Information authentication method (variants), discs player (variants) and gaming device (variants)

FIELD: technologies for authentication of information.

SUBSTANCE: method includes performing absolute identification for confirming legality of data carrier according to first rule in preset time. Authentication information is recorded on this data carrier in previously set position. Process of arbitrary authentication is performed for confirming legality of said data carrier in accordance to second rule in arbitrary time. First rule includes announcing confirmation of standard match, if information for authentication is detected as registered in selected preset position. Second rule in given arbitrary authentication process includes announcing standard match, if information for authentication is detected as not registered in arbitrary positions, different from given preset position.

EFFECT: higher reliability.

6 cl, 12 dwg

 

BACKGROUND of INVENTION

The technical field to which the invention relates.

The present invention relates to a method of authentication information reproduced from the recording medium to the disc type, the disc player is designed for playing media recording type disks, and the gaming device uses the information reproduced from the recording media of the disk type.

An overview of the state of the art to which this invention

In recent years, the media recording type disks that store the information registered in the form of grooves corresponding to the predefined format, are used as the main media. One of the features of these media recording type disks is a large capacity information storage.

Part of the recording media drive type, widely used, includes the protection of information while protecting the accumulated data from unauthorized copying. Such a secure media recording type disks prevent copying of the accumulated information without the consent of the author.

Information with secure media recording type disk is reproduced using special disc player.

Before reproduction of the information with the protected media C the recording disc type, the disc player decides to record a preset code for the protection of the accumulated information, that is the security code on the secure media type record disc. In other words, the disc player reproduces information from a secure media recording type disk after you confirm that this protected the recording medium type of the disk is a legitimate disk. This system of playing discs, in General, known as the security system.

Illegal reproduction of information with unprotected media type record discs, attempts were made to use a special device connected to the disc player.

First, was accepted to read the security code recorded in a specific area on the protected media type record disc loaded in the disc player, and thus to confirm the legitimacy of the protected media type record disc. Despite the actual inability to read data code protection above special device works like it could be considered a security code and to recognize the legitimate media type record disc, the legality of which really should not be confirmed.

Using the above special device resulting from the illegal copying of a recording medium of a disk type, the validity of which should not be confirmed, may be recognized as legitimate in% the SSE authentication when it is playing and can be reproduced by the disc player, to which it is a special device is connected.

SUMMARY of the INVENTION

Therefore, the aim of the present invention is a method of authentication information, providing reliable detection of the recording medium to the disc type, the validity of which should not be confirmed, or a special device, which may have been connected to the disc player to recognize the legitimate media type record disc, the validity of which should not be confirmed, to thereby suppress perform any operations with this media type record disc, as well as effectively preventing illegal copying of the recording medium to the disc type, the validity of which should not be confirmed.

Another objective of the present invention is to create a disc player having a means of authentication for the implementation of the above, authentication information, providing reliable detection of the recording medium to the disc type, the validity of which should not be confirmed, or a special device, which may have been connected to the disc player to recognize the legitimate media type record disc, the validity of which should not be confirmed, to thereby suppress execution as the x whatever operations with this media type record disc, as well as effective in preventing illegal copying of the recording medium to the disc type, the validity of which should not be confirmed.

Another objective of the present invention is to provide a gaming device having a means of authentication for the implementation of the above, authentication information, providing reliable detection of the recording medium to the disc type, the validity of which should not be confirmed, or a special device, which may have been connected to the disc player to recognize the legitimate media type record disc, the validity of which should not be confirmed, to thereby suppress execution, for example, the program read from the recording medium to the disc type.

The authentication information corresponding to the present invention, includes the steps to perform a process of absolute authentication carried out to confirm the legality of recording media using the information for authentication is registered on the recording medium in a preset position, preset time in accordance with the first rule, and process arbitrary authentication carried out to confirm the legality of the recording medium at an arbitrary time, in compliance and with the second rule.

A disc player for reproducing information on the recording medium drive type that matches the present invention, includes means absolute authentication process absolute authentication carried out to confirm the legality of recording media using the information for authentication is registered on the recording medium in a preset position, preset time in accordance with the first rule, and a means of arbitrary authentication process arbitrary authentication carried out to confirm the legality of the recording medium at an arbitrary time in accordance with the second rule.

The gaming device to perform processing operations using programs and data reproduced from the recording media corresponding to the present invention, includes means absolute authentication process absolute authentication carried out to confirm the legality of recording media using the information for authentication is registered on the recording medium in a preset position, preset time in accordance with the first rule, and a means of arbitrary authentication process arbitrary authentication the paths carried out to confirm the legality of the recording medium at an arbitrary time in accordance with the second rule.

First is the absolute authentication performed in a pre-specified time in accordance with the first rule and, if the result of the process of the absolute authentication is confirmation of compliance with the norm, then the process is arbitrary authentication performed at any time in accordance with the second rule.

Even in the case of connecting a special device for invalidation of the ability of the disk to the protection device for reproducing information from the recording media disk type, that is, the disc player is implemented with the aim of invalidating process absolute authentication, because the process is arbitrary authentication is performed at an arbitrary time and in accordance with a second rule different from the first rule in the absolute authentication process arbitrary authentication cannot be invalidated by using this special device.

If the information received as a result of illegal copying of a recording medium of a disk type must be reproduced by the disc player without special devices, PADCO destimage to this player in the process the absolute authentication this media type record disc is detected as resulting from illegal copying, and the disc player does not reproduce information from the recording media of the disk type.

If the information received as a result of illegal copying of a recording medium of a disk type must be reproduced by the disc player with a special device connected to this player to run the program registered on the media type record disc, the process is arbitrary authentication this media type record disc is detected as a result of the illegal copy or is it a special device is detected as connected, and there is a forced termination of the executable.

Therefore, even if a special device that can recognize the legitimate media type record disc, the validity of which should not be confirmed, connected to the disc player, the recording media of the disk type, the validity of which should not be confirmed, or it is a special device can be reliably detected and any operation with this media type record disc can be suppressed, enabling effective prevention of copying of this nositelyami disk type.

The process of absolute authentication can be performed when you first access the specified recording medium (12), and the process is arbitrary authentication at least once after the above process, the absolute authentication.

The first rule in the absolute process of authentication may be the announcement of the confirmation of compliance with the rule in the case, if authentication information detected as the registered preset position, and a second rule in the process arbitrary authentication - Declaration of conformity to the norm if the authentication information detected as unregistered.

The process of absolute authentication may include the process detection information for authentication, intended for detecting information recorded in a preset position, when the first request to the recording medium, and the process of selecting the absolute authentication, intended to declare conformity to the norm, if detektirovaniya information contains information for authentication, and the process is arbitrary authentication may include the process of detecting arbitrary information designed for detecting information from a arbitrary on what ogene, except for the specified preset position on the specified recording medium, and the process of selecting an arbitrary authentication, intended to declare conformity to the norm, if detektirovaniya information does not contain information for authentication.

The first rule in the absolute process of authentication may be the announcement of the confirmation of compliance with the rule in the case of reception of a signal indicating the registration information for authentication in a preset position, and a second rule in the process arbitrary authentication may be the announcement of the confirmation of compliance with the rule in the case of reception of a signal indicating the absence of the registration information for authentication.

The method may further include the step of using a medium of exchange for access to the recording medium and the output signal of conformity to the norm, if authentication information is registered in the preset position, the absolute process of authentication may include the process of selecting the absolute authentication intended for the announcement of the confirmation of compliance with the rule in the case of signal reception in normality, and the process is arbitrary authentication may include the process of selecting an arbitrary authentication is the first to announce the non-confirmation of compliance with the rule in the case of signal reception in normality.

Authentication information may be subject to modulation in the direction of the radius of the recording medium and registered on this recording media.

The recording medium may include a recording medium of a disk type, authentication information may be subject to modulation in the direction of the radius of the recording medium and registered on the recording medium, and the process of absolute authentication and process arbitrary authentication can include the steps of detecting a modulated component from the recording medium, the detection information for authentication from this modulated component, and a decision on the conformity detektirovanii information for authentication pre-defined information and to register this detektirovanii information in a pre-specified position and the output signal match the rule in the case of compliance detektirovanii information for authentication pre-defined information and to register this detektirovanii information in the pre - position.

The medium of exchange can contain a tool designed to perform the steps of detecting a modulated component from the recording medium, the detection information for authentication from this modulated component, and a decision is according detektirovanii information for authentication pre-defined information and to register this detektirovanii information in a pre-specified position and the output signal of conformity to the norm in the case of matching detektirovanii information for authentication pre-defined information and to register this detektirovanii information in a pre-specified position.

The method may further include the step of forced termination of the operations of the processing if the result of any process absolute authentication, no process arbitrary authentication is not confirmation of compliance with the norm. The method may further include the step of displaying information representing the results of the confirmation process as an absolute authentication and process arbitrary authentication performed before performing the forced completion of this process.

The above and other objectives, features and advantages of the present invention become more apparent from the following descriptions, conducted with reference to the accompanying drawings, in which preferred exemplary embodiment of the present invention shown with the use of illustrated examples.

BRIEF DESCRIPTION of DRAWINGS

figure 1 - block diagram of the video game device corresponding to the present invention;

figure 2 - block diagram of the detector security code and controller playing a CD that is included with the mechanism disk video game device;

figure 3 block diagram of the controller executing the program in video game devices;

4 is a structural diagram of a sequence of processing operations carried out by the means of authentication;

5 is a block diagram of the process of the absolute authentication;

6 is a block diagram of the selection process the authentication.

7 and 8 is a structural diagram of the process arbitrary authentication;

figure 9 - view of the image reproduced on the display screen;

figure 10 - General structural block diagram of the video game device;

11 is a top view of the video game device;

Fig - dimensional image of the video game device.

DESCRIPTION of the PREFERRED embodiment,

Video game device incorporating the principles of the authentication method information, the disc player and the gaming device of the present invention is described below with reference to figures 1-12.

Video game device, generally indicated by the position 10 in figure 1, uses a recording medium of a disk type, which can represent, for example, write-once compact disk, recordable CD-ROM, digital video disk, or the disk is write-once. This media type record disc is referred to as "optical disk".

As shown in figure 1, the video game device 10 has a mechanism for the disk 14, is intended to refer to the Opti is a mini disk 12 and read various programs and various data from the optical disk 12, and the controller program execution 16 designed to receive various programs and various data from this mechanism, the disk 14 and control the execution of programs in accordance with pre-defined sequences of operations.

The mechanism of the disk 14 has a motor drive 18 intended for rotation of the optical disk 12 around its own axis, the drive controller 20, which provides the management of this motor drive 18, and the optical read head 22, performing optical reading of data recorded on the optical disk 12, and the output electrical signal in the radio frequency range (signal)representing the read data.

This signal contains the data of the slow frequency modulation, the resulting oscillatory movement of notches and grooves, registered on the optical disk 12 in the direction of the radius, and basic data (programs and data), represented by notches registered on the optical disk 12.

In addition, the mechanism of the disk 14 has a detector security code 24, providing for the allocation of security code for authentication of the signal produced by the optical read head 22, and the master data demodulator 26, designed the La demodulation signal, produced by the optical read head 22, and converting this signal into the main data.

The mechanism of the disk 14 includes a controller playing the disc 28 that is designed to validate the security code in relation to the pre-set code and control the playback in accordance with the test results, the master data buffer 30 for storing the main data received from the master data demodulator 26, and the interface 32 that communicate depending on the type of the underlying data.

Controller execution program 16 has a controller 36 for displaying information related to at least the authentication on the display 34.

The optical read head 22 can move along the optical disk 12 in the direction of the radius with a drive head 38, which is controlled by the controller of the actuator head 40.

The management controller of the actuator 20, the drive controller of the head 40, the detector security code 24 and a controller playing the disc 28 is the CPU (Central processing unit) 42.

Video game device 10 operates as follows: the optical read head 22 performs optical reading of data recorded on the optical disk 12, and the output is s in the read data as a radio signal in the circuit system at a later stage. The code detector protection 24 detects the security code data from a slow frequency modulation and then carries out the verification of the code protection in relation to the pre-set code. The controller playing the disc 28 controls the mode of play in accordance with the test results obtained from the detector security code 24.

The master data demodulator 26 reads the basic data and transmits the key data through the master data buffer 30 and the interface 32 to the controller program execution 16. The controller program execution 16 manages the execution of programs related to these transferred to the main data, and a display controller 36 to reproduce image information for authentication on the display 34.

The management controller of the actuator 20 via the CPU 42 is used to supply power to the motor winding drive 18, which causes the optical disk 12 in rotation. The management controller of the actuator head 40 via the CPU 42 is carried out to ensure the possibility of moving the optical read head 22 of the drive head 38 along the optical disk 12 in the direction of the radius.

In figure 1 the basic data is recorded on the optical disk 12 in the form of a sequence of slots, modulated in accordance with, for example, Kodo is EFM-modulation (modulation scheme is "eight to fourteen"), which is the modulation scheme for digital audio.

If the optical disk 12 is a disk received on a normal channel (hereinafter referred to as "the legitimate disk"), then bits or grooves subjected slow (mechanical) frequency modulation in the direction of the radius in a fully peripheral or a separate signal region on the optical disk 12 in accordance with the process of modulation with a carrier that uses a signal with a frequency of 22.05 kHz, in the form of non-return-to zero.

The optical disk 12 is rotated at the predetermined linear velocity, for example, the motor drive 18. The management of this motor drive 18, the rotating optical disk 12, by using the controller of the actuator 20. The drive controller 20 provides power to the motor winding drive 18 in accordance with the control signal from the CPU 42.

The carrier signal with a frequency of 22.05 kHz is a signal having a frequency component of half the sampling frequency (44.1 kHz) CD-ROM drive. Pre-set authentication information, that is, security code, repeatedly registered in the field of TOC (table of contents) part subjected to a slow frequency modulation in the direction of the radius.

The security code may have data from some of the bytes and has a code, which is common to the various devices, the code field indicating a geographic location play a legitimate disc and single code assigned individually to each legitimate disk. If the optical disk 12 is an illegal disk, the optical disk 12 there is no record of any security code.

The optical read head 22 detects the signal coming from the optical disk 12 that is rotated by the motor drive 18, and forwards detektirovanii the signal in the detector security code 24 and the master data demodulator 26.

The optical read head 22 is moved along the optical disk 12 in the direction of the radius of the drive head 38. The drive head 38 moves the optical read head 22 to the desired position in the direction of radius of the optical disk 12. The drive head 38 is carried out in accordance with the control signal from the CPU 42.

Detector security code 24 is used for detecting a security code from a radio signal received from the optical disk 12. In particular, the code detector protection 24 detects component carrier with a frequency of 22.05 kHz of the signal, extracts data slow frequency modulation imposed on the component of the carrier frequency, and detects the code from these data, a slow frequency modulation. Detectored protection 24 makes a decision about whether the detected code is a security code or not.

The controller playing the disc 28 gives the command to start the authentication and the team at the end of the authentication in the CPU 42. The CPU 42 controls the process of detection performed by the detector security code 24, in accordance with the command to start the authentication and manages the detector security code 24 to output the selection in the controller playing the disc 28, carried out in accordance with the team at the end of the authentication.

The controller playing the disc 28 controls the playback of the optical disc 21 in accordance with the control signal supplied from the CPU 42, and the result of a decision by the code detector protection 24.

The master data demodulator 26 transmits the basic data obtained by demodulation of the radio signal using the EFM-modulation, in the master data buffer 30. The master data buffer 30 provides temporary storage of basic data and in response to the control signal from the controller playing the disc 28 carries forward these master data via the interface 32 to the controller program execution 16. If master data is an audio signal, the interface 32 outputs this audio signal to the output terminal of the sound signal 44.

Controller execution program 16 is used to control the execution of PR is grams. The display controller 36 in the structure of the controller program execution 16 controls the reproduction of images on the display 34 in certain cases, as described below.

The display 34 includes a display device on a screen having, for example, a liquid crystal display panel, and provides a playback image in accordance with the data display received by the controller program execution 16.

Detector security code 24 and the controller playing the disc 28 can be made in the form of independent components, however, it is possible to install as a functional block of the CPU 42.

The characteristic function video game device 10 is described below.

The characteristic function video game device 10 is to confirm the legitimacy of the optical disk 12 is carried out by using the information for authentication is registered on the disk at a preset position, preset time in accordance with the first rule (absolute)authentication and confirmation of the validity of the optical disk 12 is carried out at an arbitrary time in accordance with the second rule (process arbitrary authentication). This function is performed by the authentication tool 100, shown in figure 2.

The tool out is eficacia 100 is described below with reference to figure 2 and 3.

As shown in figure 2, the tool 100 includes an authentication means of detecting the modulated component 102, the detection means 104 and the selector authentication 106, which are part of the detector security code 24, and means for supplying commands to the playback 108, the picker absolute authentication 110 and a means for selecting an arbitrary authentication 112, which are part of the controller playing the disc 28. As shown in figure 3, the authentication tool 100 further contains a means to enhance the arbitrary authentication 114, the tool execution program 116, the selector signal authentication 118 and a means of enforcing end 120 included in the controller program execution 16.

A means of detecting the modulated component 102 realizes the function of the demodulation signal SRFread from the optical disk 12, and provides the read data slow frequency modulation Dw. The detection means 104 implements the function of detecting Dc code registered in the position corresponding to the positional data entered in the first register 130 or the second register 132, based on the resulting data reading slow frequency modulation. Picker authentication 106 implements a function for making the Oia decisions according detektirovanie code Dc code protection Ds, entered in the register 134, and outputs the result of the selection.

The means for supplying commands to the playback 108 generates a command for playing back the optical disk 12 in different positions of the treatment processes of the absolute and arbitrary authentication supplied to the CPU 42. Picker absolute authentication 110 is activated by the team at absolute authentication received from the tools command on the playback 108, and confirms the reliability of the selection received from the picker authentication 106, in accordance with the first rule. Means for selecting an arbitrary authentication 112 is activated by the command at arbitrary authentication received from the tools command on the playback 108, and confirms the reliability of the selection received from the picker authentication 106, in accordance with the second rule.

The first rule is to advertise conformity to the norm if the selection result received from the picker authentication 106, corresponds to the norm, and the announcement of the non-confirmation of compliance with the rule in the case, if the selection result received from the picker authentication 106, does not correspond to the norm. On the contrary, the second rule is to advertise conformity to the norm if the result of the selection, received from the picker authentication 106, does not correspond to the norm, and the announcement of the non-confirmation of compliance with the rule in the case, if the selection result received from the picker authentication 106, corresponds to the norm.

If the first access to the optical disk 12, the means for supplying commands to the playback 108 reads the position of the treatment, introduced in the first register 140, and supplies the resulting read these terms of circulation as a command to search in the CPU 42 in accordance with the command received from the CPU 42, in order to perform process absolute authentication.

The CPU 42 transmits the information, for example, these terms of reference, contained in the command to search supplied from the tools command on the playback 108 to the controller of the actuator head 40 (see Fig 1), and generates the trigger signal to the drive controller 20. In accordance with this trigger signal, the drive controller 20 provides power to the motor winding drive 18. In accordance with the information from the CPU 42, the controller of the actuator head 40 controls the drive head 38, which is provided by moving the optical read head 22 along the optical disk 12 in the direction of the radius at the position of the treatment, presents this is information.

As shown in figure 3, the tool execution program 116 implements a function of executing various programs. For example, if the result of the process of the absolute authentication is confirmation of compliance with the norm, the tool execution program 116 transmits the key data sent through the interface to the main memory (not shown), and executes the program transferred in this main memory. In addition, if the result of the process of the absolute authentication is confirmation of compliance with the norm, the tool execution program 116 continues to perform activated the program. In addition, the tool execution program 116 periodically or temporarily generates a control signal representing a command for activation of the Sa, which served as an instrument for arbitrary authentication 114.

In response to this command on the activation of the Sa from the tool execution program 116 a means to enhance the arbitrary authentication 114 generates a permission signal Sb indicating the beginning of a process of arbitrary authentication and entering the tool command to play 108, shown in figure 2.

Selector signal authentication 118 determines the signal authentication Sc from picker absolute authentication 110, or a means of arbitrary choice is Oh authentication 112 and generates a signal Sd. indicates the run/continue program, or signal Se indicating the forced completion of the program.

In particular, if the selector signal authentication 118 signal Sc1 indicating confirmation of compliance with the norm and coming from a picker absolute authentication 110 and means for selecting an arbitrary authentication 112, the selector signal authentication 118 produces a signal Sd supplied to the tool execution program 116 and indicating the success/continuation of the program. If the selector signal authentication 118 signal Sc2, pointing to the non-confirmation of conformity to the norm coming from the picker absolute authentication 110 and means for selecting an arbitrary authentication 112, the selector signal authentication 118 produces a signal Se received in the means of enforcing end 120 and indicating a forced program termination.

In response to a signal Se indicating the forced ending and coming from a selector signal authentication 118, a means of enforcing end 120 generates a command to generate interrupts coming in the tool execution program 116 and providing forced the end of the program currently executing.

<> In accordance with the enable signal Sb from a means of enhancing arbitrary authentication 114 and commands from the CPU 42, the tool command to play 108 reads the position of the treatment, introduced in the second register 142, and is supplying this data, the position of the treatment as a command to search in the CPU 42 in order to perform process arbitrary authentication.

In the process the absolute authentication CPU 42 transmits information, such as the provision of treatment contained in the command to search coming from the tools command on the playback 108, the controller of the actuator head 40 (see Fig 1), and generates the trigger signal to the drive controller 20. In accordance with this trigger signal, the drive controller 20 provides power to the motor winding drive 18. In accordance with the information from the CPU 42, the controller of the actuator head 40 controls the drive head 38, which is provided by moving the optical read head 22 along the optical disk 12 in the direction of the radius at the position of the treatment, presents this information.

In the process arbitrary authentication detection means 104 performs the detection of the Dc code, registered in the position of use, in accordance with a position is nymi data (position data conversion, introduced in the second register 142), introduced in the second register 132.

Because the code Dc, detektirovanii means of detection of 104 different from the security code Ds entered in the register 134, which is connected with the picker authentication 106, the selector authentication 106 outputs the result of the selection, which is a choice to support compliance with the norm.

However, as the picker arbitrary authentication 112 produces a signal Sc1, representing confirmation of compliance with the standard in accordance with the second rule if the selection result received from the picker authentication 106, is a choice to support compliance with the norm, the controller program execution 16 performs a process corresponding to the norm. That is, the selector signal authentication 118 produces a signal Sd supplied to the tool execution program 116 and indicating the success/continuation of the program.

Processing operations performed by the authentication tool 100 are described below with reference to figure 4-8.

The authentication tool 100 performs the process of absolute authentication in step S1 shown in figure 4.

The process of absolute authentication is described below with reference to figure 5 and 6.

In step S101 shown in figure 5, the means for supplying commands to the playback 108 decrees the AET preset initial position (the position of the treatment, entered in the first register 140) on the track record of the optical disk 12, and sends the command to search coming in the CPU 42 and providing search position conversion performed by the optical read head 22.

Next, in step S102, the controller playing the disc 28 sends the command to the rotation coming into the CPU 42 and provides the setting mode, the CPU 42 with standard performance.

In step S103, the CPU 42 controls the drive controller 20 to supply power to the motor winding drive 18 provided in accordance with the rotation filed in step S102. In addition, the CPU 42 controls the drive controller head 40 in accordance with the command in the search filed in step S101, in which the drive head 38 moves the optical read head 22 along the optical disk 12 in the direction of the radius before reaching the start position specified by the command to search.

Next, in step S104, the controller playing the disc 28 takes the team to play in the CPU 42 to reproduce information from the optical disk 12 from the specified start position. In step S105, the controller playing the disc 28 takes in the CPU 42 the command to start the authentication.

In step S106, the process of choosing the actual authentication is performed in accordance with the team n the beginning of the authentication. Figure 6 presents the sequence of processing operations in the process of selecting authentication.

In the process of selecting the authentication means of the detection of the modulated component 102 decides the presence of a component carrier with a frequency of 22.05 kHz in the signal SRFobtained by reading from the optical disk 12 is performed by the optical read head 22 in step S201 shown in Fig.6.

If the signal SRFthere is a component carrier with a frequency of 22.05 kHz, then control proceeds to step S202. If a component with a carrier frequency of 22.05 kHz in the signal SRFno, the control proceeds to step S207, in which announced the selection confirm compliance with the norm.

In step S202, the means of detection of the modulated component 102 decides on the imposition of a slow component of the frequency modulation component of the carrier frequency. If component a slow frequency modulation imposed on the component of the carrier frequency, the control proceeds to step S203. If component a slow frequency modulation is not imposed on the component of the carrier frequency, the control proceeds to step S207, in which announced the selection confirm compliance with the norm.

In step S203, the means of detection of the modulated component 102 demodula is the duty to regulate component carrier frequencies to identify a component of the slow frequency modulation, providing data slow frequency modulation Dw.

In step S204, the detection means 104 detects data (Dc code)specified positional data of the slow frequency modulation Dw entered in the first register 130.

In step S205, the picker authentication 106 decides accordance detektirovanie code Dc code protection Ds, entered in the register 134, a decision about whether the optical disk 12 legitimate disk or not.

If detektirovanii Dc code matches the code protection Ds, the control proceeds to step S206, in which it announced the selection of conformity to the norm. If detektirovanii Dc code does not match the code protection Ds, the control proceeds to step S207, in which announced the selection confirm compliance with the norm.

Returning to the program shown in figure 5, in step S107, the controller playing the disc 28 sends the command to the end of the absolute authentication in the CPU 42. In accordance with this team at the end of the authentication, the CPU 42 carries out the management code detector protection 24 to output the selection in the controller playing the disc 28.

In step S108, the picker absolute authentication 110 makes a decision in accordance with the first rule. If the result of the selection received from the picker authentication 106, shows the choice of conformity to the norm, then control proceeds to step S109, in which is declared on the choice of conformity to the norm and after which the process of absolute authentication fails.

If the result of the selection received from the picker authentication 106 indicates the selection confirm compliance with the norm, then control proceeds to step S110. In step S110, the controller playing the disc 28 decides whether the optical disk 12 by the disc or not in accordance with the data registered in the field of CBT optical disk 12.

If the optical disk 12 is not an audio CD, then control proceeds to step S111, in which is declared on the non-confirmation of conformity to the norm and after which the process of absolute authentication fails.

If in step S110 is decided that the optical disc 12 is a disc, then control proceeds to step S112 (.

In step S112 (controller playing the disc 28 carries out the reset conditions for playing disc for the optical disc 12 in the play mode of the CD-da and reproduces information from the optical disk 12. Terminal output the sound signal 44 shown in figure 1, displays the audio signal, and process the absolute authentication fails. At this stage the management of the authentication process stops and the control mode is Ohm audio processing.

Returning to the main program, shown in figure 4, in step S2 selector signal authentication 118 decides whether the result of a process of absolute authentication confirmation or non-confirmation of conformity to the norm. If the result of the process of the absolute authentication is confirmation of compliance with the norm, then control proceeds to step S3, in which the selector signal authentication 118 produces a signal Sd indicating the success/continuation of the program (in this case, the signal to activate the program)received in the tool execution program 116. In response to the signal Sd tool execution program 116 transmits the basic data obtained by the reading mechanism of the disk 14, the main memory (not shown).

In step S4, the display controller 36 provides an image that indicates confirmation of compliance with the norm, the screen 50 (see Fig.9) of the display 34 in accordance with the command received from the execution program 116.

For example, as shown in Fig.9, the reproduced image includes a header 52 of the game program read from the optical disk 12, the sequence of symbols 54 to verify, such as identifying the number of the optical disk 12, and the clause 56 of the war is no license.

After reproducing this image, control proceeds to step S5, in which the game program, for example, introduced into the main memory.

In step S6, a process executes arbitrary authentication. This process arbitrary authentication is performed if the tool execution program 116 periodically or temporarily generates a control signal representing a command for activation of the Sa, which served as an instrument for arbitrary authentication 114.

Process arbitrary authentication is described below with reference to Fig.7 and 8.

First, in step spider S301 demonstration purchased the existing state of the CPU 42. The controller playing the disc 28 controls the playback of the optical disk 12 under the control of the CPU 42. The mode of operation of the optical disk 12 under the control of the CPU 42 can thus be changed as the result of the command from the controller playing the disc 28 in the CPU 42.

In particular, in step spider S301 demonstration is determined that the current state of the CPU 42 corresponds to the reading mode, games, search, error, or rotation of drive. The processing operation indicated in step spider S301 demonstration, is if in the CPU 42 command is issued on the acquisition of the existing state of the CPU 42 from the controller playing the disc 28.

Next, in step W302 controller playing the disc 28 carries out the course of the ku existing state of the CPU 42, acquired in step spider S301 demonstration. If the current state of the CPU 42 corresponds to the reading mode, the game or search, the process is arbitrary authentication ends.

If the current state of the CPU 42 does not reflect either the read mode or the game mode and the search mode, the control proceeds to step S303.

In step S303, the decision on the rotation of the motor drive 18 in accordance with the existing state of the CPU 42, acquired in step spider S301 demonstration. If the motor drive 18 is rotated, the control proceeds to step S305.

If the motor drive 18 is not rotating, the control proceeds to step S304, in which the rotation of the motor drive 18 is supplied to the CPU 42.

Control then proceeds to step S305. In response to the submitted command, the CPU 42 controls the drive controller 20, which feeds power to the coil of the motor drive 18.

In step S305, the means for supplying commands to the playback 108 indicates an arbitrary initial position (the position of the treatment, introduced in the second register 142) on the track record of the optical disk 12, and sends the command to search coming in the CPU 42 and providing search position conversion performed by the optical read head 22.

Next, in step S306, the controller playing the disc 28 delivers what the team rotation, coming into the CPU 42 and enables the installation of the CPU 42 in the operating mode with the standard performance.

In step S307, the CPU 42 controls the drive controller 20, which feeds power to the coil of the motor drive 18 in accordance with the rotation filed in step S307. In addition, the CPU 42 controls the drive controller head 40 in accordance with the command in the search filed in step S307, in which the drive head 38 moves the optical read head 22 along the optical disk 12 in the direction of the radius before reaching the start position specified by the command to search.

Next, in step S308, the controller playing the disc 28 sends the command to play coming into the CPU 42 and ensuring the reproduction of information from the optical disk 12 from the specified start position.

In step 309, the controller playing the disc 28 gives the command to start an arbitrary authentication in the CPU 42.

In step S310, the process of choosing the actual authentication is performed in accordance with the team at the beginning of the arbitrary authentication.

The selection process authentication is performed in almost the same scheme, which is shown in Fig.6. In particular, the detection means 104 detects the data of the slow frequency modulation (Dc code) redesign the La S RFproduced by the optical read head 22, these positional data entered in the second register 132, and the picker authentication 106 decides accordance detektirovanie code Dc code protection Ds.

In the position specified in the process arbitrary authentication, security code Ds may not be registered, and a component carrier with a frequency of 22.05 kHz is unable to attend. Therefore, the selector authentication 106 makes the choice to support compliance with the norm.

Returning to the program shown in Fig.7, in step S107, the controller playing the disc 28 sends the command to the end of the arbitrary authentication in the CPU 42. In accordance with this team at the end of the authentication, the CPU 42 carries out the management code detector protection 24 to output the selection in the controller playing the disc 28.

As shown in Fig, in step S312, the picker arbitrary authentication 112 decides on the execution of the second rule.

If the result of the selection received from the picker authentication 106 indicates the selection confirm compliance with the norm, then control proceeds to step S313, in which is declared on conformity to the norm and after which the process is arbitrary authentication fails. If the result of the selection received from from the estva select authentication 106, indicates the choice of conformity to the norm, then control proceeds to step S314, in which is declared on the non-confirmation of conformity to the norm and after which the process is arbitrary authentication fails,

In step S7 of the main program, shown in figure 4, the selector signal authentication 118 decides whether the result of a process of arbitrary authentication confirmation or non-confirmation of conformity to the norm. If the result of a process of arbitrary authentication is confirmation of compliance with the norm, then control returns to step S5, in which the selector signal authentication 118 produces a signal Sd indicating the success/continuation of the program (in this case, the signal for the continuation of the program), received in the tool execution program 116. In response to the signal Sd tool execution program 116 allows the continuation of program execution, activated at the present time.

If the result of the process of the absolute authentication is the non-confirmation of compliance with the rule in the step S2 or the result of a process of arbitrary authentication is the non-confirmation of conformity to the norm in step S7, then the control proceeds to step S8, in which the selector signal authentication 118 produces a signal Se, postupayushie is in the means of enforcing end 120 and indicating a forced program termination.

In response to a signal Se tool forced the end of the 120 generates commands to the display controller 36 and provides an image that represents the non-confirmation of conformity to the norm, on the display screen 50. The display controller 36 controls the display 34, in which the display screen 50 is reproduced, the image representing the non-confirmation of conformity to the norm. For example, the display 34d plays the message "THIS DISC cannot BE USED.

In step S9 a means of enforcing end 120 sends the command to a forced end and terminating in a means of execution program 116. In response to this command on the forced termination and interruption of the means of execution program 116 forces the end of the program currently executing, and aborts the data transfer. For example, data in the memory type of the memory card, carrying out the storage of the intermediate result of the game is interrupted, resulting in the failure to store or read data.

In case the processing operations in step S9, the authentication tool 100 finishes executing processing operations.

The advantages provided by the authentication tool 100, described below. Prior to that, in terms of the program, shown on IG, accepted to perform in step S1, only the absolute authentication.

In particular, in the case of activating the game program data recorded in a specific area of the optical disk 12 is read in order to perform authentication. If the authentication result is confirmation of compliance with the norm, then control proceeds to step S5 to start the execution of the game program. If the authentication result is the non-confirmation of conformity to the norm, the execution of the game program does not start.

Therefore, if a special device for generating authentication data all the time connected to the video game device, the authentication result is possible at all times to obtain confirmation of compliance with the norm. If a special device for signal input indicating confirmation of compliance with the norm, is connected to the controller playing the disc 28, the result of authentication you all the time to obtain confirmation of compliance with the norm.

In the case of such special devices are provided to return the authentication result indicating normal reading authentication data is carried out regardless of which area of the optical disk 12 can be read.

In accordance with an example implementation of the crust is asego invention legality of the optical disk 12 is confirmed in any area at any time (arbitrary process authentication: step S6) in addition to the above-described authentication process (process absolute authentication).

In particular, since the authentication information is recorded only in a specific area of the optical disk 12, then no data is read authentication cannot be performed in case of reading an arbitrary region of the optical disk 12. If a special device for generating authentication data all the time connected to the video game device, the compensation of the authentication result indicating normal reading of authentication data, despite the inability of the device to read authentication data from the optical disk 12. In accordance with the above principles, the decision about connecting or nepodvedennye such a special device for authenticating an optical disc 12. An arbitrary region, mentioned above, is any area on the optical disc, except for the preset position in which the registered authentication information.

If the result of a process of arbitrary authentication is confirmation of compliance with the norm, that is, the selection result received from the picker authentication 106 indicates the selection confirm compliance with the norm, then control returns to step S5 and the game program is executed continuously.

If the result of the atom process arbitrary authentication is the non-confirmation of compliance with the norm, that is the result of the selection received from the picker authentication 106 indicates the choice of conformity to the norm, they interrupt the game or data transfer, preventing reading or storing this data and push the end of the currently executing program. At this time, on the screen 50 of the display 34 displays, for example, the message "THIS DISC cannot BE USED.

Therefore, even if a special device that is able as a rule to recognize the legitimate optical disk 12, the legality of which usually should not be confirmed, polietileno to the video game device 10, there can be provided a reliable detection of the optical disk 12, the legality of which usually should not be confirmed, or special devices to interrupt any operations, such as data in main memory or execution of the game program. This may effectively prevent illegal copying of the optical disc 12.

The authentication tool 100 can be provided as a library function or can be called and executed in the program of the application software.

Arbitrary position specified in the process arbitrary authentication

corresponding to the address. This address can be freely set as a parameter of the called library function and enter the second registers 132,142.

Since the address can be freely mounted on the stage of development of application software, for each header, each site and each of the N parts of the application software to effectively prevent copying can be set to your email address.

The General block diagram of the video game device 10 is described below with reference to figure 10. The scheme of the video game device 10 shown in figure 1, is a simplified structural diagram of the video game device 10 and corresponds to the General scheme of the video game device 10, shown in figure 10.

Thus, the optical disk 12, the motor drive 18, the drive controller 20, the optical read head 22, the drive head 38, and the controller of the actuator head 40, shown in figure 1, correspond to the optical drive 381 presented on figure 10. The interface 32 shown in figure 1, corresponds to the parallel interface input/output 396 and serial I/o 397, which are presented on figure 10. The display controller 36 shown in figure 1, corresponds SE 362 presented on figure 10. The CPU 42, shown in figure 1, corresponds to the CPU 351 that is presented is figure 10.

Video game device 10 reads the application program from the optical disk 12, and executes the application program in accordance with commands from the user, i.e. from the game player. For example, the video game device 10 executes the game program is mainly to manage the promotion of the game, playing the game images and sounds.

Video game device 10 includes a control system 350 includes a Central processing unit (CPU) 351 and its peripherals, graphic system 360 includes a graphic processor (GP) 362 for generating and storing image data in the frame buffer image 363, sound system 370 includes a sound processor (RFP) 371 for generating musical sounds and sound effects, the controller of the optical disk 380 for controlling an optical disk on which registered application program, the communication controller 390 to control signals from the manual controller 320 that provides input commands from a user, and data transmitted in charge memory 500, which registered the game settings, and portable electronic device 400, and from this memory card 500 and the portable electronic device 400, and the bus 395, which are connected to the control system 350, the graphic system 360, the sound system 370, the controller optical is one disk 380, and the communication controller 390, and the parallel interface input/output 396 and the serial I/o 397, which interact with other devices.

The control system 350 includes a CPU 351, a peripheral controller device 352, designed to control the interrupt and data transfer, direct memory access, main memory 353, including random-access memory (NVR)and permanent memory (ROM) 354 for storing various programs such as an operating system or other data used to control the main memory 353, graphic system 360 and the sound system 370.

The CPU 351 executes the full control of the video game device 10 as a result of implementation of the operating system, introduced in the ROM 354.

When enabled, the video game device 10, the CPU 351 implements the operating system introduced in the ROM 354, with the purpose of providing start control graphic system 360, the sound system 370, etc. When implementing this operating system CPU 351 fully initializes the video game device 301, for example, to confirm it works, and then controls the controller of the optical disk 380, with the aim of executing the application program registered on the optical disk 12. In the result of the execution of this application program, the CPU 351 controls the graphical si the topic 360, sound system 370, etc. depending on commands from the user for implementation thus control the playback of images and generation of musical sounds and sound effects.

In the control system 350 main CPU 351 executes the above-described authentication process with the purpose of deciding on the legality of the optical disk and prevent the reproduction data from the optical disk, which is illegal.

The graphic system 360 includes a car transfer geometric data 361, intended for the implementation of coordinate transformations and other processing operations, the graphics processor (GP) 362 for forming the image data in accordance with commands from the CPU 351, a frame buffer image 363 for storing the image data generated SE 362, and the decoder 364 images, designed for decoding image data compressed and encoded in the orthogonal type conversion, discrete cosine transform.

Machine transfer geometric data 361 has an arithmetic unit parallel actions to perform many arithmetic operations in parallel to each other and can perform coordinate transformation calculation of the parameters of the light source and the operations on matrices or vectors with high MSE of the spine in response to a request from the CPU 351. In particular, in the case of process uniform shading with the purpose of tracing, for example, a single polygon is triangular in shape in one color machine transfer geometric data 361 provides the ability to calculate the coordinates of a maximum of 1.5 million polygons per second. Machine transfer geometric data 361 allows video game machine 301 to reduce the load on the CPU 351, as well as to calculate the coordinates at high speed.

In accordance with the image formation from the CPU 351 SE 362 forms the ground or other surface and enters the appropriate data into the frame buffer image 363. SE 362 capable of producing a maximum of 360 thousand polygons per second.

The frame buffer image contains 363 dual port NVR and allows simultaneous storage of the image data generated SE 362, or image data transferred from the main memory 353 and reading of image data for display. The frame buffer image 363 has a memory capacity of, for example, 1 megabyte and appeal to him is as a 16-bit matrix, consisting of 1024 pixels in the horizontal direction and 512 pixels in the vertical direction.

The frame buffer image 363 has a display area for storing image data that is output as the output video data, and the scope cluts (reference t the blitz colors) for storing reference color table, to which SE 362

addresses in the formation of the ground or other surface, and the area of the texture to store the texture data, the coordinates of which are converted in the formation of the polygon and which are displayed on the ground, vicharchika SE 362. Region cluts and scope texture undergo dynamic changes as you change the display area.

The decoder 364 images, administered CPU 351, decodes the data, still or moving images entered in the main memory 353, and the entry of the decoded image in the main memory 353. The image data reproduced by the decoder 364 images, are transmitted to the frame buffer image 363 through SE 362 and the result can be used as a background image, licenciatura using SE 362.

The sound system 370 includes the CW 371, designed to generate, for example, musical sounds and sound effects performed in accordance with commands from the CPU 351, a sound buffer 372 for storing form data signals coming from the CW 371, and speaker 373 for example, musical sounds and sound effects generated by the CW 371.

The CW 371 implements adaptive differential pulse code modulation (ADIM)providing playback of 16-bit sounds of the x data, subjected to encoding using ADIM as 4-bit differential audio data, the playback function, ensuring the reproduction of the data waveforms entered in the audio buffer 372, to generate, for example, sound effects, and modulation, providing modulation and playback data waveforms, introduced in the audio buffer 372.

The sound system 370 can be used as a source of random sounds, generating commands from the CPU 351, such as musical sounds and sound effects in accordance with these waveforms, introduced in the audio buffer 372.

The controller of the optical disk 380 contains the optical drive 381, designed for playback of application programs and data recorded on an optical disc of write once type CD-ROM or other recording media, the decoder 382 for decoding programs and data recorded with the addition of error correction code, and the buffer 383 for temporarily storing data obtained by reading from the optical drive 381 that reads these data from the optical disk at a high speed. Decoder 382 is connected to the auxiliary CPU 384.

Registered on the optical disk audio data read is the optical drive 381, in addition to data ADIM include data PCM data obtained by converting analog audio signals. These ADIM representing registered as 4-bit differential data 16-bit digital data are decoded by the decoder 382, and then transferred to the CW 371 and after conversion thereby into an analog data is used for excitation dynamics 373. Data PCM data is registered as a 16-bit digital data are decoded by the decoder 382 and then used for excitation dynamics 373.

The optical disk used in the optical drive 381, may constitute, for example, so-called write-once CD-ROM. At least programs and data images used in the video game registered on the optical disk.

Communication controller 390 includes a control unit communication 391 designed to manage communication with the CPU 351 via the bus 395, the connector controller 309 connected to the hand controller 320 to input commands from a user, and a couple of modules to install a memory card or pin socket A, B for receiving the memory card 500 as an auxiliary memory for storing, for example, game settings, and portable electronic device 400, and the management of e is their modules to install memory card A, W is carried out by the control unit communications 391.

Video game device 10 has the ability to play video games in accordance with the program registered on the optical disk 12, which is loaded into the controller of the optical disk 380.

External structural details of the video game device 10 are described below with reference to 11 and 12.

Video game device 10 has a rectangular housing 302, almost in the centre of which is a module boot disk 303, designed for loading an optical disc of write once type CD-ROM or other recording media for the transmission of application programs, such as games. The housing 302 is equipped with a reset switch 304 to reset the video games, the power switch 305, a control switch disk 306, designed to control loading of the optical disk, and two contact sockets A, M.

In the video game the device, the application program can be transferred not only as a result of reading from the optical disk 12, but also through the communication channel.

Portable electronic device 400 and the manual controller 320 can be connected to the contact sockets A, B. System memory card can also be connected to the contact sockets A, M.

Manual controller 320 is supplied with the first and second keyboards PA the firs control 321, 322, the left button 323L, right 323R, key pad 324, selection key 325, rocker panels analog control 331, 332, switch mode 333, which is the choice of control modes for keyboard panel analog control 331, 332, and an indicator 334 to display the selected control mode.

Manual controller 320 also has a mechanism of transmission of vibrations (not shown), for transmitting vibrations to the manual controller 320 in accordance with the progress of video games. Manual controller 320 is electrically connected to the contact socket B in the housing 302 using the connector 326.

The result of connecting two manual controllers 32, respectively, to the contact sockets A, B two users or two game player can share a game system to play, for example, competitive games. The number of contact sockets in the video game machine 301 may not be limited to these two contact sockets A, M.

Portable electronic device 400 is composed of a management tool and the tool memory and can perform a predefined sequence of operations independently or in combination with the video game device 10. For example, portable electronic device 400 loads the data in video game devices is 10 and this video game device 10, plays the game when connected to the video game device 10.

In the illustrated embodiment, the main data modulated in accordance with EF-modulated and then registered in the form of notches and grooves on the optical disk 12. However, the basic data can be subjected to modulation in accordance with another process of modulation and then registered on the optical disk 12.

In the illustrated embodiment, the notches and grooves modulated in the direction of radius of the optical disk 12 in accordance with the process of modulation without returning to zero.

However, the notches and grooves may be subjected to modulation in the direction of radius of the optical disk 12 in accordance with another process of modulation. In the illustrated embodiment, the notches and grooves modulated in the direction of radius of the optical disk 12 using a component carrier with a frequency of 22.05 kHz. However, the notches and grooves may be subjected to modulation in the direction of radius of the optical disk 12 with the use of a component carrier of a different frequency.

The main data transferred to the controller program execution 16, illustrated as data representing the content of a particular game. However, the main data transferred to the controller executing the program 16 can be given the YMI, representing the contents of another program.

While the basic data has been illustrated as data representing a working program, the basic data may be data for execution of a particular sequence of processing operations, such as image data. If master data is such data, the controller program execution 16 executes a program for performing the above sequence of processing operations performed to process these basic data.

The data displayed on the display screen 34, illustrated as a header 52 of the game program read from the optical disk 12, the sequence of symbols 54 to verify, for example, the identifying numbers of the optical disk 12, and suggestions about 56 license. However, the data displayed on the display screen 34 may be various other data.

The above-described specific preferred embodiments of the present invention. However, it is clear that in the above detailed description, illustrated in the drawings, can be made a variety of changes and additions that are not beyond the scope of the invention defined by the attached claims.

1. The authentication method information, soderjashie process absolute authentication to confirm the legality of the recording medium (12), when this authentication information registered on the recording medium in a pre-set position in accordance with the first rule in a pre-specified time, and process arbitrary authentication to confirm the legitimacy of the specified recording medium (12) in accordance with the second rule at any time, characterized in that the first rule in the specified absolute authentication is to advertise conformity to the norm, if authentication information detected as checked at the specified preset position and said second rule in the specified process arbitrary authentication is to advertise conformity to the norm, if the information for authentication detected as unregistered in arbitrary positions other than the specified preset position.

2. The method according to claim 1, characterized in that the process specified absolute authentication contains the process detection information for authentication, designed to detect the information registered in the specified preset position when you first access the specified recording medium (12) and the process of selecting the absolute authentication is eficacia, designed to announce the confirmation of compliance with the norm, if detektirovaniya information includes authentication information, and the specified process arbitrary authentication includes the process of detecting arbitrary information designed for detecting information from an arbitrary position excluding the specified preset position on the specified recording medium, and the process of selecting an arbitrary authentication to declare conformity to the norm, if detektirovaniya information does not contain information for authentication.

3. The method according to claim 1 or 2, characterized in that the specified recording medium (12) contains a recording medium of a disk type, authentication information subjected to modulation in the direction of the radius of the specified recording medium (12) and registered on the recording media.

4. The method according to claim 1, characterized in that the process specified absolute authentication performed when you first access the specified recording medium (12), and the specified process arbitrary authentication is executed at least once after the above process, the absolute authentication.

5. The method according to claim 1, characterized in that it further contains the step of forced termination of the operations of the processing if the result of any specified item is ocess absolute authentication neither the above-mentioned process arbitrary authentication is not confirmation of compliance with the norm.

6. The method according to claim 1, characterized in that it further includes the step of displaying information representing the authentication result received as specified in the absolute process of authentication, and in the specified process arbitrary authentication.

7. The authentication information containing the steps of the process absolute authentication to confirm the legality of the recording medium (12), with authentication information registered on the recording medium in a pre-set position in accordance with the first rule in a pre-specified time, process arbitrary authentication to confirm the legitimacy of the specified recording medium (12) in arbitrary positions other than the specified preset position at an arbitrary time, the use of means of circulation (14) to refer to the specified recording medium (12) and the output signal of conformity to the norm, if authentication information is obtained by accessing the specified the recording medium (12), this process absolute authentication contains the selection process absolute authentication intended for the announcement of the confirmation of compliance with the rule in the case of reception indicated the data signal in normality, and the specified process arbitrary authentication includes the process of selecting an arbitrary authentication for the announcement of the non-confirmation of compliance with the rule in the case of receiving the specified signal in normality.

8. The method according to claim 7, characterized in that the specified recording medium (12) contains a recording medium of a disk type, authentication information modulated in the direction of the radius of the specified recording medium (12) and registered on the recording medium, the means of circulation (14) provides tools to perform the steps of detecting a modulated component from the recording medium (12); detection information for authentication from this modulated component, and a decision on the conformity detektirovanii information for authentication pre-defined information and output signal matching the rule in the case of compliance detektirovanii information for authentication pre-specified information.

9. A disc player for reproducing information on the recording media type disk (12), containing the means of the absolute authentication (24, 110) to perform a process of absolute authentication carried out to confirm the legality of the recording medium (12), with authentication information registered on this recording media is in a preset position in accordance with the first rule in the predefined time, and the means of arbitrary authentication (24, 112) to process arbitrary authentication carried out to confirm the legality of recording media in accordance with the second rule at any time, characterized in that the first rule in the specified absolute authentication performed by the specified means absolute authentication (24, 110), is the Declaration on conformity to the norm, if authentication information detected as checked at the specified preset position and said second rule in the specified process arbitrary authentication performed by means of arbitrary authentication (24, 112)is in the ad on confirmation of conformity to the norm, if authentication information detected as unregistered in arbitrary positions other than the specified preset position.

10. The disc player according to claim 9, characterized in that the said means absolute authentication (24, 110) includes a means of detecting information authentication (24) for detecting information recorded in the specified preset position, carried out during the first call to the specified recording medium (12), and means you the ora absolute authentication (110) to declare conformity to the norm, if detektirovaniya information includes authentication information, and the means of arbitrary authentication (24, 112) includes a means of arbitrary detection information for detecting information from an arbitrary position excluding the specified preset position on the specified recording medium (12), and means for selecting an arbitrary authentication (112) to declare conformity to the norm, if detektirovaniya information does not contain information for authentication.

11. The disc player according to claim 9 or 10, characterized in that the authentication information modulated in the direction of the radius of the specified recording medium (12) and registered on the recording media.

12. The disc player according to claim 9, characterized in that the said means absolute authentication (24, 110) includes a means for performing the specified process absolute authentication in accordance with a first rule, carried out at the first address to the specified recording medium (12), and the means of arbitrary authentication (24, 112) includes means for performing the specified process arbitrary authentication in accordance with the second rule, carried out at least once after the above process, the absolute SMTP authentic the tion.

13. The disc player according to claim 9, characterized in that it further includes means (120), designed to force the end of operation to perform processing if the result of this process absolute authentication performed by the specified means absolute authentication (24, 110)or the above-mentioned process arbitrary authentication performed by the specified means of arbitrary authentication (24, 112), is not confirmation of compliance with the norm.

14. A disc player for reproducing information on the recording media type disk (12), characterized in that it contains means absolute authentication (24, 110) to perform a process of absolute authentication carried out to confirm the legality of the recording medium (12), using the information for authentication is registered on the recording medium in a pre-set position in accordance with the first rule in a pre-specified time, and a means of arbitrary authentication (24, 112) to process arbitrary authentication carried out to confirm the legality of recording media in accordance with the second rule in arbitrary positions, excellent from the specified setpoint position at an arbitrary time, the means of circulation (14) to refer to the specified recording medium (2) and the output signal of conformity to the norm, if the authentication information retrieved by referring to the specified recording medium, characterized in that the said means absolute authentication (24, 110) contains a picker absolute authentication (110) to announce the confirmation of compliance with the rule in the case of receiving the specified signal in normality and the tool arbitrary authentication (24, 112) includes a means for selecting an arbitrary authentication (112) for the announcement of the non-confirmation of compliance with the rule in the case of receiving the specified signal in normality.

15. The disc player 14, wherein the authentication information modulated in the direction of the radius of the specified recording medium (12) and registered on the recording medium, and that the specified means of circulation (14) provides a means of detecting the modulated component (102) for detecting the modulated component with the specified recording medium (12); the detection means (104) for detecting information for authentication from the specified modulated component and the picker authentication (106) for a decision on the conformity detektirovanii information for authentication pre-defined information and the output of conformity to the norm in if detektirovanii detail is rmacie for authentication pre-specified information.

16. The gaming device to perform processing operations using programs and data reproduced from the recording medium (12), containing the means of the absolute authentication (24, 110) to perform a process of absolute authentication to confirm the legality of the recording medium (12), with authentication information registered on the recording medium in a pre-set position in accordance with the first rule in a pre-specified time, and a means of arbitrary authentication (24, 112) to process arbitrary authentication carried out to confirm the legality of recording media in accordance with the second rule at any time, characterized in that the first rule in the specified absolute authentication performed by the specified means absolute authentication (24, 110), is the Declaration on conformity to the norm, if authentication information detected as checked at the specified preset position and said second rule in the specified process arbitrary authentication performed by the specified means of arbitrary authentication (24, 112), is the Declaration on conformity to the norm, if the information for authentication of detection is on as unregistered in arbitrary positions, non-specified pre-specified position.

17. The game device according to item 16, characterized in that the said means absolute authentication (24, 110) includes a means of detecting information authentication (24) for detecting information recorded in the specified preset position, carried out during the first call to the specified recording medium (12), and the picker absolute authentication (110) to declare conformity to the norm, if detektirovaniya information includes authentication information, and the means of arbitrary authentication (24, 112) includes a means of detecting arbitrary information designed for detecting information from an arbitrary position except for a pre-specified specified position in the specified recording medium (12), and means for selecting an arbitrary authentication (112) to declare conformity to the norm, if detektirovaniya information does not contain information for authentication.

18. The game device according to item 16 or 17, characterized in that the specified recording medium (12) contains a recording medium of a disk type, authentication information subjected to modulation in the direction of the radius of the specified recording medium (12) and registered on this n is setele record.

19. The game device according to item 16, characterized in that the said means absolute authentication (24, 110) includes a means for performing the specified process absolute authentication in accordance with a first rule, carried out at the first address to the specified recording medium (12), and the means of arbitrary authentication (24, 112) includes means for performing the specified process arbitrary authentication in accordance with the second rule, carried out at least once after the above process, the absolute authentication.

20. The game device according to item 16, characterized in that it further includes means (120) to force the end of operation to perform processing if the result of this process absolute authentication performed by the specified means absolute authentication (24, 110)or the above-mentioned process arbitrary authentication performed by the specified means of arbitrary authentication (24, 112), is not confirmation of compliance with the norm.

21. The game device according to item 16, characterized in that it further contains a display device (36, 34) for displaying information representing the authentication result received from the specified funds absolute authentication (24, 110)and from the specified means of production is Olney authentication (24, 112).

22. The gaming device to perform processing operations using programs and data reproduced from the recording medium (12), containing the means of the absolute authentication (24, 110) to perform a process of absolute authentication to confirm the legality of the recording medium (12), with authentication information registered on the recording medium in a pre-set position in accordance with the first rule in a pre-specified time, and a means of arbitrary authentication (24, 112) to process arbitrary authentication carried out to confirm the legality of recording media in accordance with the second rule in arbitrary positions other than the specified preset position, at any time, the means of circulation (14) to refer to the specified recording medium (12) and the output signal of conformity to the norm, if the authentication information retrieved by referring to the specified recording medium (2), characterized in that the said means absolute authentication (24, 110) contains a picker absolute authentication (110) to announce the confirmation of compliance with the rule in the case of receiving the specified signal in normality and the tool arbitrary authentication (24, 112) contains the picker PR is arbitrary authentication (112) to declare about the non-confirmation of compliance with the rule in the case of receiving the specified signal in normality.

23. The game device according to claim 19, characterized in that the specified recording medium (12) contains a recording medium of a disk type, authentication information modulated in the direction of the radius of the specified recording medium (12) and registered on the recording medium, such medium of exchange (14) provides a means of detecting the modulated component (102) for detecting the modulated component with the specified recording medium (12); the detection means (104)designed to detect the information for authentication from the specified modulated component; and a selector authentication (106) for a decision on the conformity detektirovanii information for authentication pre-defined information and the output match the rule in the case of compliance detektirovanii information for authentication pre-specified information.



 

Same patents:

FIELD: optical data carriers.

SUBSTANCE: at least one free area is determined in position, following noted data area of user. Said free area is distributed in backward order from the last element of noted area. When replacing damaged elements of user data it is used from last elements of said free data area.

EFFECT: higher efficiency.

2 cl, 7 dwg

FIELD: optical data carriers.

SUBSTANCE: at least one free area is determined in position, following noted data area of user. Said free area is distributed in backward order from the last element of noted area. When replacing damaged elements of user data it is used from last elements of said free data area.

EFFECT: higher efficiency.

2 cl, 7 dwg

FIELD: optical data carriers.

SUBSTANCE: for protecting optical disk from recording, information concerning protection from recording is read, which is previously recorded in at least one zone of starting or ending area of data carrier, and it is determined, whether the latter is in state of recording protection. In variant, when carrier is placed in cassette body, and body has aperture for forbidding recording protection of data on disk, it is determined, if recording protection state of recording protection data written on disk is matches with state of recording protection of said aperture, and recording of new data is prevented, if said protection data and aperture position forbid recording. In a variant information concerning recording protection is stored in zones of disk identification of at least one of zones of starting and ending area of carrier.

EFFECT: higher efficiency.

5 cl, 16 dwg

The invention relates to a method of recording, the control method and device for recording

The invention relates to the field of copyright protection distributed audio data including audio data in the form of packets

The invention relates to the field of optical recording media, and in particular to methods of defect management, implemented by the equipment to record and/or playback

The invention relates to the application of a watermark in a digital image

Processor // 2248608

FIELD: computers, data protection.

SUBSTANCE: processor has bus interface device, device for selection/decoding of commands, device for dispatching/execution, program string decoding device, which string is selected from program and loaded in first levels command cash, which contains a set of N two-input elements XOR, keys memory, storing different N-bit decoding keys.

EFFECT: higher efficiency.

2 dwg

The invention relates to computing
The invention relates to computing, and in particular to information and computer systems and networks, and can be used in the network integrity monitoring for protection of information resources in workstations, informational, and functional servers, etc

The invention relates to computer technology and may find application in the organization of authorized access to resources of the computing system

The invention relates to the field of information security with cryptographic transformation of data

The invention relates to the field of authentication objects

The invention relates to methods of protecting computer memory from unauthorized access through an arbitrary communication channels and to the structure of the devices for implementing such methods

The invention relates to the field of computing, and in particular to means of information protection from unauthorized access to electronic computing systems (machines), local area networks (LAN) - based personal computers (PC)

The invention relates to a device for data exchange with setting permissions on data exchange

The invention relates to a method of monitoring the performance of computer programs in accordance with their intended purpose

FIELD: table games, in particular, "quadromino" type games.

SUBSTANCE: according to first version, game has one set of flat four-sided playing members with marks formed of various combinations of figures of from 1 to 3 applied to four sides of playing members, with orienting designations directed to one of sides being applied to playing members and number of figures on sides of playing members being proportional to number of orienting designations. Set includes two groups with equal number of playing members and number of figures on sides of playing members proportional to number of orienting designations in each group. Playing members have designations specific for each of said groups. Game has at least one playing field divided by linear markings into cells arranged in at least six vertical rows of cells and in at least four horizontal rows of cells having shape similar to that of playing members. Second version differs from first version in that playing field has at least eight vertical rows of cells and at least six horizontal rows of cells. Third version differs from second version in that orienting designations applied to playing members are directed toward one of corners. Such structure of game allows players to have equal winning chances.

EFFECT: simplified structure and increased entertaining effect.

17 cl, 9 dwg

Up!