WO1998052194A1 - Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information - Google Patents

Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information Download PDF

Info

Publication number
WO1998052194A1
WO1998052194A1 PCT/US1998/009267 US9809267W WO9852194A1 WO 1998052194 A1 WO1998052194 A1 WO 1998052194A1 US 9809267 W US9809267 W US 9809267W WO 9852194 A1 WO9852194 A1 WO 9852194A1
Authority
WO
WIPO (PCT)
Prior art keywords
data storage
storage medium
certain portions
user information
data
Prior art date
Application number
PCT/US1998/009267
Other languages
French (fr)
Inventor
Jon J. Blixt
Original Assignee
Imation Corp.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Imation Corp. filed Critical Imation Corp.
Priority to AU74729/98A priority Critical patent/AU7472998A/en
Publication of WO1998052194A1 publication Critical patent/WO1998052194A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00094Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
    • G11B20/00123Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00572Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium
    • G11B20/00615Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the logical format of the recording medium, e.g. the structure of sectors, blocks, or frames
    • G11B20/0063Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which change the format of the recording medium said format change concerning the logical format of the recording medium, e.g. the structure of sectors, blocks, or frames wherein the modification to the logical format mainly concerns management data, e.g., by changing the format of the TOC or the subcode
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0092Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors
    • G11B20/00927Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches
    • G11B20/00934Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which are linked to media defects or read/write errors wherein said defects or errors are generated on purpose, e.g. intended scratches said intentional errors occurring because of corrupted address information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2121Chip on media, e.g. a disk or tape with a chip embedded in its case

Definitions

  • the present invention relates to data storage. More particularly, the present invention relates to preventing use of unauthorized copies of a data storage medium.
  • Optical media such as discs recorded in the Compact Disc-Read Only Memory (CD-ROM) format, have become a popular data storage medium for storing computer software. Their large storage capacity allows them to store programs that are too large to be stored practically on certain other types of removable media, such as magnetic media known as floppy disks.
  • CD-ROMs are capable of storing video clips and CD-quality audio clips.
  • Some of these techniques involve using certain codes that identify an optical medium as an original. These techniques can be defeated using an approach known as sequential copying, in which the data on an optical medium is read sequentially and copied to a writable optical medium. Using sequential copying, an optical recording device can make a copy of an optical medium that is indistinguishable from the original. In addition, many such techniques involve using circuitry to detect the codes. Optical recording devices that lack this detection circuitry can copy optical media despite the presence of the codes.
  • Some other copy protection techniques involve physically altering the original medium to render areas of the medium difficult or impossible to read and copy by an optical reading device.
  • An optical recording device can, however, copy the original medium by skipping over these areas. Because the original medium is physically altered, identifying the altered areas of the original medium is relatively easy. Furthermore, physical alterations may cause inconsistencies in playback from different optical reading device manufacturers. To prevent these inconsistencies, these techniques often use areas known as buffer zones to increase the error tolerance of the medium. These buffer zones use part of the user space on the medium and thus reduce the amount of space that can store other information.
  • the present invention is directed to a method for use in preventing use of unauthorized duplicates of an original data storage medium storing user information.
  • the method includes rendering certain portions of the data storage medium unreadable by modifying selected address information used for reading the data storage medium. Selected address segments of the data storage medium store the modified address and synchronization information. At least some of the user information is stored between the selected address segments.
  • a computer-executable program is stored on the original data storage medium. The computer- executable program, when executed, commands the data storage medium reading device to attempt to access the certain portions and determines whether to prevent or allow use of the user information as a function of whether the certain portions are inaccessible. Data recording apparatuses may perform these methods.
  • Still another embodiment of the present invention is directed to a data recording apparatus for use in preventing use of unauthorized duplicates of a data storage medium storing user information.
  • An encoding arrangement is coupled to receive a data stream and configured and arranged to encode the data stream as a modulated data stream.
  • a data processing arrangement is coupled to receive address information and is configured and arranged to modify the address information for rendering certain portions of the data storage medium inaccessible by a data storage medium reading device.
  • An oscillator is configured and arranged to generate a laser beam.
  • a modulator responsive to a control signal, is configured and arranged to modulate the laser beam.
  • a controller is responsive to the data processing arrangement and is configured and arranged to generate the control signal at least in part as a function of the modified address information.
  • Another embodiment of the present invention is directed to a data storage medium having a plurality of address segments storing address information altered to render certain portions of the data storage medium inaccessible by a data storage medium reading device.
  • the data storage medium stores a computer-executable program. When executed, the computer-executable program commands the data storage medium reading device to attempt to access the certain portions and determines whether to prevent or allow use of user information stored on the data storage medium as a function of whether the certain portions are accessible.
  • an authentication method comprises commanding a data storage medium reading device to attempt to access certain portions of a data storage medium.
  • the certain portions are inaccessible if the data storage medium is an original data storage medium, but are accessible if the data storage medium is an unauthorized duplicate of the original data storage medium.
  • the authentication method also includes determining whether to prevent or allow use of user information stored on the data storage medium as a function of whether the certain portions are accessible.
  • FIG. 1 is a plan view of an optical data storage medium, according to the present invention, illustrating logical structures for storing data
  • FIG. 2A is a diagram conceptually illustrating an example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 2B is a diagram conceptually illustrating another example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 3 is a block diagram of an optical recording device for recording data on the optical data storage medium of FIG. 1, according to the present invention
  • FIG. 4 is a flow chart of a method for preventing unauthorized duplication of an optical data storage medium, according to the present invention.
  • FIG. 5 is a flow chart of a method for authenticating an optical data storage medium, according to the present invention.
  • the present invention is believed to be applicable to a variety of systems and arrangements that prevent the use of unauthorized copies of optical storage media.
  • the invention has been found to be particularly advantageous in application environments in which a CD-ROM or other optical medium stores user information, such as a computer-executable program for use by a personal computer (PC) or other computer arrangement.
  • PC personal computer
  • An appreciation of various aspects of the invention is best gained through a discussion of various application examples operating in such an environment. While the examples are discussed in the context of the CD-ROM format, it should be understood that the techniques described can be adapted readily to a variety of optical storage formats. Examples of such formats include, but are not limited to, the Digital Video Disc - Read Only Memory (DVD-ROM) , CD-Erasable (CD-E) , and CD-Recordable (CD-R) formats.
  • DVD-ROM Digital Video Disc - Read Only Memory
  • CD-E CD-Erasable
  • CD-R CD-Recordable
  • FIG. 1 illustrates a CD-ROM 100 that includes a reflective substrate on which information is stored as pits in the substrate and lands between the pits.
  • the pattern of pits and lands represents the information stored on the CD-ROM 100. Any of a variety of techniques, including, for example, conventional photoresist techniques, can be used to create the pits.
  • the CD-ROM 100 includes a center aperture 102 to facilitate placement of the CD-ROM 100 in an optical reading device, such as a CD-ROM drive.
  • the CD-ROM 100 physically consists of a single spiral track from the inner perimeter of the CD- ROM 100 to the outer perimeter of the CD-ROM 100. While the spiral track is typically considered a single logical segment, the spiral track can be further divided into a plurality of logical segments 104, which are exaggerated on FIG. 1 for illustration purposes.
  • the logical tracks 104 are further divided into sectors 106.
  • the sectors 106 are also exaggerated on FIG. 1 for illustration purposes.
  • FIGS. 2A and 2B illustrate two example sector formats, according to the CD-ROM standard.
  • the sectors are illustrated as subdivided into distinct sections for purposes of clarity.
  • the sections are typically interleaved to improve error tolerance. Interleaving involves dividing the sector into subunits known as frames and arranging the frames such that an error reading the disc is less likely to affect the data read from the disc catastrophically.
  • the frames are twenty-four bytes long. Each CD-ROM frame is followed by a single byte of subcode data. The subcode bytes in a single sector combine to form a subcode section that contains certain format information.
  • FIG. 2A illustrates a sector format known as Mode 1.
  • a Mode 1 sector includes twelve bytes comprising a synchronization section 202 and a four- byte header section 204. Together, the synchronization and header sections 202 and 204 contain address information used by a CD-ROM drive to locate data on the disc.
  • the synchronization section 202 identifies the beginning of the sector.
  • Three bytes of the header section 204 comprise an index known as absolute time or ATIME. Absolute time identifies time indices from the beginning of the disc, e.g., using an internal clock of the optical reading device.
  • One byte of the header section 204 indicates the type of data, e.g., program data, contained in the sector.
  • the header section 204 is followed by a user information section 206 that stores user information, such as program data, image data, or audio data.
  • the user information section 206 is 2048 bytes long in a Mode 1 sector.
  • the user information section 206 is followed by a four-byte error detection code (EDC) 208 and an eight-byte reserved section 210.
  • the reserved section 210 is typically blank.
  • a 276-byte error correction code 212 follows the reserved section 210 and provides enhanced error correction.
  • An error detection/error correction (ED/EC) section 214 follows the error correction code 212 and provides basic error detection and correction functions.
  • the formatting information includes time index and audio track, e.g., song, information.
  • FIG. 2B illustrates a CD-ROM sector format known as Mode 2.
  • the Mode 2 format is similar to the Mode 1 format. In the Mode 2 format, however, the EDC section 208, the reserved section 210, and the ECC section 212 are absent. The space conserved by omitting these sections stores additional user information. Accordingly, the user information section 206 is 2336 bytes long in the Mode 2 format.
  • a manufacturer alters at least some of the synchronization and header sections on the CD-ROM. Modifying the synchronization and header sections renders certain portions of the CD-ROM difficult or impossible to read and copy. Accordingly, sequentially copying the CD-ROM is relatively difficult.
  • the manufacturer can alter either a small or a large number of the synchronization and header sections.
  • the manufacturer After altering a small number of the synchronization and header sections, the manufacturer optionally stores an authentication program on the disc.
  • the authentication program commands the CD-ROM drive to attempt to read the locations corresponding to the altered synchronization and header sections. If the disc is an original, the CD-ROM drive will be unable to read these locations. By contrast, an unauthorized copy of an original disc does not contain the altered synchronization and header sections, and the CD-ROM drive will successfully read the locations. Accordingly, the authentication program determines that the disc is an original and allows a user to use the disc if the CD-ROM cannot read the locations. Authenticating the CD-ROM as an original using an authentication program allows any CD-ROM drive to authenticate the CD-ROM. In addition, the authentication program prevents defeating the copyprotection by selectively copying user information and skipping the unreadable areas of the original CD-ROM.
  • the manufacturer can avoid using an authentication program by altering a large number of synchronization and header sections corresponding to relatively large areas of the disc. Altering more synchronization and header sections than the CD-ROM drive memory can store causes the CD-ROM drive to start and stop repeatedly when attempting to read these areas. Maintaining a sustained data rate for copying the disc is thus difficult, if not impossible.
  • FIG. 3 is a block diagram of an optical recording device, according to the present invention, used in producing a copy-protected CD-ROM.
  • a digital data stream 300 such as program information for a computer application, is provided to an encoder 302.
  • an encoder 302. For example, one type of encoder commonly used in recording data on CD-ROMs is known as an 8-to-14 modulation (EFM) encoder.
  • EFM 8-to-14 modulation
  • Encoders of this type encode data streams having eight-bit bytes, which are commonly used to store data on magnetic media, to a data stream having fourteen-bit bytes.
  • Optical storage media typically use fourteen-bit bytes to allow encoding of two consecutive ones using pits and lands.
  • an interface card converts the fourteen-bit code back to the eight-bit code used by the computer.
  • the encoder 302 provides the encoded data stream to a computer arrangement 306 that includes, for example, a CPU.
  • the computer arrangement 306 is implemented using, for example, a conventional personal computer (PC) or a group of computers.
  • a data processor 304 receives address information, e.g., synchronization and header information, and modifies it. Modifying this information renders certain areas of the disc unreadable. For example, the synchronization and header information may be modified at multiple locations, between which user information is stored on the CD-ROM. Modifying the synchronization and header information at several locations and placing user information between these locations makes it difficult to maintain the sustained read rate involved in copying a CD-ROM by causing the CD-ROM drive to start and stop repeatedly as it attempts to read the user information.
  • the data processor 304 provides the modified synchronization and header information to the computer arrangement 306.
  • the computer arrangement 306 then generates a recording signal based on the modified synchronization and header information and on the encoded data stream.
  • the encoder 302 and/or the data processor 304 can either be separate from the computer arrangement 306, as described, or integrated into the computer arrangement 306.
  • the encoder 302 and the data processor 304 can be implemented using a single card installed on a computer.
  • a modulator controller 308 receives the recording signal and generates the control signal used for controlling a modulator 310.
  • the modulator 310 modulates the intensity of a continuous-intensity laser beam generated by an oscillator 312.
  • FIG. 4 is a flow chart illustrating an example method for preventing use of unauthorized copies of an original CD-ROM, according to one embodiment of the present invention.
  • an encoder reads source data, such as software code. The encoder provides this source data to a computer arrangement, which selectively alters synchronization and header information for at least some of the sectors of the CD-ROM to be recorded, as depicted at a block 402.
  • the source data and the modified synchronization and header information are written to the CD-ROM.
  • an authentication program is stored on the CD-ROM.
  • the authentication program allows use of user information stored on the CD-ROM only if attempts to read particular portions of the CD-ROM produce read errors. Successfully reading the particular portions indicates that the CD-ROM does not contain the modified synchronization and header information and is therefore an unauthorized copy.
  • the authentication program may be incorporated into another application program stored on the CD-ROM.
  • FIG. 5 is a flow chart illustrating an example of the operation of the authentication program.
  • the authentication program commands the CD-ROM drive to read selected areas of the CD-ROM.
  • the authentication program determines whether the selected areas are readable, as depicted at a block 502. If the CD-ROM contains the modified synchronization and header information, the selected areas are unreadable. On the other hand, if the CD-ROM does not contain the modified synchronization and header information, attempts to read the selected areas are successful. Accordingly, as depicted at a block 504, if the selected areas of the CD-ROM are not readable, the authentication program permits use of user information stored on the CD-ROM. If, however, the selected areas are readable, the authentication program prevents the user from using the user information, as depicted at a block 506.
  • Modifying the synchronization and header information does not affect the manufacturing process. For example, the manufacturing process does not mistake these modifications as normal debris and does not attempt to correct for them by repairing the erroneous synchronization and header information. Furthermore, electrical testing of the CD-ROM does not reveal the modifications. The invisibility of the modifications to the manufacturing process renders circumventing the copy-protection difficult.
  • a sufficient number of synchronization and header sections are altered to render sequentially reading and copying the disc difficult or impossible.
  • this technique avoids the need for an authentication program. It should be understood, however, that this technique can be used with an authentication program or other copy-protection techniques for additional protection.

Abstract

A copy-protection method includes modifying address information (202, 204) on an optical disc (100). The modified address information (402) renders certain portions of the disc inaccessible and is not copied during typical copying operations. Storing user information (206) between the inaccessible portions prevents copying the user information to an unauthorized duplicate of the disc. Additionally, when a user wishes to use data stored on the disc, a disc reader optionally determines (502) whether the portions are accessible. If the portions are accessible (506), the user is prevented from using the data. If the portions are inaccessible (504), the user is permitted to use the data.

Description

ARRANGEMENT AND METHOD FOR PREVENTING USE OF UNAUTHORIZED DUPLICATES OF DATA STORAGE MEDIA USING
ADDRESS INFORMATION
Field of the Invention
The present invention relates to data storage. More particularly, the present invention relates to preventing use of unauthorized copies of a data storage medium.
Background of the Invention
Optical media, such as discs recorded in the Compact Disc-Read Only Memory (CD-ROM) format, have become a popular data storage medium for storing computer software. Their large storage capacity allows them to store programs that are too large to be stored practically on certain other types of removable media, such as magnetic media known as floppy disks. For example, CD-ROMs are capable of storing video clips and CD-quality audio clips.
The proliferation of optical recording devices and writable optical media in the consumer market has facilitated storage of data on CD-ROMs. Decreasing prices of both optical recording devices and writable optical media have given an increasing number of consumers access to this technology. As a result, unauthorized duplication of CD-ROMs is a significant concern in the software industry.
Several techniques have been proposed to prevent unauthorized duplication of optical media.
Some of these techniques involve using certain codes that identify an optical medium as an original. These techniques can be defeated using an approach known as sequential copying, in which the data on an optical medium is read sequentially and copied to a writable optical medium. Using sequential copying, an optical recording device can make a copy of an optical medium that is indistinguishable from the original. In addition, many such techniques involve using circuitry to detect the codes. Optical recording devices that lack this detection circuitry can copy optical media despite the presence of the codes.
Some other copy protection techniques involve physically altering the original medium to render areas of the medium difficult or impossible to read and copy by an optical reading device. An optical recording device can, however, copy the original medium by skipping over these areas. Because the original medium is physically altered, identifying the altered areas of the original medium is relatively easy. Furthermore, physical alterations may cause inconsistencies in playback from different optical reading device manufacturers. To prevent these inconsistencies, these techniques often use areas known as buffer zones to increase the error tolerance of the medium. These buffer zones use part of the user space on the medium and thus reduce the amount of space that can store other information.
Summary of the Invention
According to one embodiment, the present invention is directed to a method for use in preventing use of unauthorized duplicates of an original data storage medium storing user information. The method includes rendering certain portions of the data storage medium unreadable by modifying selected address information used for reading the data storage medium. Selected address segments of the data storage medium store the modified address and synchronization information. At least some of the user information is stored between the selected address segments. According to another embodiment of the present invention, a computer-executable program is stored on the original data storage medium. The computer- executable program, when executed, commands the data storage medium reading device to attempt to access the certain portions and determines whether to prevent or allow use of the user information as a function of whether the certain portions are inaccessible. Data recording apparatuses may perform these methods.
Still another embodiment of the present invention is directed to a data recording apparatus for use in preventing use of unauthorized duplicates of a data storage medium storing user information. An encoding arrangement is coupled to receive a data stream and configured and arranged to encode the data stream as a modulated data stream. A data processing arrangement is coupled to receive address information and is configured and arranged to modify the address information for rendering certain portions of the data storage medium inaccessible by a data storage medium reading device. An oscillator is configured and arranged to generate a laser beam. A modulator, responsive to a control signal, is configured and arranged to modulate the laser beam. A controller is responsive to the data processing arrangement and is configured and arranged to generate the control signal at least in part as a function of the modified address information.
Another embodiment of the present invention is directed to a data storage medium having a plurality of address segments storing address information altered to render certain portions of the data storage medium inaccessible by a data storage medium reading device. The data storage medium stores a computer-executable program. When executed, the computer-executable program commands the data storage medium reading device to attempt to access the certain portions and determines whether to prevent or allow use of user information stored on the data storage medium as a function of whether the certain portions are accessible.
According to another aspect of the present invention, an authentication method comprises commanding a data storage medium reading device to attempt to access certain portions of a data storage medium. The certain portions are inaccessible if the data storage medium is an original data storage medium, but are accessible if the data storage medium is an unauthorized duplicate of the original data storage medium. The authentication method also includes determining whether to prevent or allow use of user information stored on the data storage medium as a function of whether the certain portions are accessible.
The above summary of the invention is not intended to describe each disclosed embodiment of the present invention. This is the purpose of the figures and of the detailed description that follows.
Brief Description of the Drawings Other aspects and advantages of the present invention will become apparent upon reading the following detailed description and upon reference to the drawings, in which:
FIG. 1 is a plan view of an optical data storage medium, according to the present invention, illustrating logical structures for storing data; FIG. 2A is a diagram conceptually illustrating an example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention;
FIG. 2B is a diagram conceptually illustrating another example data format for storing data on the optical data storage medium of FIG. 1, according to the present invention; FIG. 3 is a block diagram of an optical recording device for recording data on the optical data storage medium of FIG. 1, according to the present invention; FIG. 4 is a flow chart of a method for preventing unauthorized duplication of an optical data storage medium, according to the present invention; and
FIG. 5 is a flow chart of a method for authenticating an optical data storage medium, according to the present invention.
Detailed Description of the Various Embodiments
The present invention is believed to be applicable to a variety of systems and arrangements that prevent the use of unauthorized copies of optical storage media. The invention has been found to be particularly advantageous in application environments in which a CD-ROM or other optical medium stores user information, such as a computer-executable program for use by a personal computer (PC) or other computer arrangement. An appreciation of various aspects of the invention is best gained through a discussion of various application examples operating in such an environment. While the examples are discussed in the context of the CD-ROM format, it should be understood that the techniques described can be adapted readily to a variety of optical storage formats. Examples of such formats include, but are not limited to, the Digital Video Disc - Read Only Memory (DVD-ROM) , CD-Erasable (CD-E) , and CD-Recordable (CD-R) formats.
FIG. 1 illustrates a CD-ROM 100 that includes a reflective substrate on which information is stored as pits in the substrate and lands between the pits. The pattern of pits and lands represents the information stored on the CD-ROM 100. Any of a variety of techniques, including, for example, conventional photoresist techniques, can be used to create the pits. The CD-ROM 100 includes a center aperture 102 to facilitate placement of the CD-ROM 100 in an optical reading device, such as a CD-ROM drive.
The CD-ROM 100 physically consists of a single spiral track from the inner perimeter of the CD- ROM 100 to the outer perimeter of the CD-ROM 100. While the spiral track is typically considered a single logical segment, the spiral track can be further divided into a plurality of logical segments 104, which are exaggerated on FIG. 1 for illustration purposes.
The logical tracks 104 are further divided into sectors 106. The sectors 106 are also exaggerated on FIG. 1 for illustration purposes.
FIGS. 2A and 2B illustrate two example sector formats, according to the CD-ROM standard. In FIGS. 2A and 2B, the sectors are illustrated as subdivided into distinct sections for purposes of clarity. Those skilled in the art will appreciate that, in practice, the sections are typically interleaved to improve error tolerance. Interleaving involves dividing the sector into subunits known as frames and arranging the frames such that an error reading the disc is less likely to affect the data read from the disc catastrophically. In the CD-ROM format, the frames are twenty-four bytes long. Each CD-ROM frame is followed by a single byte of subcode data. The subcode bytes in a single sector combine to form a subcode section that contains certain format information.
FIG. 2A illustrates a sector format known as Mode 1. A Mode 1 sector includes twelve bytes comprising a synchronization section 202 and a four- byte header section 204. Together, the synchronization and header sections 202 and 204 contain address information used by a CD-ROM drive to locate data on the disc. The synchronization section 202 identifies the beginning of the sector. Three bytes of the header section 204 comprise an index known as absolute time or ATIME. Absolute time identifies time indices from the beginning of the disc, e.g., using an internal clock of the optical reading device. One byte of the header section 204 indicates the type of data, e.g., program data, contained in the sector.
The header section 204 is followed by a user information section 206 that stores user information, such as program data, image data, or audio data. The user information section 206 is 2048 bytes long in a Mode 1 sector. The user information section 206 is followed by a four-byte error detection code (EDC) 208 and an eight-byte reserved section 210. The reserved section 210 is typically blank. A 276-byte error correction code 212 follows the reserved section 210 and provides enhanced error correction. An error detection/error correction (ED/EC) section 214 follows the error correction code 212 and provides basic error detection and correction functions. In the audio CD format, the formatting information includes time index and audio track, e.g., song, information.
FIG. 2B illustrates a CD-ROM sector format known as Mode 2. The Mode 2 format is similar to the Mode 1 format. In the Mode 2 format, however, the EDC section 208, the reserved section 210, and the ECC section 212 are absent. The space conserved by omitting these sections stores additional user information. Accordingly, the user information section 206 is 2336 bytes long in the Mode 2 format.
To prevent the use of software or other user information stored on an unauthorized copy of an original CD-ROM, according to the present invention, a manufacturer alters at least some of the synchronization and header sections on the CD-ROM. Modifying the synchronization and header sections renders certain portions of the CD-ROM difficult or impossible to read and copy. Accordingly, sequentially copying the CD-ROM is relatively difficult. The manufacturer can alter either a small or a large number of the synchronization and header sections.
After altering a small number of the synchronization and header sections, the manufacturer optionally stores an authentication program on the disc. The authentication program commands the CD-ROM drive to attempt to read the locations corresponding to the altered synchronization and header sections. If the disc is an original, the CD-ROM drive will be unable to read these locations. By contrast, an unauthorized copy of an original disc does not contain the altered synchronization and header sections, and the CD-ROM drive will successfully read the locations. Accordingly, the authentication program determines that the disc is an original and allows a user to use the disc if the CD-ROM cannot read the locations. Authenticating the CD-ROM as an original using an authentication program allows any CD-ROM drive to authenticate the CD-ROM. In addition, the authentication program prevents defeating the copyprotection by selectively copying user information and skipping the unreadable areas of the original CD-ROM.
As an alternative, the manufacturer can avoid using an authentication program by altering a large number of synchronization and header sections corresponding to relatively large areas of the disc. Altering more synchronization and header sections than the CD-ROM drive memory can store causes the CD-ROM drive to start and stop repeatedly when attempting to read these areas. Maintaining a sustained data rate for copying the disc is thus difficult, if not impossible.
FIG. 3 is a block diagram of an optical recording device, according to the present invention, used in producing a copy-protected CD-ROM. A digital data stream 300, such as program information for a computer application, is provided to an encoder 302. For example, one type of encoder commonly used in recording data on CD-ROMs is known as an 8-to-14 modulation (EFM) encoder. Encoders of this type encode data streams having eight-bit bytes, which are commonly used to store data on magnetic media, to a data stream having fourteen-bit bytes. Optical storage media typically use fourteen-bit bytes to allow encoding of two consecutive ones using pits and lands. During read operations of a CD-ROM drive, an interface card converts the fourteen-bit code back to the eight-bit code used by the computer.
The encoder 302 provides the encoded data stream to a computer arrangement 306 that includes, for example, a CPU. The computer arrangement 306 is implemented using, for example, a conventional personal computer (PC) or a group of computers. A data processor 304 receives address information, e.g., synchronization and header information, and modifies it. Modifying this information renders certain areas of the disc unreadable. For example, the synchronization and header information may be modified at multiple locations, between which user information is stored on the CD-ROM. Modifying the synchronization and header information at several locations and placing user information between these locations makes it difficult to maintain the sustained read rate involved in copying a CD-ROM by causing the CD-ROM drive to start and stop repeatedly as it attempts to read the user information. The data processor 304 provides the modified synchronization and header information to the computer arrangement 306. The computer arrangement 306 then generates a recording signal based on the modified synchronization and header information and on the encoded data stream. It should be understood that the encoder 302 and/or the data processor 304 can either be separate from the computer arrangement 306, as described, or integrated into the computer arrangement 306. For example, the encoder 302 and the data processor 304 can be implemented using a single card installed on a computer. A modulator controller 308 receives the recording signal and generates the control signal used for controlling a modulator 310. The modulator 310 modulates the intensity of a continuous-intensity laser beam generated by an oscillator 312. Accordingly, the modulator 310 produces a modulated laser beam having a modulation that varies as a function of the recording signal. An objective lens 314 focuses the modulated laser beam on a location of a CD-ROM or a master used for producing CD-ROMs. FIG. 4 is a flow chart illustrating an example method for preventing use of unauthorized copies of an original CD-ROM, according to one embodiment of the present invention. As depicted at a block 400, an encoder reads source data, such as software code. The encoder provides this source data to a computer arrangement, which selectively alters synchronization and header information for at least some of the sectors of the CD-ROM to be recorded, as depicted at a block 402. At a block 404, the source data and the modified synchronization and header information are written to the CD-ROM. As depicted at a block 406, an authentication program is stored on the CD-ROM. The authentication program allows use of user information stored on the CD-ROM only if attempts to read particular portions of the CD-ROM produce read errors. Successfully reading the particular portions indicates that the CD-ROM does not contain the modified synchronization and header information and is therefore an unauthorized copy. Alternatively, the authentication program may be incorporated into another application program stored on the CD-ROM. FIG. 5 is a flow chart illustrating an example of the operation of the authentication program. At a block 500 the authentication program commands the CD-ROM drive to read selected areas of the CD-ROM. The authentication program then determines whether the selected areas are readable, as depicted at a block 502. If the CD-ROM contains the modified synchronization and header information, the selected areas are unreadable. On the other hand, if the CD-ROM does not contain the modified synchronization and header information, attempts to read the selected areas are successful. Accordingly, as depicted at a block 504, if the selected areas of the CD-ROM are not readable, the authentication program permits use of user information stored on the CD-ROM. If, however, the selected areas are readable, the authentication program prevents the user from using the user information, as depicted at a block 506.
Modifying the synchronization and header information does not affect the manufacturing process. For example, the manufacturing process does not mistake these modifications as normal debris and does not attempt to correct for them by repairing the erroneous synchronization and header information. Furthermore, electrical testing of the CD-ROM does not reveal the modifications. The invisibility of the modifications to the manufacturing process renders circumventing the copy-protection difficult.
According to another embodiment of the present invention, a sufficient number of synchronization and header sections are altered to render sequentially reading and copying the disc difficult or impossible. By preventing sequential copying, this technique avoids the need for an authentication program. It should be understood, however, that this technique can be used with an authentication program or other copy-protection techniques for additional protection.

Claims

What is claimed is ;
1. For use in preventing use of unauthorized duplicates of a data storage medium (100) storing user information, a copy-protection method comprising: rendering certain portions of the data storage medium unreadable by modifying (402) selected address information (202,204) used for reading the data storage medium; storing (404) the modified address information in selected address segments of the data storage medium; and storing at least some of the user information (206) between the selected address segments.
2. The method of claim 1, further comprising: commanding (500) a data storage medium reading device to attempt to access the certain portions; and determining (502) whether to allow (504) or prevent (506) use of the user information as a function of whether the certain portions are accessible.
3. The method of claim 1, further comprising storing the user information and the address information in one of the following formats: DVD-ROM, CD-ROM, CD-E, and CD-R.
4. The method of claim 1, further comprising: storing on the data storage medium a computer-executable program (406) that, when executed, commands (500) a data storage medium reading device to attempt to access the certain portions, and determines (502) whether to prevent (506) or allow (504) use of the user information as a function of whether the certain portions are inaccessible.
5. For use in preventing use of unauthorized duplicates of a data storage medium (100) storing user information, a data storage apparatus comprising: an encoding arrangement (302) coupled to receive a data stream (300) and configured and arranged to encode the data stream as a modulated data stream; a data processing arrangement (304) coupled to receive address information and configured and arranged to modify (402) the address information (202,204) for rendering certain portions of the data storage medium inaccessible by a data storage medium reading device; an oscillator (312) configured and arranged to generate a laser beam; a modulator (310) responsive to a control signal and configured and arranged to modulate the laser beam; and a controller (308) responsive to the microprocessor arrangement (306) and configured and arranged to generate the control signal at least in part as a function of the modified address information and the modulated data stream.
6. The apparatus of claim 5, wherein the encoding arrangement comprises an EFM encoder, and wherein the controller is further configured and arranged to generate the control signal in part as a function of the user information.
7. The apparatus of claim 5 , wherein the data processing arrangement is further configured and arranged to command (308) the modulator to modulate the laser beam for storing an authentication program (406) on the data storage medium.
8. The apparatus of claim 7, wherein the authentication program comprises part of a computer- executable program and is configured and arranged to, when executed, command the data storage medium reading device to attempt (500) to access the certain portions, and determine (502) whether to prevent (506) or allow (504) execution of the computer-executable program as a function of whether the certain portions are inaccessible.
9. For use in preventing use of unauthorized duplicates of a data storage medium (100) storing user information, an authentication method comprising: commanding a data storage medium reading device to attempt (500) to access certain portions of the data storage medium, the certain portions being inaccessible if the data storage medium is an original data storage medium and accessible if the data storage medium is an unauthorized duplicate of the original data storage medium; and determining (502) whether to prevent (506) or allow (504) use of the user information as a function of whether the certain portions are accessible.
10. An optical data storage disc (100), comprising: a plurality of address segments storing address information (202,204) altered to render certain portions of the data storage disc inaccessible by a data storage disc reading device; and a computer-executable program (406) that, when executed, commands the data storage disc reading device to attempt (500) to access the certain portions; and determines (502) whether to prevent
(506) or allow (504) use of user information stored on the data storage disc as a function of whether the certain portions are accessible.
PCT/US1998/009267 1997-05-16 1998-05-06 Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information WO1998052194A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU74729/98A AU7472998A (en) 1997-05-16 1998-05-06 Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US85787497A 1997-05-16 1997-05-16
US08/857,874 1997-05-16

Publications (1)

Publication Number Publication Date
WO1998052194A1 true WO1998052194A1 (en) 1998-11-19

Family

ID=25326913

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1998/009267 WO1998052194A1 (en) 1997-05-16 1998-05-06 Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information

Country Status (2)

Country Link
AU (1) AU7472998A (en)
WO (1) WO1998052194A1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000068945A1 (en) * 1999-05-11 2000-11-16 Macrovision Corporation Secure compact disk and player
WO2000074053A1 (en) * 1999-05-26 2000-12-07 Macrovision Europe Limited The copy protection of digital audio compact discs
EP1081698A2 (en) * 1999-08-31 2001-03-07 Sony Corporation Recording medium, method and apparatus for producing recording medium and data recording method and apparatus
GB2357165A (en) * 1999-12-02 2001-06-13 Internat Federation Of The Pho A CD copy protection method and a method for restricting internet file downloads
WO2001052255A1 (en) * 2000-01-12 2001-07-19 Phenomedia Ag Data support and method for producing a copy protected data support
NL1015587C2 (en) * 2000-07-03 2002-01-04 Johannes Henricus Mari Heijden Information carrier, in particular music carrier.
US6425098B1 (en) 1998-10-20 2002-07-23 Midbar Tech (1998) Ltd. Prevention of disk piracy
EP1343163A2 (en) * 2002-03-06 2003-09-10 Victor Company Of Japan, Limited Information recording medium, authenticity checking and reading method therefor
WO2003077246A2 (en) * 2002-03-08 2003-09-18 First 4 Internet Ltd Copy protection system for data carriers
WO2003087888A2 (en) * 2002-04-10 2003-10-23 Verification Technologies, Inc. Content replication deterrent method on optical discs
US6747930B1 (en) 1996-12-24 2004-06-08 Hide & Seek Technologies, Inc. Data protection on an optical disk
US6842522B1 (en) 2000-06-01 2005-01-11 Macrovision Corporation Secure digital video disk and player
US6952479B2 (en) 2001-11-27 2005-10-04 Macrovision Europe Limited Dynamic copy protection of optical media
US6988206B1 (en) 1998-10-20 2006-01-17 Macrovision Europe Limited Prevention of CD-audio piracy using sub-code channels
GB2421350A (en) * 2004-12-20 2006-06-21 Macrovision Europ Ltd Copy protection for optical discs
GB2412004B (en) * 2004-02-19 2007-04-04 Macrovision Corp Improvements in or relating to the defeat of the copy protection of optical discs
US7356142B1 (en) 2000-05-10 2008-04-08 Macrovision Corporation Secure compact disk and player
US8059937B2 (en) 2004-02-19 2011-11-15 Rovi Solutions Corporation Relating to the copy protection of optical discs
EP2405431A1 (en) * 2010-07-05 2012-01-11 Thomson Licensing Optical medium enabling copy detection, copy detection device and method, and optical media manufacture method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4879704A (en) * 1986-07-21 1989-11-07 Matsushita Electric Industrial Co., Ltd. Optical disk, optical disk recording and reproducing apparatus and copy preventive method for optical disks
US5596639A (en) * 1993-07-26 1997-01-21 Elonex Ip Holdings Ltd. Cd-prom

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4879704A (en) * 1986-07-21 1989-11-07 Matsushita Electric Industrial Co., Ltd. Optical disk, optical disk recording and reproducing apparatus and copy preventive method for optical disks
US5596639A (en) * 1993-07-26 1997-01-21 Elonex Ip Holdings Ltd. Cd-prom

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6747930B1 (en) 1996-12-24 2004-06-08 Hide & Seek Technologies, Inc. Data protection on an optical disk
US7062784B2 (en) 1998-10-20 2006-06-13 Macrovision Europe Limited Prevention of disk piracy
US6425098B1 (en) 1998-10-20 2002-07-23 Midbar Tech (1998) Ltd. Prevention of disk piracy
US6988206B1 (en) 1998-10-20 2006-01-17 Macrovision Europe Limited Prevention of CD-audio piracy using sub-code channels
WO2000068945A1 (en) * 1999-05-11 2000-11-16 Macrovision Corporation Secure compact disk and player
GB2355575A (en) * 1999-05-26 2001-04-25 Macrovision Europ Ltd The copy protection of digital audio compact discs
KR100558342B1 (en) * 1999-05-26 2006-03-10 매크로비젼 코포레이션 The copy protection of digital audio compact discs
GB2355575B (en) * 1999-05-26 2003-07-23 Macrovision Europ Ltd The copy protection of digital audio compact discs
WO2000074053A1 (en) * 1999-05-26 2000-12-07 Macrovision Europe Limited The copy protection of digital audio compact discs
AU773875B2 (en) * 1999-05-26 2004-06-10 Rovi Solutions Corporation The copy protection of digital audio compact discs
US7304922B2 (en) 1999-08-31 2007-12-04 Sony Corporation Method and apparatus for producing a master disc on which digital data is recorded in synchronism with pre-recorded address data
US6985410B1 (en) 1999-08-31 2006-01-10 Sony Corporation Apparatus for recording digital data in synchronism with prerecorded address data
EP1081698A2 (en) * 1999-08-31 2001-03-07 Sony Corporation Recording medium, method and apparatus for producing recording medium and data recording method and apparatus
EP1081698A3 (en) * 1999-08-31 2003-04-23 Sony Corporation Recording medium, method and apparatus for producing recording medium and data recording method and apparatus
GB2357165B (en) * 1999-12-02 2004-06-16 Internat Federation Of The Pho Copyright protection system and method
GB2357165A (en) * 1999-12-02 2001-06-13 Internat Federation Of The Pho A CD copy protection method and a method for restricting internet file downloads
WO2001052255A1 (en) * 2000-01-12 2001-07-19 Phenomedia Ag Data support and method for producing a copy protected data support
US7356142B1 (en) 2000-05-10 2008-04-08 Macrovision Corporation Secure compact disk and player
US7310764B2 (en) 2000-06-01 2007-12-18 Macrovision Corporation Digital video disk and player and associated methods with proprietary format
US6842522B1 (en) 2000-06-01 2005-01-11 Macrovision Corporation Secure digital video disk and player
EP1176589A2 (en) * 2000-07-03 2002-01-30 van der Heijden, Johannes Henricus Maria Information-carrying medium, particularly a music-carrying medium
NL1015587C2 (en) * 2000-07-03 2002-01-04 Johannes Henricus Mari Heijden Information carrier, in particular music carrier.
EP1176589A3 (en) * 2000-07-03 2002-02-27 van der Heijden, Johannes Henricus Maria Information-carrying medium, particularly a music-carrying medium
US7707640B2 (en) 2001-11-27 2010-04-27 Macrovision Europe Limited Dynamic copy protection of optical media
US7661143B2 (en) 2001-11-27 2010-02-09 Macrovision Europe Limited Dynamic copy protection of optical media
US6952479B2 (en) 2001-11-27 2005-10-04 Macrovision Europe Limited Dynamic copy protection of optical media
EP1343163A3 (en) * 2002-03-06 2011-04-06 Victor Company Of Japan, Limited Information recording medium, authenticity checking and reading method therefor
EP1343163A2 (en) * 2002-03-06 2003-09-10 Victor Company Of Japan, Limited Information recording medium, authenticity checking and reading method therefor
WO2003077246A3 (en) * 2002-03-08 2004-09-02 First 4 Internet Ltd Copy protection system for data carriers
US7774850B2 (en) 2002-03-08 2010-08-10 First 4 Internet Ltd. Copy protection system for data carriers
WO2003077246A2 (en) * 2002-03-08 2003-09-18 First 4 Internet Ltd Copy protection system for data carriers
WO2003087888A3 (en) * 2002-04-10 2004-04-01 Verification Technologies Inc Content replication deterrent method on optical discs
WO2003087888A2 (en) * 2002-04-10 2003-10-23 Verification Technologies, Inc. Content replication deterrent method on optical discs
US7721338B2 (en) 2004-02-19 2010-05-18 Macrovision Corporation Defeat of the copy protection of optical discs
GB2412004B (en) * 2004-02-19 2007-04-04 Macrovision Corp Improvements in or relating to the defeat of the copy protection of optical discs
US8059937B2 (en) 2004-02-19 2011-11-15 Rovi Solutions Corporation Relating to the copy protection of optical discs
GB2421350B (en) * 2004-12-20 2007-05-02 Macrovision Europ Ltd Copy protection for optical discs
GB2421350A (en) * 2004-12-20 2006-06-21 Macrovision Europ Ltd Copy protection for optical discs
EP2405431A1 (en) * 2010-07-05 2012-01-11 Thomson Licensing Optical medium enabling copy detection, copy detection device and method, and optical media manufacture method and system

Also Published As

Publication number Publication date
AU7472998A (en) 1998-12-08

Similar Documents

Publication Publication Date Title
JP3888473B2 (en) Copy protection method for record carrier, copy protected record carrier and method for detecting access control information
RU2249861C2 (en) Copy protection of compact disks with digital audio record
KR100345970B1 (en) Data reproducing apparatus
US6646967B1 (en) Method for making copy protected optical discs
WO1998052194A1 (en) Arrangement and method for preventing use of unauthorized duplicates of data storage media using address information
KR100489912B1 (en) Information carriers, reading devices and methods of making the information carriers containing auxiliary information
US20060123483A1 (en) Method and system for protecting against illegal copy and/or use of digital contents stored on optical or other media
JP2575988B2 (en) Optical disk copy prevention method, optical disk and optical disk apparatus
JP2005505884A (en) Optical disc copy protection or related improvements
WO1998052114A1 (en) Arrangement for preventing use of unauthorized duplicates of a data storage medium using subcode and method therefor
US6487155B1 (en) Optical disc authentication using alternate data modulation encoding schemes
US6549494B2 (en) Information recording medium and recording/reproducing apparatus compatible with copy protection
US20070297759A1 (en) Copy Protection For Audio, Video, and/or A/V Navigation Data
EP2120236B1 (en) Optical media with control data in wobble
KR20030071807A (en) Cdrom copy protection
KR100551103B1 (en) Information recording medium, information recording medium authenticity checking method, information recording medium authenticity checking program, information recording medium sector reading method, and information recording medium sector reading program
JPH1145509A (en) Disk, its discriminating method and device, and its reproducing device
KR100608268B1 (en) Method and apparatus for protecting copyright of digital recording medium, and copyright protected digital recording medium
KR20040101480A (en) Method of copy detection and protection using non-standard toc entries
JPH10326463A (en) Disk, discriminating method therefor, discriminating device therefor, and reproducing device therefor
JPH04215153A (en) Information recording and reproducing device
JPH10326462A (en) Disk, discriminating method therefor, discriminating device therefor, and reproducing device therefor
JP2000331419A (en) Recording medium which prevents the use of unlawfully duplicated program or data on computer
US20040174787A1 (en) Recordable medium having a data recording area with an embedded non-recordable zone
JPH10241291A (en) Recording medium, identification method therefor, identification device therefor and reproducer therefor

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

NENP Non-entry into the national phase

Ref country code: CA

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998549300

Format of ref document f/p: F

122 Ep: pct application non-entry in european phase