorder.

FIG. 18 is an illustration of a main central processing unit forimplementing the computer processing in accordance with a computerimplemented embodiment of the present invention, when the data playerand/or recorder is part of a personal computing system.

FIG. 19 illustrates a block diagram of the internal hardware of thecomputer of FIG. 18;

FIG. 20 is a block diagram of the internal hardware of the computer ofFIG. 18 in accordance with a second embodiment;

FIG. 21 is an illustration of an exemplary memory medium which can beused with disk drives illustrated in FIGS. 18-20;

FIG. 22 shows a plurality of disc players, disc recorders andworkstations connected to a global network, such as the Internet.

FIG. 23 shows a block diagram of the process by which predeterminederrors are intentionally embedded in an electronic audio/video datafile, and are used as a key or keys for authenticating the efile.

FIG. 24 shows a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file retrievedvia the Internet for playing.

FIG. 25 shows a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file retrievedvia the Internet for copying.

FIG. 26 is an illustration of the architecture of the combined internet,POTS, and ADSL architecture for use in the present invention inaccordance with another design or embodiment.

The same reference numerals refer to the same parts through the variousfigures.

Notations and Nomenclatures

The detailed description that follows may be presented in terms ofprogram procedures executed on a computer or network of computers. Theseprocedural descriptions and representations are the means used by thoseskilled in the art to most effectively convey the substance of theirwork to others skilled in the art.

A procedure is here, and generally, conceived to be a self-consistentsequence of steps leading to a desired result. These steps are thoserequiring physical manipulations of physical quantities. Usually, thoughno necessarily, these quantities take the form of electrical or magneticsignals capable of being stored, transferred, combined, compared andotherwise manipulated. It proves convenient at times, principally forreasons of common usage, to refer to these signals as bits, values,elements, symbols, characters, terms, numbers, or the like. It should benoted, however, that all of these and similar terms are to be associatedwith the appropriate physical quantities and are merely convenientlabels applied to these quantities.

Further, the manipulations performed are often referred to in terms,such as adding or comparing, which are commonly associated with mentaloperations performed by a human operator. No such capability of a humanoperator is necessary, or desirable in most cases, in any of theoperations described herein which form part of the present invention;the operations are machine operations. Useful machines for performingthe operation of the present invention include general purpose digitalcomputers or similar devices.

The present invention also relates to apparatus for performing theseoperations. This apparatus may be specially constructed for the requiredpurpose or it may comprise a general purpose computer as selectivelyactivated or reconfigured by a computer program stored in a computer.The procedures presented herein are not inherently related to aparticular computer or other apparatus. Various general purpose machinesmay be used with programs written in accordance with the teachingsherein, or it may prove more convenient to construct more specializedapparatus to perform the required method steps. The required structurefor a variety of these machines will appear from the description given.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

The present invention relates to a method/system of preventingunauthorized copying of data on data media, including CDs and DVDs.Generally, an authorized CD is designed to require decoding by anauthorized disc player. The authorized CD includes certain informationused by an authorized CD player for playing music. An unauthorizedcopied, formed or pressed CD, however, does not have the requisiteencryption/decryption key(s) necessary for decoding.

Consequently, a feature and advantage of present invention is to preventpiracy of audio and/or video data from discs; that is, to providegreatly enhanced security measures against CD pirating. The presentinvention is based, in part, on my discovery that the authorizationkey(s) need not necessarily be transferred in the audio usingconventional hardware and/or software in CD or DVD players that may beadapted in one or more ways described below.

In the present invention, predetermined errors are intentionallyembedded, in the data, and are used as a decryption key. A Reed-Solomondecoder is used to remove the predetermined errors/decryption key(s)from the audio data in a natural manner. Singular or multi-leveldecryption systems may be used for preventing unauthorized copying ofaudio data or other data on a disc. Similarly, two or three differentdecryption systems, each of which successively must be decrypted beforethe audio is finally available, may also be used.

Advantageously, the present invention optionally uses three or fourdifferent sources for making or compiling a long or compound keys. Thus,in other words, instead of, or in addition to, having a multi-layereddecryption or authorization system, the present invention optionallyincludes a multi-level decryption key, each component of which must befound in order to build the whole key to perform the entire decryptionor authorization process.

According to the present invention, the standard Reed-Solomon decodingmethod or other acceptable method, for example, is used to remove thepredetermined errors that are intentionally embedded on an originalauthorized CD from the audio. Thus, the predetermined errors areprevented from being transferred in the audio output from the CD playeror DVD player, and the like. The predetermined errors are configured asan authorization and/or decryption key(s) or a component thereof.

Advantageously, the predetermined errors are corrected before the audioinformation is output via, for example, a conventional Reed-Solomondecoder, which is present in all CD players. Upon playback, theReed-Solomon decoder, in correcting the predetermined errors, alsoautomatically removes, from the audio, the key(s) or code(s), orcomponents thereof appearing as predetermined errors, intentionallyembedded in the audio data.

Accordingly, the audio data contained on this particular CD is strippedof all necessary keys required for subsequent playback on another CDplayer or recorder. Thus, because predetermined errors have already beenremoved by the Reed-Solomon decoder from the output data, the second CDplayer/recorder, if positioned to intercept the audio or other dataoutput, does not receive any predetermined errors (or the authorizationand/or decryption keys/codes), and therefore, cannot play the datathereon. The second CD player/recorder cannot also record the audio dataonto an unauthorized CD with the keys that have been previouslyfiltered. Therefore, the present invention also prevents the manufactureand/or distribution of pirated CDs.

A further advantage of the present invention is that the predeterminederrors are optionally embedded in the data disc on a per track basis, orat intervals throughout the disc. This means that the same type ofauthorization process may be performed for each track to be played, ormay be performed throughout the playing/recording process. Thus, it isimportant to note that each track of a CD can optionally include adifferent authorization or decryption key.

FIG. 10 is a high-level block diagram of one embodiment of themethod/system of the present invention. The method generally consists ofthe step of introducing data containing errors, which is stored on amedia, to a Reed-Solomon decoder, as at 10. The data containing errorsmay be referred to as predetermined errors. At step 10, predeterminederrors are introduced into the Reed-Solomon decoder at a low error rate,optionally at a predetermined rate, that facilitates easy correction bythe decoder.

At the next step, as at 11, the decoder uses conventional decoder flags,such as the standard C1 flag output from the decoder, to filter orremove predetermined errors from the data. These errors are removed fromthe data without destroying the original data since the errors are smallor insignificant enough to not affect, for example, the audio databroadcast for the human ear. Moreover, predetermined errors are removedfrom the encrypted data as well. That is, the error removal step appliesequally well to data that is in plain text or in encrypted form, becausethe rules for removing errors are independent of the form of the data.Error corrector, or decoder, flags like C1 do not know whether the databeing handled is audio or video, or whether the data is encrypted.

Finally, after error removal, as at 12, data without the predeterminederrors are output from the R-S decoder.

FIG. 11 outlines a more detailed embodiment of the above method in moredetail. FIG. 11 illustrates a block diagram of the process by whichpredetermined errors are intentionally embedded in data stored on a discand are used as an authorization key or keys for authenticating theexistence of a non-pirated disc. The process begins with a data media,which may be a data disc or storage, a computer storage or a network ofcomputers having storage capacity, such as the Internet, capable ofstoring data.

In this embodiment, the data media is a CD 20 onto which predeterminederrors are intentionally embedded. Predetermined errors, in a digitalrecording, are normal on-off binary codes represented by ones and zerosin which normal binary codes are intentionally altered to representerrors. Of course, other data formats, including standard data formats,also apply in or to the present invention. For example, a normal binarycode represented by ‘0001’ may be configured as an error represented by‘0101’. Similarly, the binary code ‘00011’ may be changed to ‘00111’.These errors are mixed and edited with the original data before beingburned into a master disc, which is replicated to produce a desirednumber of CDs.

The resulting data 21 containing predetermined errors is introduced intoan authentication module 23 when disc 20 is inserted into a CD player 22of the present invention. Authentication module 23 is generally disposedwithin CD player 22, although it may optionally be located remote fromthe actual player device or box. CD player 22 uses the predeterminederrors in data 21 as keys for authenticating whether CD 20 is anon-pirated disc. Once CD 20 is authenticated, authentication module 23transfers data 21 to R-S decoder 24 or other standard decoder, whichintakes the data, rearranges it, compiles it into a table, performserror correction, and outputs the corrected data 25. The newly correcteddata 25 output from the CD player 22 is free of predetermined errors andcontains the original (audio) data only.

As described in FIG. 12, the CD player 22 of the present inventionincludes a fraud detector 35. Upon playback, disc player 22 beginsreading CD 20 by detecting bits, as at 30. Once data 21 is recoveredfrom disc 20, it must be demodulated, as at 31; that is, player 22 mustgo through a series of activities to decode audio information in orderto reconstruct an audio signal.

The other elements of the audio data path whose interaction ultimatelyproduces a stereo analog signal include buffer 32, an error correctioncircuit, as at 33, de-interleaving RAM 34 to which fraud detector 35 isconnected, concealment and demultiplexing circuit 36, and digitalfilters 37. Authentication module 23 is included in fraud detector 35.The process of converting the digital data to a stereo analog signalrequires one or two digital-to-analog converters 38 and low-pass filters39.

The servo control system 40 along with a display system, as at 41, worktogether in controlling the mechanical operation of the CD player 22.These operations include the player's spindle drive as well asauto-tracking and auto-focusing functions. Both systems 40, 41 alsodirects the user interface to the CD player's controls 42 and displays.

A microprocessor (not shown) monitors user controls and their interfaceto the player's circuitry, which includes subcode data decoding, as at43. Subcode data plays an important role in directing the pickup to theproper disc location. Moreover, the various elements of CD player 22shown in FIG. 12 are closely interrelated in a timing relationship, asat 43 and 44, that determines correct rotating speed and data outputrate, for example.

All of the above components illustrated in FIG. 12 generally comprisestandard components in CD players, with the exception of the frauddetector module 35. The fraud detector module 35 comprises either aseparate data processor, such as a standard microprocessor, thatperforms the functions described herein. Alternatively, fraud detectormodule 35 may advantageously be implemented on the existing processinghardware currently existing in CD players.

FIG. 13 illustrates a flow chart of the decision logic describingoperation of a disc player when attempting to play a CD in accordancewith one embodiment of the invention. The process begins at 50 when CD20 is inserted in a CD player 22. The player 22 begins reading the CD20, (Step 51), by detecting bits from the disc's surface (Step 52). Oncethe data is recovered, the data is demodulated using, for example,eight-to-fourteen modulation (Step 53). The demodulated data is sent toa buffer (Step 54), and forwarded for CIRC error correction (Step 55).

At Step 56, the player's circuitry or processes must determine whetherthe data on CD 20 contains the intentionally embedded predeterminederrors. If not, the disc is determined to be fraudulent (Step 57), andplayer 22 ends playback activity (Step 58). On the other hand, if it isfound that the disc 20 contains predetermined errors, the next Step 59is to read those errors and determine authentication key(s), anoperation performed by an authentication algorithm located withinauthentication module 23.

Once the authentication key(s) is/are read into the authenticationalgorithm, (step 60), it is then determined whether the authenticationkey(s) is/are correct (Step 61). The authentication algorithm in CDplayer 22 will have a component corresponding to the authenticationkey(s) on disc 20. If comparison of the component with the key(s) doesnot match, CD 20 is determined to be fraudulent (Step 62) and playbackactivity ends (Step 63).

If, on the other hand, it is determined that the component correctlymatches the authentication key(s), the player's circuitry is triggeredto begin the error removal process (Step 64) in which predeterminederrors are removed, data is filtered (Step 65) and ultimately convertedto sensible audible output data (Steps 66, 67). While the abovedescription focuses on a particular sequence of process steps, thepresent invention may alternatively be used via a different sequence ofthe above described steps.

FIG. 14 illustrates a flow chart of the decision logic describingoperations when a first CD plays the data to be recorded by a second CD.For simplicity, the CD player will be referenced as player #1, and theCD recorder will be referenced as recorder #2. Also, the first CD playedby player #1 will be referenced as CD #1, and the second CD recorded byrecorder #2 will be referenced as CD #2.

At inception, (Step 70), CD player #1 is connected to the output port ofrecorder #2, or other standard means for capturing the output of player#1. Playback begins when CD #1 is inserted into player #1 (Step 71).Recording begins when CD #2 is inserted into recorder #2 (Step 72). Thenext step in CD player #1 is the reading of CD #1, (step 73), bydetecting bits contained on the surface of CD #1 (Step 74).

Once the data is recovered, the data is demodulated using, for example,eight-to-fourteen modulation or other standard modulation (Step 75). Thedemodulated data is transferred and stored in a buffer, (Step 76). CIRCerror correction is then performed on the demodulated data (Step 77).

At Step 78 depicted in FIG. 15, the player's circuitry must determinewhether the data on CD #1 contains the intentionally embeddedpredetermined errors. If not, the disc is determined to be fraudulent,(Step 79), and player #1 ends playback activity (Step 80). See FIG. 15.

On the other hand, if it is found that the CD #1 contains predeterminederrors, the next step 81 in FIG. 16 is to read those errors anddetermine authentication key(s). Any standard authentication algorithmmay be used, such as data encryption standard (DES) and the like,located within the authentication module of CD player #1. See FIG. 16.

Once the authentication key(s) is/are read into the authenticationalgorithm, (Step 82), in a standard manner, and it is then determinedwhether the authentication key(s) is/are correct (Step 83). Theauthentication algorithm in CD player #1 will have a componentcorresponding to the authentication key(s) on CD #1. If comparison ofthe component with the key(s) does not match, CD #1 is determined to befraudulent, (Step 84), and playback activity ends. (Step 85)

If, on the other hand, it is determined in Step 83 that the componentcorrectly matches the authentication key(s), the player's circuitry istriggered to begin the error removal process, (Step 86), in whichpredetermined errors are removed, and the data is filtered (Step 87) andultimately converted to sensible audible output data (Step 88).

Referring to FIG. 17, at this juncture, the authentication process forplaying the CD is completed, and recorder #2 receives the audio datafrom CD #1 (Step 89). This data is free of predetermined errors and theauthentication key(s). Upon receipt, CD recorder #2 records the dataonto CD #2, a copy (Step 90). If CD #2 is later inserted into a CDplayer of the present invention, (e.g., a CD player equipped with afraud detector), it will be determined to be a fraudulent CD pursuant tothe above-mentioned process of FIG. 13, because CD #2 does not containthe requisite predetermined errors for authentication since these errorswere not transferred in the data, such as the audio data (Step 91).

FIG. 18 is an illustration of a main central processing unit forimplementing the computer processing in accordance with a computerimplemented embodiment of the present invention, when the data playerand/or recorder is part of a personal computing system. The proceduresdescribed above may be presented in terms of program procedures executedon, for example, a computer or network of computers.

Viewed externally in FIG. 18, a computer system designated by referencenumeral 140 has a central processing unit 142 having disk drives 144 and146. Disk drive indications 144 and 146 are merely symbolic of a numberof disk drives which might be accommodated by the computer system.Typically these would include a floppy disk drive such as 144, a harddisk drive (not shown externally) and a CD ROM indicated by slot 146.The number and type of drives varies, typically with different computerconfigurations. Disk drives 144 and 146 are in fact optional, and forspace considerations, may easily be omitted from the computer systemused in conjunction with the production process/apparatus describedherein.

The computer also has an optional display 148 upon which information isdisplayed. In some situations, a keyboard 150 and a mouse 152 may beprovided as input devices to interface with the central processing unit142. Then again, for enhanced portability, the keyboard 150 may beeither a limited function keyboard or omitted in its entirety. Inaddition, mouse 152 may be a touch pad control device, or a track balldevice, or even omitted in its entirety as well. In addition, thecomputer system also optionally includes at least one infraredtransmitter 176 and/or infrared receiver 178 for either transmittingand/or receiving infrared signals, as described below.

FIG. 19 illustrates a block diagram of the internal hardware of thecomputer of FIG. 18. A bus 156 serves as the main information highwayinterconnecting the other components of the computer. CPU 158 is thecentral processing unit of the system, performing calculations and logicoperations required to execute a program. Read only memory (ROM) 160 andrandom access memory (RAM) 162 constitute the main memory of thecomputer. Disk controller 164 interfaces one or more disk drives to thesystem bus 156. These disk drives may be floppy disk drives such as 170,or CD ROM or DVD (digital video disks) drive such as 166, or internal orexternal hard drives 168. As indicated previously, these various diskdrives and disk controllers are optional devices.

A display interface 172 interfaces display 148 and permits informationfrom the bus 156 to be displayed on the display 148. Again as indicated,display 148 is also an optional accessory. For example, display 148could be substituted or omitted. Communication with external devices,for example, the components of the apparatus described herein, occursutilizing communication port 174. For example, optical fibers and/orelectrical cables and/or conductors and/or optical communication (e.g.,infrared, and the like) and/or wireless communication (e.g., radiofrequency (RF), and the like) can be used as the transport mediumbetween the external devices and communication port 174.

In addition to the standard components of the computer, the computeralso optionally includes at least one of infrared transmitter 176 orinfrared receiver 178. Infrared transmitter 176 is utilized when thecomputer system is used in conjunction with one or more of theprocessing components/stations that transmits/receives data via infraredsignal transmission.

FIG. 20 is a block diagram of the internal hardware of the computer ofFIG. 18 in accordance with a second embodiment. In FIG. 20, instead ofutilizing an infrared transmitter or infrared receiver, the computersystem uses at least one of a low power radio transmitter 180 and/or alow power radio receiver 182. The low power radio transmitter 180transmits the signal for reception by components of the productionprocess, and receives signals from the components via the low powerradio receiver 182. The low power radio transmitter and/or receiver 180,182 are standard devices in industry.

FIG. 21 is an illustration of an exemplary memory medium which can beused with disk drives illustrated in FIGS. 18-20. Typically, memorymedia such as floppy disks, or a CD ROM, or a digital video disk willcontain, for example, a multi-byte locale for a single byte language andthe program information for controlling the computer to enable thecomputer to perform the functions described herein. Alternatively, ROM160 and/or RAM 162 illustrated in FIGS. 19-20 can also be used to storethe program information that is used to instruct the central processingunit 158 to perform the operations associated with the productionprocess.

Although processing system 140 is illustrated having a single processor,a single hard disk drive and a single local memory, processing system140 may suitably be equipped with any multitude or combination ofprocessors or storage devices. Processing system 140 may, in point offact, be replaced by, or combined with, any suitable processing systemoperative in accordance with the principles of the present invention,including sophisticated calculators, and hand-held, laptop/notebook,mini, mainframe and super computers, as well as processing systemnetwork combinations of the same.

Conventional processing system architecture is more fully discussed inComputer Organization and Architecture, by William Stallings, MacMillamPublishing Co. (3rd ed. 1993); conventional processing system networkdesign is more fully discussed in Data Network Design, by Darren L.Spohn, McGraw-Hill, Inc. (1993), and conventional data communications ismore fully discussed in Data Communications Principles, by R. D. Gitlin,J. F. Hayes and S. B. Weinstain, Plenum Press (1992) and in The IrwinHandbook of Telecommunications, by James Harry Green, Irwin ProfessionalPublishing (2nd ed. 1992). Each of the foregoing publications isincorporated herein by reference.

Alternatively, the hardware configuration may be arranged according tothe multiple instruction multiple data (MIMD) multiprocessor format foradditional computing efficiency. The details of this form of computerarchitecture are disclosed in greater detail in, for example, U.S. Pat.No. 5,163,131; Boxer, A., Where Buses Cannot Go, IEEE Spectrum, February1995, pp. 41-45; and Barroso, L. A. et al., RPM: A Rapid PrototypingEngine for Multiprocessor Systems, IEEE Computer February 1995, pp.26-34, all of which are incorporated herein by reference.

In alternate preferred embodiments, the above-identified processor, andin particular microprocessing circuit 158, may be replaced by orcombined with any other suitable processing circuits, includingprogrammable logic devices, such as PALs (programmable array logic) andPLAs (programmable logic arrays). DSPs (digital signal processors),FPGAs (field programmable gate arrays), ASICs (application specificintegrated circuits), VLSIs (very large scale integrated circuits) orthe like.

FIG. 22 shows a plurality of disc players and disc recorders 100-105,and workstations 106-108 connected to a global network, such as theInternet 109, via an Internet Service Provider 110, in accordance withone embodiment. The above system also accommodates Internet access toelectronic audio/video data files through home electronic equipment,such as television/stereos 111 and cable/modem 112. Thus, data mayemanate from, or be transmitted to, any one of these stations ordevices.

FIGS. 23-24 replicate the process shown generally in FIGS. 11 and 13-17,but as it applies to Internet-related playing and copying. For instance,FIG. 23 shows a block diagram of the process by which predeterminederrors are intentionally embedded in audio or video data stored in anelectronic file, and are used as an authentication key or keys forauthenticating the existence of a non-pirated efile. The process beginswith a data media, which may be a disc, a computer or a network ofcomputers, such as the Internet, capable of storing data.

In this embodiment, the data is an electronic video or audio data file(“efile”) 120 into which predetermined errors are intentionallyembedded. These errors are mixed and edited with the original video oraudio data and stored in the efile.

The resulting data (“efile data”) 121 containing predetermined errors istransmitted into an authentication module 123 when efile 120 isrequested by a user over the Internet. Authentication module 123 isdisposed, for example, at the ISP's web site 122, which uses thepredetermined errors in efile data 121 as keys for authenticatingwhether efile 120 is a non-pirated file. Once efile 120 isauthenticated, authentication module 123 transfers data 121 to a decoderweb crawler 124, which intakes the data, manipulates it, performs errorcorrection and outputs corrected data 125. The new corrected data 125 isfree of predetermined errors and contains the original (audio and/orvideo) data only.

The above description is one example of the architecture used toimplement the present invention, and other architectures may also beused. For example, the ISP website and/or server need not physicallyhouse or contain the authentication or decoder modules, but one or bothof these devices may be disposed remote to the ISP website and/orserver.

FIG. 24 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file retrievedvia the Internet for playing. The process begins at 130 when a useraccesses music and/or video file(s) on the Internet via an ISP's website 124. The ISP's decoder web crawler 124 begins reading the efile120, (Step 131), looking for predetermined errors (Step 132). If noerrors are found, efile 120 is determined to be fraudulent, (Step 133),and efile 120 is not transmitted to the user (Step 134). Thus,unauthorized access is prevented.

On the other hand, if it is found that efile 120 contains predeterminederrors, the next Step 135 is to read those errors and determine theauthentication key(s), an operation performed by an authenticationalgorithm located within authentication module 123.

Once the authentication key(s) is/are read into the authenticationalgorithm, (Step 136), it is then determined whether the authenticationkey(s) is/are correct (Step 137). The authentication algorithm at theISP's web site 122 will have a component corresponding to theauthentication key(s) in efile 120. If comparison of the component withthe key(s) does not match, efile 120 is determined to be fraudulent,(Step 138), and efile 120 is not transmitted to the user (Step 139).

If, on the other hand, it is determined that the component correctlymatches the authentication key(s), error correction occurs, (Step 140),in which predetermined errors are removed, data is filtered, data isconverted to sensible audio and/or video output data, and ultimatelytransmitted to the user. (Step 141).

FIG. 25 illustrates a flow chart of the decision logic describing theauthentication process of an electronic audio/video data file retrievedvia the Internet for copying. The process begins at 150 when a useraccesses music and/or video file(s) on the Internet via an ISP's website 124. The ISP's decoder web crawler 124 begins reading the efile120, (step 151), looking for predetermined errors (Step 152). If noerrors are found, efile 120 is determined to be fraudulent, (Step 153),and efile 120 is not transmitted to the user (Step 154). Thus,unauthorized access is prevented.

On the other hand, if it is found that efile 120 contains predeterminederrors, the next Step 155 is to read those errors and determine theauthentication key(s), an operation performed by an authenticationalgorithm located within authentication module 123.

Once the authentication key(s) is/are read into the authenticationalgorithm, (Step 156), it is then determined whether the authenticationkey(s) is/are correct (Step 157). The authentication algorithm at theISP's web site 122 will have a component corresponding to theauthentication key(s) in efile 120. If comparison of the component withthe key(s) does not match, efile 120 is determined to be fraudulent,(Step 158), and efile 120 is not transmitted to the user (Step 159).

If, on the other hand, it is determined that the component correctlymatches the authentication key(s), error correction occurs, (Step 160),in which predetermined errors are removed, data is filtered, data isconverted to sensible audio and/or video output data, and ultimatelytransmitted to the user (Step 161). The user's computer receives anefile 120 free of predetermined errors and authentication key(s), (Step162), at which point a user may record the efile 120 (Step 163). Thisefile 120 is considered fraudulent for purposes of future Internet use,pursuant to the process outlined in FIG. 24, because it does not containthe requisite predetermined errors for subsequent authentication.

FIG. 26 is an illustration of the architecture of the combined internet,POTS, and ADSL architecture for use in the present invention inaccordance with another embodiment. In FIG. 21, to preserve POTS and toprevent a fault in the ADSL equipment 254, 256 from compromising analogvoice traffic 226, 296 the voice part of the spectrum (the lowest 4 kHz)is optionally separated from the rest by a passive filter, called a POTSsplitter 258, 260. The rest of the available bandwidth—from about 10 kHzto 1 MHz—carries data at rates up to 6 bits per second for every hertzof bandwidth from data equipment 262, 264, 294. The ADSL equipment 256then has access to a number of destinations including significantly theInternet 268, and other destinations 270, 272.

To exploit the higher frequencies, ADSL makes use of advanced modulationtechniques, of which the best known is the discrete multitone (DMT)technology. As its name implies, ADSL transmits data asymmetrically—atdifferent rates upstream toward the central office 252 and downstreamtoward the subscriber 250.

Cable television providers are providing analogous Internet service toPC users over their TV cable systems by means of special cable modems.Such modems are capable of transmitting up to 30 Mb/s over hybridfiber/coax systems, which use fiber to bring signals to a neighborhoodand coax to distribute it to individual subscribers.

Cable modems come in many forms. Most create a downstream data streamout of one of the 6-MHz TV channels that occupy spectrum above 50 MHz(and more likely 550 MHz) and carve an upstream channel out of the5-50-MHz band, which is currently unused. Using 64-state quadratureamplitude modulation (64 QAM), a downstream channel can realisticallytransmit about 30 Mb/s (the oft-quoted lower speed of 10 Mb/s refers toPC rates associated with Ethernet connections). Upstream rates differconsiderably from vendor to vendor, but good hybrid fiber/coax systemscan deliver upstream speeds of a few megabits per second. Thus, likeADSL, cable modems transmit much more information downstream thanupstream.

The internet architecture 220 and ADSL architecture 254, 256 may also becombined with, for example, user networks 222, 224, and 228. Asillustrated in this embodiment, users may access or use or participatein the administration, management computer assisted program in computer240 via various different access methods. In this embodiment, thevarious databases 285, 286, 287 and/or 288 which may be used to storecontent, data and the like, are accessible via access to and/or bycomputer system 240, and/or via internet/local area network 220.

The above embodiments are only to be construed as examples of thevarious different types of computer systems that may be utilized inconnection with the computer assisted and/or implemented process of thepresent invention. Further, while the above description has focused onembedding predetermined errors on a specific media, such as a CD, thepresent invention may also be used to embed predetermined errors to adigital bit stream that is in the process of being transmitted from anoriginating area or device to a destination device. That is, theauthentication process of the present invention may be used toauthenticate a data stream or collection of data, as opposed to, or inaddition to, authenticating a specific media which has been used to playthe data.

The many features and advantages of the invention are apparent from thedetailed specification. Thus, it is intended by the appended claims tocover all such features and advantages of the invention that fall withinthe true spirit and scope of the invention. Further, since numerousmodifications and variations will readily occur to those skilled in theart, it is not desired to limit the invention to the exact constructionand operation illustrated and described. Accordingly, all suitablemodifications and equivalents may be resorted to, falling within thescope of the invention.

1. A method for validating at least one of a media and data stored onsaid media in order to prevent at least one of piracy, unauthorizedaccess and unauthorized copying of the data stored on said media,wherein predetermined errors are introduced with the data and storingthe data on said media, the predetermined errors comprising at least oneauthentication key or component thereof, for validating whether the atleast one of said media and data is authorized, said method comprisingthe steps of: (a) obtaining the data from said media; (b) obtaining thepredetermined errors from the data; (c) comparing the predeterminederrors to the at least one authentication key or component thereof; (d)validating the at least one of the media and the data responsive to thecomparing step; (e) removing the predetermined errors from the dataresulting in substantially the data; and (f) outputting the data as atleast one of audio, video, audio data, video data and digital datasubstantially free of the predetermined errors.
 2. A method according toclaim 1, wherein the predetermined errors comprise on-off binary codesrepresenting ones and zeros to represent a predetermined pattern usableas the at least one authentication key or component thereof.
 3. A methodaccording to claim 1, wherein said outputting step (f) further includesconverting the data to a stereo analog signal without transferring, inthe data, the predetermined errors used as the at least oneauthentication key or component thereof.
 4. A method according to claim1, wherein said method further includes the step of embedding both saidpredetermined errors and said data onto a data disc on at least one of aper track basis and on an interval basis throughout the disc, such thatthe authentication is preformed at least for at least one of each trackto be played, throughout playback and recording.
 5. A method accordingto claim 1, wherein said authenticating step further includes the stepof authenticating using a different authentication key for each track.6. A method according to claim 1, further including the step of using aprocess defined in at least one of the configuring, intentionallyembedding, introducing and outputting steps, as a multi-levelauthentication system containing at least two different authenticationkeys, each of which successively must be authenticated before saidcorrected data is finally output.
 7. A method according to claim 1,further including the step of at least one of performing said methodover a plurality of inter-connected computer networks comprising atleast one of a local network, a global network, and the Internet.
 8. Amethod according to claim 1, wherein said authenticating step furthercomprises authenticating the at least one of the media and the data,wherein the media is at least one of read from and recorded to at leastone of a disc player, a disc recorder, a computer, a work station and anetwork of computers.
 9. A method according to claim 1, wherein saidreading step (a) further comprises the step of at least one of decodingand decrypting the data from said media.
 10. A method for validating atleast one of a media and data stored on said media in order to preventat least one of piracy, unauthorized access and unauthorized copying ofthe data stored on said media, wherein at least one predetermined erroris introduced with the data and storing the data on said media, the atleast one predetermined error comprising at least one authentication keyor component thereof, for validating whether the at least one of saidmedia and data is authorized; said method comprising the steps of: (a)obtaining the data; (b) obtaining the at least one predetermined errorfrom the data; (c) comparing the at least one predetermined error to theat least one authentication key or component thereof; (d) validating theat least one of the media and the data responsive to the comparing step;(e) removing the at least one predetermined error from the dataresulting in substantially the data; and (f) outputting the data as atleast one of audio, video, audio data, video data and digital datasubstantially free of the at least one predetermined error.
 11. In amethod for validating at least one of data stored to be stored on atleast one media in order to prevent at least one of piracy, unauthorizedaccess and unauthorized copying of the data, a computer data message atleast one of stored, buffered and cached on a computer readable mediumcomprising at least one predetermined error introduced in the computerdata message comprising the computer data message, the at least onepredetermined error comprising at least one authentication key orcomponent thereof, used in validating whether the computer data messageis authorized, and wherein the predetermined errors are sufficientlyminimal such that the at least one predetermined error is removedtherefrom without substantially changing an audible component of thecomputer data message, and wherein the computer data message istransmitted substantially free of the at least one predetermined errorinhibiting a destination processor from determining the at least onepredetermined error comprising the at least one authentication key orcomponent thereof, used in the authenticating whether the computer datamessage is authorized.
 12. A method according to claim 10, wherein thepredetermined errors comprise on-off binary codes representing ones andzeros to represent a predetermined pattern usable as the at least oneauthentication key or component thereof.
 13. A method according to claim10, wherein said outputting step (f) further includes converting thedata to a stereo analog signal without transferring, in the data, thepredetermined errors used as the at least one authentication key orcomponent thereof.
 14. A method according to claim 10, wherein saidmethod further includes the step of embedding both said predeterminederrors and said data onto a data disc on at least one of a per trackbasis and on an interval basis throughout the disc, such that theauthentication is performed at least for at least one of each track tobe played, throughout playback and recording.
 15. A method according toclaim 10, wherein said authenticating step further includes the step ofauthenticating using a different authentication key for each track. 16.A method according to claim 10, further including the step of using aprocess defined in at least one of the configuring, intentionallyembedding, introducing and outputting steps, as a multi-levelauthentication system containing at least two different authenticationkeys, each of which successively must be authenticated before saidcorrected data is finally output.
 17. A method according to claim 10,further including the step of at least one of performing said methodover a plurality of inter-connected computer networks comprising atleast one of a local network, a global network, and the Internet.
 18. Amethod according to claim 10, wherein said authenticating step furthercomprises authenticating the at least one of the media and the data,wherein the media is at least one of read from and recorded to at leastone of a disc player, a disc recorder, a computer, a work station and anetwork of computers.
 19. A method according to claim 10, wherein saidreading step (a) further comprises the step of at least one of decodingand decrypting the data from said media.
 20. In a method according toclaim 11, wherein the predetermined errors comprise on-off binary codesrepresenting ones and zeros to represent a predetermined pattern usableas the at least one authentication key or component thereof.
 21. In amethod according to claim 11, wherein said outputting step (f) furtherincludes converting the data to a stereo analog signal withouttransferring, in the data, the predetermined errors used as the at leastone authentication key or component thereof.
 22. In a method accordingto claim 11, wherein said method further includes the step of embeddingboth said predetermined errors and said data onto a data disc on atleast one of a per track basis and on an interval basis throughout thedisc, such that the authentication is performed at least for at leastone of each track to be played, throughout playback and recording. 23.In a method according to claim 11, wherein said authenticating stepfurther includes the step of authenticating using a differentauthentication key for each track.
 24. In a method according to claim11, further including the step of using a process defined in at leastone of the configuring, intentionally embedding, introducing andoutputting steps, as a multi-level authentication system containing atleast two different authentication keys, each of which successively mustbe authenticated before said corrected data is finally output.
 25. In amethod according to claim 11, further including the step of at least oneof performing said method over a plurality of inter-connected computernetworks comprising at least one of a local network, a global network,and the Internet.
 26. In a method according to claim 11, wherein saidauthenticating step further comprises authenticating the at least one ofthe media and the data, wherein the media is at least one of read fromand recorded to at least one of a disc player, a disc recorder, acomputer, a work station and a network of computers.
 27. In a methodaccording to claim 11, wherein said reading step (a) further comprisesthe step of at least one of decoding and decrypting the data from saidmedia.