Playback device and playback method

FIELD: data carriers.

SUBSTANCE: device for reproduction of data from data carrier, program zone of which is used for recording a set of files, and control zone - for controlling copy protection data concerning the file, recorded in program zone, has computer for calculating copy protection information for each time file is reproduced, comparison means for comparing value, calculated on reproduction command, being prior to current one, to value, calculated on current reproduction command, and if these values coincide, the last value is stored as copy protection value, calculated on reproduction command , prior to current one and control means for allowing reproduction of file, appropriate for current command, if value, calculated as response to command, previous relatively to current command, coincides as a result of comparison to value, calculated as a response to current command.

EFFECT: higher reliability, higher efficiency.

4 cl, 46 dwg

 

The technical field to which the invention relates.

This invention relates to a reproducing device and to a method for playback to check fake information file recorded in the removable memory card.

The level of technology

EEPROM (electrically erasable programmable permanent memory), which is electrically rewritable memory, requires a lot of space, since each bit consists of two transistors. Thus, integration of EEPROM are limited. To solve this problem was developed in flash memory, which allows a single bit using a single transistor with use of the system clears all bits. It is expected that flash memory will replace the conventional recording media such as magnetic disks and optical disks.

Memory card that uses flash memory, also known. The memory card can be easily combined with the device and separate from him. You can make a digital recording device/playback, which uses a memory card instead of a conventional CD (compact disk) or MD (mini-disk).

On the other hand, since the audio/video information is transferred in digital form and used in the media, the copyright protection is particularly important. In the field of information services, the user is alucam writer, on which the recorded digital audio/video information containing specific information about limit reproduction. In addition, the digital audio/video information containing specific information about restricting playback is transmitted to the user via digital broadcasting or the Internet. The user can reproduce or distribute audio/video information (content) in the course of time or number of times determined by the information to limit playback. If necessary, the user can record a desired audio/video information onto a memory card for a set fee.

The file containing the information about the restriction of play, it is easy to record and save, but if the information about the restriction playback faked using special tools, the reproducing side cannot detect the spoofed information about limit reproduction. As a simple way of detecting fake information about restricting playback, it is possible to use a cyclic redundancy check (CRC) and the value. However, after fake information about limit reproduction and counterfeiting CRC cannot identify spoofed information of playback restrictions.

The invention

The basis of the invention position is on the task of creating a playback device and method of play they allow to reliably identify spoofed information of playback restrictions and to prevent the reproduction of the content.

The first purpose of this invention is to provide a reproducing device for reproducing data from the recording medium having an area and management area, and zone program is used to write multiple files, and zone control is used to control prohibiting fake information about a specific file, recorded in the zone program, the device comprises a computational tool designed to calculate prohibiting falsification of information managed in the management area of the recording medium, each time you play the file recorded on the recording medium, compare tool to compare the values computed by the computing means in response to the previous current command to reproduce with the value computed by the computing means in response to the current command to the playback, and control means designed to allow playback of the file corresponding to the current command, in case of coincidence of the values calculated in response to the previous current command to reproduce, and the value calculated in response to the current command is to reproduce.

Another purpose of this invention is to provide a playback device for playback of the file from the recording medium on which recorded the main file and the control file playback, and the main file has the attribute header to control prohibiting the reproduction information file, the playback control is used to control at least the time information, the device contains a computational tool designed to calculate prohibiting falsification of information managed in the management area of the recording medium, using the specified function with each playing the main file recorded on the recording medium, and to calculate the time information using the specified function with each update of information time, comparing the first vehicle designed to compare the values computed by the computing means in response to the previous current command to reproduce, with the value calculated in response to the current command for the reproduction, the second comparing means designed to compare the value computed by the computing means, in the relevant previous information of time, with the value computed by the computing means, the corresponding current is the second time information, control tool designed to allow playback of the main file, if the calculated value, in response to the previous current command to the reproduction, as a result of comparison of the first comparing means coincides with the value corresponding to the current command to reproduce, or if the calculated value corresponding to the previous information of time, the comparison result of the second comparing means coincides with the value corresponding to the current time information.

In this case, if the number of times the ARTICLE a track zero (namely, P=0) and the number of times the MT is allowed to play equal to the specified value (namely, MT is any integer other than zero), it is concluded that the playback operation is performed is allowed to play a number of times. Thus, the playback operation of the track is prohibited.

These and other objectives of the invention, the characteristics and advantages of the present invention follow from the following detailed description of a preferred variant implementation of the invention described with reference to the accompanying drawings.

Brief description of drawings

In the drawings shows:

figure 1 depicts a block diagram of a digital audio playback device that uses ene card is gentamicina memory according to this invention;

figure 2 - block diagram of the internal structure of the DSP 30, according to this invention;

figure 3 is a block diagram of the internal structure of the memory cards 40, according to this invention;

4 is a block diagram of the structure of the file management memory cards as a storage medium, according to this invention;

5 is a block diagram of the physical structure of the data in the flash memory 42 of the memory cards 40, according to this invention;

6 is a data structure of the memory cards 40, according to this invention;

Fig.7. scheme of the hierarchy of the file structure on the card 40 memory;

Fig diagram of the data structure of the file PBLIST.MSF control playback, which is a subdirectory recorded in the card 40 memory;

Fig.9 is a diagram of a data structure when one ATRAC3 data file is divided into blocks with a given length of the module and added attribute files.

figa diagram of the structure of the files before editing two files using the combining process;

figv diagram of the structure of the files after editing two files using the combining process;

figs diagram of the structure of the files after editing one file by using a separation process;

11 is a diagram of a data structure of the file PBLIST control playback;

figa diagram of the data structure field zagalo the CA file PBLIST control playback;

figv diagram of the structure of the data region of the main data file PBLIST control playback;

figs diagram of the data structure of the additional information data file PBLIST control playback;

Fig - correlation table of types of additional information data and values of their codes;

Fig - correlation table of types of additional information data and values of their codes;

Fig - correlation table of types of additional information data and values of their codes;

figa diagram of the structure of the additional information data;

figv diagram of the data structure, when the additional information data is the name of the executor;

figs diagram of the data structure, when the additional information code is copyright;

fig.16D diagram of the data structure, when the additional information is information date/time;

file diagram of the data structure, when the additional information data are log file playback;

Fig diagram of the detailed data structure of the ATRAC3 data file;

Fig diagram of the data structure of the upper part of the attribute header, which is included in the ATRAC3 data file;

Fig diagram of the data structures of the middle part of the attribute header, which is included in the file data is ATRAC3;

Fig - correlation table record mode, recording time, etc.;

Fig - state table copy management;

Fig diagram of the data structure of the lower part of the attribute header, which is included in the ATRAC3 data file;

Fig diagram of the data structure of the header of the data block of the ATRAC3 data file;

figa-24C - a graphical chart of the program of recovery method, according to this invention, when the destroyed area FTA;

Fig diagram of the structure of the files in the card 40 memory according to the second variant of implementation of the present invention;

Fig diagram of the relationships between file TRKLIST.MSF information management tracks and A3Dnnnnn.MSA ATRAC3 data file;

Fig diagram of the detailed structure of the data file TRKLIST.MSF information management tracks;

Fig diagram of the detailed structure of the data NAME1 to manage names;

Fig diagram of the detailed structure of the data NAME2 management titles;

Fig diagram of the detailed structure of the data A3Dnnnnn.MSA ATRAC3 data file;

Fig diagram of the detailed structure of the data file INFLIST.MSF, which represents additional information;

Fig diagram of the detailed structure of the data file INFLIST.MSF, which represents the data of the additional information;

Fig - graphical chart of the program of recovery method, according to the second variant of implementation of the present invention, when the learn when destroyed area FTA;

Fig is a block diagram of a circuit for detecting forgeries, according to this invention;

Fig - graphic program way to detect forgeries, according to the first variant implementation of the present invention;

Fig - graphic program way to detect forgeries, according to the second variant implementation of the invention.

Detailed description of embodiments of the invention

Below is a description of options for performing the present invention. Figure 1 shows a block diagram of a digital recording device/playback, which uses a memory card, according to one variant of implementation of the present invention. Digital recorder/playback of sound records and reproduces the digital audio signals using a removable memory card. In fact, the recording/playback of sound included in the sound system along with amplifying unit, loudspeaker, CD player, music player, mini disc, tuner, etc. However, it should be noted that this invention can be applied to other recording devices. In other words, this invention can be applied in portable recording devices/sound playback. Additionally, the invention can be applied to those whom pristavka, which records the digital audio data, which are distributed satellite communication, digital broadcasting or the Internet. In addition, this invention can be used in the system that records/reproduces data of the moving image and still image data instead of audio data. The system, according to a variant implementation of the present invention can record and reproduce additional information, such as images or text instead of the digital audio signal.

The recorder/playback has an integrated circuit 10 audio encoder/decoder integrated circuit 20 protection, the digital processor 30 signals (DSP 30). Each of these devices made in the form of single-chip integrated circuit. The recorder/playback has a removable card 40 memory. Single-chip integrated circuit card 40 memory is a flash memory (nonvolatile memory), a memory management unit and a protection unit. The protection unit has an encryption circuit according to the data encryption standard (DES). According to a variant of the execution recorder/playback, it is possible to use a microcomputer instead of the digital processor 30 signals. Integrated circuit 10 audio encoder/decoder is an audio interface 11 and block 12 encoding/decoding. Unit 12/encoding is kodirovanija encodes the digital audio data in accordance with a highly efficient encoding method, and writes the encoded data on the card 40 memory. In addition, the block 12 encoding/decoding decodes data read from the memory cards 40. As a highly efficient encoding format ATRAC3, which is a modification of the ATRAC format (acoustic coding with adaptive transform)used for mini-disks.

In ATRAC3 format audio data is selected with a frequency of 44.1 kHz and quantized to 16 bits, encoded with high efficiency. In ATRAC3 format minimum data block audio data is processed as a sound unit (SU). One sound unit is information in which data of 1024 samples (1024×16 bit×2 channel) compressed data in a few hundred bytes. The duration of one audio unit is about 23 MS. In a highly efficient way of encoding the data amount of audio information is compressed in the data, which is approximately 10 times less than the data source information. Also, as in the format ATRAC1 used in the mini-disks, the audio signal is compressed and expanded in accordance with the format of ATRAC3, undergoes a slight deterioration in sound quality.

The input switch 13 supplies separately output signal of the playback of mini disc, the output signal of the tuner or the output signal playback magnetic tape in analog-to-digital Converter 14. Analog-to-digital Converter 1 converts the input signal into a digital audio signal (sampling rate=44.1 kHz, the number of quantization bits=16). Digital input switch 16 supplies separately digital output signal of the mini-disk, CD, or digital satellite broadcasting (CS) digital input receiver 17. The digital input signal is transmitted, for example, via optical cable. The output signal of the digital input receiver 17 served in the inverter 15 of the sampling frequency. The Converter 15 sample rate converts the digital input signal into a digital audio signal (sampling rate=44.1 kHz number of quantization bits=16).

Unit 12 encode/decode integrated circuit 10 audio encoder/decoder delivers the encrypted data in the encryption scheme 22 DES via the interface 21 of the integrated circuit 20 protection. Encryption scheme 22 DES has a FIFO 23 (scheme first-come, first-served basis). Encryption scheme 22 DES undertaken with the purpose of protecting the copyright of content. Card 40 memory also has encryption scheme (DES). Encryption scheme 22 DES recorder/playback has many master keys and only the appropriate device key storage. Encryption scheme 22 DES also has a random number generator. Encryption scheme 22 DES can use the process of authentication and session key together with the card 40 memory that has encryption scheme (DES). Additionally, provalna scheme 22 DES can decrypt the data by using the write key encryption scheme (DES).

The encrypted audio data output encryption scheme 22 DES, served in a digital processor 30 signals. The digital processor 30 of the signals associated with the card 40 to the memory through the interface. In this example, the card 40 memory connected to the mechanism to attach/detach (not shown) of the recorder/playback. The digital processor 30 signal writes the encrypted data in the flash memory card 40 to the memory. Encrypted data is transferred serially between the digital processor 30 signals and card 40 memory. In addition, with the digital processor 30 signals are connected by an external static random access memory 31 (SRAM). Static random access memory 31 provides for the recording device/playback sufficient memory capacity to perform the control card 40 memory.

With the digital processor 30 of the signals connected to the bus interface 32. The data is served from an external controller (not shown) in the digital processor 30 signals via the bus 33. The external controller controls all operations of the sound system. The external controller provides data, such as a write command or a command to reproduce, which are generated in accordance with user actions in the operating parts, digital processor 30 signals through the bus interface 32. In addition, the external controller post the screens for more information such as graphical information, and character information, in the digital processor 30 signals through the bus interface 32. Bus 33 is a bidirectional communication channel. For more information, read out from the memory cards 40, is supplied to the external controller via the digital processor 30 signals the bus interface 32 and the bus 33. In fact, the external controller is, for example, in the amplifying device of the audio system. In addition, the external controller provides a display of additional information, the operating state of the recording device, etc. Display is used in conjunction with the sound system. Because the data that is exchanged via the bus 33, the data are not copyrighted, they are not encrypted.

The encrypted audio data that are read from the card 40 memory using the digital processor 30 signals decrypted using the integrated circuit 20 protection. Integrated circuit 10 audio encoder/decoder decodes the coded data corresponding to the ATRAC3 format. The output from the audio encoder/decoder 10 is served in the d / a Converter 18. D / a Converter 18 converts the output of the audio encoder/decoder 10 into an analog signal. The analog signal is applied to the line output terminal 19.

Analog audible signal serves in the amplifying unit (not illustrated) via the line output terminal 19. Analog audio signals are reproduced by the loudspeaker or headphones. The external controller sends a signal to turn off the sound in the d / a Converter 18. If the signal mute means the state of the mute, the external controller disables the audible signal line output terminal 19.

Figure 2 shows the block diagram of the internal structure of the digital processor 30 signals. As shown in figure 2, the digital processor 30 signals contains the Central unit 34, memory 35, static random access memory 36, the bus interface 37, an interface 38 memory card and Messinia bridges. The digital processor 30 signal has the same function as that of the microcomputer. The Central unit 34 is equivalent to the Central processor. In the flash memory 35 stores the program, which provides the digital processor 30 signals defined processes. Static random access memory 36 and an external static random access memory 31 is used as the RAM recording/playback.

The digital processor 30 signals controls the process of recording the encrypted audio data and additional information on the card 40 to the memory in accordance with the operational signal, such as signal recording received through the bus interface 32 and 37, and the process of their reading with ka the point 40 of the memory. In other words, the digital processor 30 of the signals is between a party applications software sound system that records/reproduces audio data and additional information, and the card 40 memory. The digital processor 30 signals work if you have access to the card 40 memory. In addition, the digital processor 30 signal operates in accordance with software such as system files.

The digital processor 30 signals manages files stored in the card 40 memory using a system such as file allocation tables used in conventional personal computers. In addition to the file system, according to a variant implementation of the present invention uses the control file. Description of the control file is shown below. The control file used for file management data recorded in the card 40 memory. The control file as the first management information file used for managing audio data files. On the other hand, the file allocation table is used as the second management information file for managing all the files, including the audio data files and control files recorded in the flash memory card 40 to the memory. The control file is written in the card 40 memory. The file allocation table writes to flash memory is together with the routing table, etc. before issuing the card 40 memory. A detailed description of such as file allocation tables below.

According to a variant implementation of the present invention, for protecting the copyright information of the sound data that has been compressed in accordance with the ATRAC3 format, encrypt. On the other hand, since there is no need for the protection of the control file, it does not encrypt. There are two types of memory cards, namely the encrypted type and plain type. However, in the recorder/playback, which writes the copyright protected data, use only memory card encrypted type.

Sound data and image data recorded by the user, is recorded on the memory card unencrypted type.

Figure 3 shows the block diagram of the internal structure of the memory cards 40. Card 40 memory contains the block 41 control and flash memory 42, which are housed in a single-chip integrated circuit. Bidirectional serial interface is located between the digital processor 30 signals the recorder/playback and card 40 memory. Bidirectional serial interface consists of ten lines, namely line SCK timing for transmission of the synchronization signal, which is transmitted together with the data line SBS status for signal transmission, which displays Ajeet state, line DIO data for data transmission, line INT interrupt, two lines GND (ground), two lines VCC and two reserve lines.

The SCK line synchronization are used for transmission of a clock signal synchronous with the transfer data. Line SBS condition is used to signal that reflects the state of the memory cards 40. Line DIO data used for input and output commands and encrypted audio data. The line INT interrupts are used for transmission of the interrupt signal, which leads to interruption by card 40 to the memory of the digital processor 30 signals the recorder/playback. When the card 40 memory connected to the recorder/playback, card 40 memory generates the interrupt signal. However, according to a variant implementation of the present invention, since the interrupt signal is transmitted on lines DIO data, the line INT interrupt grounded. Block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface (block S/P, P/S, I/F) is an interface located between the digital processor 30 signals and the block 41 of the control card 40 memory. Block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface converts the serial data received from the digital processor 30 is of Ignatov recorder/playback in the parallel data and supplies the parallel data to the block 41 of the control. In addition, the block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface converts parallel data received from the block 41 control, serial data and supplies the serial data to the digital processor 30 signals. When the block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface receives a command and data through the line DIO data, the unit 43 divides them into data that have regular access to the flash memory 42, and the encrypted data.

In the format in which data is transmitted on lines DIO data, after transmission of the command data is transferred. Block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface detects a command code and determine whether or not the command and data with the normal access or they are coded. In accordance with the result of the determination unit 43 stores a team that has normal access, the register 44 commands, and writes the data with the normal access, the page buffer 45 and the register 46 entries. With register 46 entries in the card 40 memory connected scheme 47 coding code with error correction. Scheme 47 coding-correcting code asiakastieto redundant code which is code error correction for the data temporarily written in the page buffer 45.

The output of register 44 teams register 46 entries and schema 47 coding code with error correction serves to interface the flash memory and the device 51 sequence generation. Interface flash memory and the device 51 sequence generation are the interface located between the block 41 and control the flash memory 42 and manages the data exchanged between them. Data is written to flash memory 42 through the interface of the flash memory and the device 51 generating sequence.

Audio data that has been compressed in accordance with the ATRAC3 format and recorded in the flash memory (in the following these sound data is called ATRAC3 data)are encrypted using the integrated circuit 20 of the protection device and the recording/reproducing unit 52 security card 40 memory for copyright protection of ATRAC3 data. Block 52 protection contains the buffer memory 53, the encryption circuit 54 DES and non-volatile memory 55.

Block 52 security card 40 memory has many identification keys and only one key entry for each memory card. In the nonvolatile memory 55 stores the key needed to encode the data. The key stored in the nonvolatile memory 55, cannot be recognized. Under option within the Oia of the present invention, the key record is stored, for example, in the nonvolatile memory 55. Block 52 protection also has a scheme for generating random numbers. Block 52 protection recognizes the connected device recording/playback and exchanging a session key. In addition, the block 52 protection re-encrypts the content key recording with the encryption circuit 54 DES.

For example, if the card 40 memory connected to the recorder/playback, they are authenticating each other. Integrated circuit 20 of the protection device and the recording/playback unit 52 protect the memory cards 40 are mutually recognize each other. When the recorder/playback recognizes the connected card 40 memory as the permitted use of the memory card, and the card 40 memory recognizes the recorder/playback as the permitted use of the recorder/playback, they are mutually identified. After successful completion of the process of mutual recognition device recording/playback and card 40 memory generate the corresponding session keys and exchange them with each other. Whenever the recorder/playback and card 40 memory recognize each other, they generate the corresponding session key.

After recording content on the card 40 to the memory recorder/playback encrypts the key is possessed by the session key and transmits the encrypted data to the card 40 memory. Card 40 memory decrypts the content key with the session key and re-encrypts the content key by record key and transmits the content key in the recording device/playback. The write key is a unique key for each card 40 memory. After the recorder/playback will take the encrypted content key, the recording/playback performs a formatting process for the encrypted content key and writes the encrypted content key and encrypted content in the card 40 to the memory.

The previous section described the process of recording to memory cards 40. Below is a description of the reading process for the memory cards 40. Data read from the flash memory 42, served in a page buffer 45, the register 48 is read and circuit 49 error correction interface flash memory and the device 51 sequence generation. Scheme 49 error correction corrects errors of the data written in the page buffer 45. The output page buffer after error correction and the output of the register 48 reading served in the block 43 serial-to-parallel conversion, parallel-to-serial conversion and interface. The output unit 43 serves in the digital processor 30 signals through the above-described serial interface.

P the following data is read from the card 40 memory flash memory reads the content key, the encrypted key block. Block 52 protection decrypts the content key with a key account. Block 52 protection re-encrypts the decrypted content key using the session key and transmits the re-encrypted content key in the recording device/playback. The recorder/playback decrypts the content key using the received session key and generates a key block by using the decrypted content key. Then the recorder/playback decrypts the encrypted ATRAC3 data.

Permanent memory 50 configuration (Config.ROM) is a memory in which is inserted from the card 40 memory partition information, various types of attribute information, etc. Card 40 memory also has a switch 60 protection from abrasion. When the switch 60 is in the position of protection from abrasion, even if the command for erasing data recorded in the flash memory 42 of the memory cards 40, is supplied from the recorder/playback card 40 memory card 40 memory is protected from erasing the data recorded in the flash memory 42. Block 61 control (OSC contr.) is a control block generator that generates a synchronization signal that is a reference signal for the execution time of processes in the card 40 to the memory.

Figure 4 shows the hierarchy diagram of the FAI the OIC system, which uses the memory card as the storage medium. The top level of the hierarchy is the layer of the application. For layer application followed by a layer file management layer the logical address, the physical layer address and a layer of access to the flash memory. In the above hierarchical structure layer control file corresponds to the file allocation table (FAT). Physical addresses are assigned to the individual blocks of the flash memory. The ratio between the blocks of the flash memory and the physical address remains unchanged. Logical addresses are addresses that are logically processed in the layer control files.

Figure 5 shows a diagram of the physical structure of data processed in the flash memory 42 of the memory cards 40. In memory 42, the data block (called a segment) is divided into a specified number of blocks (fixed length). One block is divided into a specified number of pages (of fixed length). In flash memory, the data of one block are erased at the same time. Data of one page is written in the flash memory 42 or read from it simultaneously. The sizes of all blocks are the same. Similarly, the sizes of all pages the same. One block consists of page 0 to page m. One unit is the amount of memory, for example, 8 KB or 16 KB. One page has a memory size of 512 bytes. If one unit who meet the memory 8 Kbytes, the total amount of flash memory 42 is equal to 4 MB (512 blocks), or 8 megabytes (1024 block). If one block has a memory capacity of 16 kilobytes, the total amount of flash memory 42 is 16 megabytes (1024 block), 32 MB (2048 blocks) or 64 MB (4096 blocks).

The page consists of part of the data in 512 bytes and a redundant part in 16 bytes. The first three bytes of redundant parts are part of the rewrite, which is overwritten each time you update the data. The first three bytes consistently contain the zone of state power, the zone status and zone status updates. The remaining thirteen bytes of redundant parts are fixed data, which depend on the content portion of the data. 13 bytes contain the zone of control flag (1 byte), an area of the logical address (2 bytes), the area of the reserve format (5 bytes), the zone allocation information detection and error correction code (2 bytes) and the data area detecting and correcting errors (3 bytes). The area allocation information detection and error correction contains redundant data for a process of error correction in the area of the control flag, the area of the logical address and the area of the reserve format. Area data detection and error correction contains redundant data for the process of correcting errors in data in 512 bytes.

Area control flag includes a flag system (1: block user 0: zagruza the tion block), flag allocation tables (1: invalid 0: block tables), the flag of the prohibition of copying (1: Yes, 0: no) and the permission flag access (1: free, 0: protection read).

The first two block - blocks 0 and 1 are boot blocks. Block 1 is the provision of block 0. The boot blocks are the top functional blocks in the memory card. If the memory card is connected to the recorder/playback, access is provided primarily to the boot blocks. The remaining blocks are the blocks of the user. Page 0 boot block contains a header area, the area of entrance into the system and the loading area and attribute information. Page 1 boot block contains an area of the data block. Page 2 boot block contains the zone information structure card/identification of management information (CIS/IDI).

The heading area of the boot block contains the ID of the boot block and several existing entries. System inputs are the starting position of the data block, the size of its data, type data, the original position of the data zone of the CIS/IDI, the size of its data type of its data. Boot and attribute information contains the type of the memory card (only for reading, rewriting, or hybrid type), the size of blocks, number of blocks, the total number of components is, secured or unsecured type, date of manufacture of the card, etc.

Because flash memory has a limit for the number of overwrites due to the deterioration of the insulating film, it is necessary to protect some areas (blocks) writing intensive access. Thus, if data of a specific logical address, recorded on a specific physical address, and write to, the updated data of a certain block is recorded in the unused block, and not in the original block. Thus, after updating the data, the relationship between logical address and physical address changes. This process is called the process of relocation. Therefore, the block is protected from intensive access. Thus prolongs the life of the flash memory.

The logical address associated with data stored in the block. Even if the original data block different from the block of updated data, the address in the file allocation table is not changed. This ensures proper access to the same data. However, because the process of rearranging the conversion table, which correlates a logical address and a physical address (such a table is called a conversion table of the logical and physical address). Using this table, a physical address corresponding lo the practical address, indicated in the file allocation table. This enables access to the block identified by the physical address.

The digital processor 30 writes signals to the conversion table of the logical and physical addresses in the static RAM. If the amount of RAM is insufficient, the conversion table of the logical and physical address can be recorded in flash memory. Conversion table of the logical and physical addresses correlates a logical address (2 bytes), arranged in ascending order, with the physical address (2 bytes). Since the maximum amount of flash memory is 128 MB (8192 blocks), using two bytes can be identified 8192 addresses. Conversion table of the logical and physical address control for each segment. Thus, the size of the conversion table of the logical and physical addresses is proportional to the amount of flash memory. If flash memory is 8 MB (two segments), then use two pages as a conversion table of the logical and physical addresses for each of the segments. If the conversion table is placed in the flash memory, the specified one bit zone control flag in the redundant part of each page indicates whether or not the current block is the block that contains the conversion table of the logical and the physical and the resources.

The above memory card you can use with file allocation table, personal computer system, as designed in the form of a disk recording medium. Flash memory has an area of initial program loading (IPL), the area of the file allocation table and the area of directory paths (not shown on figure 5). Zone bootstrap program contains the address of the program, the first to be loaded into memory recorder/playback. Additionally, the area of the initial boot program contains various types of memory information. The area of the file allocation table contains information regarding blocks (clusters).

The file allocation table defines the unused blocks, the number of the next block, bad blocks and the number of the last block. Area directory of routes contains catalogue records, which are the attribute of the file, the date (day, month, year), file size, etc.

Below is a description of a control method using a file allocation table with reference to Fig.6.

Figure 6 shows a diagram of a memory card. The upper area of the memory card is the area of the partition table. After the partition table is followed by the zone blocks, boot sector, area of a file allocation table area backup file allocation table, the zone root directory, subdirectory and the it data. In the memory map logical addresses are converted into physical addresses in accordance with the conversion table of the logical and physical addresses. The boot sector, the area of the file allocation table, the area backup file allocation table, the area of the root directory area of the subdirectory and the data area is called the area of the sections of the file allocation table.

The area of the partition table contains the start address and end address of the area of the file allocation table. The file allocation table used for conventional flexible disk, contains no such partition table. Since the first track has only the partition table, provided space. The boot sector contains the structure size of the file allocation table (file allocation table with 12 bits or 16 bits), the size of clusters and the size of each zone. The file allocation table is used to control the position of the file recorded in the data area. Area copies of the file allocation table is a zone backup of the file allocation table. Zone root directory contains file names, addresses their initial clusters and their various attributes. In the zone of the root directory are 32 bytes in each file.

The area of the subfolder is made in the form of file attributes directory. In the embodiment shown in Fig.6, the area of the subdirectory has four file name is s PBLIST.MSF, CAT.MSF, DOG.MSF and MAN.MFA. The area of the subdirectory is used to manage the file names and the provisions of the entries in the file allocation table. In other words, the field names file CAT.MSA given the address “5” in the file allocation table. Field name file DOG.MSA given the address “10” in the file allocation table. Area after cluster 2 is used as a data area. In this embodiment, the recorded audio data compressed in accordance with the ATRAC3 format. The top field of the file name MAN.MSA given the address “110” in the file allocation table. According to a variant implementation of the present invention, the audio data with the file name CAT.MSA recorded in clusters of 5-8. Audio data is DOG-1, as the first half of the file with name DOG.MSA recorded in clusters of 10-12. Audio data is DOG-2, as the second half of the file with name DOG.MSA recorded in the cluster 100 and 101. The audio data with the file name MAN.MSA recorded in the clusters 110 and 111.

In an embodiment of the present invention, as an example, describes a separate file, is divided into two parts distributed and recorded. In this embodiment, the area of “empty” in the data area is an area in which you can record. Area after the cluster 200 is used for the names of the control files. File CAT.MSA recorded in the cluster 200. File DOG.MSA recorded in the cluster 201. File MAN.MSA recorded in the cluster 202. If the position of the files ismene the Xia, the area after the cluster 200 is converted. After you attach a memory card recorded the beginning and the end zone sections of the file allocation table with reference to the upper part of the partition table. After playing part of the boot sector play area root directory and area subcatalog. Found field information PBLIST.MSF control playback in the area of subcatalog. So, get the address of the final part of the field file PBLIST.MSF. In this embodiment, since the address “200” recorded at the end of the file PBLIST.MSF, then we turn to the cluster 200.

Area after the cluster 200 is used to control the order of playback. In this embodiment, the file CAT.MSA is the first program. File DOG.MSA is the second program. File MAN.MSA is the third program. After a call to the cluster 200 is field reference files CAT.MSA, DOG.MSA and MAN.MSA. Figure 6 the end of the file fields CAT.MSA given the address “5”. The end of' file fields DOG.MSA given the address “10”. The end of file fields MAN.MSA given the address “110”. If the file allocation table is searched for an entry with the address “5”, you get the address “6” of the cluster. If the file allocation table is searched for an entry with the address “6”, then get the address “7” of the cluster. If the file allocation table is searched for an entry with the address “8”receive code “FFF”, which describes the AET end. Thus, the file CAT.MSA uses clusters 5, 6, 7 and 8. Turning to clusters 5, 6, 7 and 8 in the area of data you can access the data area with ATRAC3 file name CAT.MSA.

Below is a description file search DOG.MSA, which recorded a distributed way. The end of file fields DOG.MSA given the address “10”. If the file allocation table is searched for an entry with the address “10”, you get the address “11” of the cluster. If the file allocation table is searched for an entry with the address “11”, then get the address “12” cluster. If the file allocation table is searched for an entry with the address “12”, you get the address “101”. If you're talking to input the address “101”get code “FFF”, which indicates the end. Thus, the file DOG.MSA uses clusters 10, 11, 12, 100 and 101. Turning to clusters 10, 11 and 12 can access the first part of the ATRAC3 data file DOG.MSA. When accessing the cluster 100 and 101 can access the second part of the ATRAC3 data file DOG.MSA. In addition, when searching in the file allocation table entry with the address “110” get address “101” of the cluster. If the file allocation table, search for the address “111” input with the address “101, you get code “FFF”, which indicates the end. Thus, it is clear that the file MAN.MSA uses clusters 110 and 111. As stated above, you can connect and play files that are distributed in the flash memory.

According to a variant implementation of the present invention, in addition to the file management system specified in the format card 40 memory file is used to control tracks and music files. The control file is recorded in a unit of user flash memory 42 of the memory cards 40. Thus, as will be described later, even if be destroyed the file allocation table of the memory cards 40, you can find the file.

The control file creates a digital processor 30 signals. When the power is on the record/play digital processor 30 signals determines whether attached or not the card 40 memory to the device for playback/recording. If the card 40 memory is attached, the digital processor 30 produces signals the authentication card 40 memory. After successful authentication of the digital processor 30 signals the card 40 to the memory of the digital processor 30 reads signals boot block flash memory 42. Thus, the digital processor 30 reads the signals conversion table of the logical and physical address and writes the read data in the static RAM. The file allocation table and the root directory is recorded in the flash memory card 40 memory before issuing the card 40 memory. When writing data to the card 40 memory is created the control file.

In other words the AMI, the write command issued by the remote controller of the user or the like, is fed into a digital processor 30 signals from an external controller via the bus and the bus interface 32. Integrated circuit 10 encoder/decoder compresses the received audio data and supplies the data obtained in ATRAC3 integrated circuit 20 protection. Integrated circuit 20 protection encrypts the data ATRAC3. Encrypted ATRAC3 data recorded in the flash memory 42 of the memory cards 40. After that, the file allocation table and the control file is updated. Each time the file is updated (in practice, each time after completion of the process of recording audio data) the file allocation table and file management, recorded in static random access memory 31 and 36, overwrite. After removing the card 40 memory or off, record/playback the file allocation table and file management, which is the last act of the static random access memory 31 and 36, are recorded in the flash memory 42. As an alternative solution, each time after completion of the process of recording audio data, you can rewrite the file allocation table and the control file recorded in the flash memory 42. When editing audio data is updated with the contents of the control file.

In the data structure according to a variant implementation, the additional information which I found in the control file. Additional information is updated and recorded in the flash memory 42. In another data structure of the file control information of the control file is created along with the control file paths. Additional information is supplied from the external controller to the digital processor 30 signals via the bus and the bus interface 32. Additional information is written in the flash memory 42 of the memory cards 40. Because the additional information is not available in integrated circuit 20 protection, it is not encrypted. After removing the card 40 memory or off, record/playback, additional information is written from the static random access memory digital processor 30 signals in the flash memory 42.

7 shows a diagram of the file structure of the memory cards 40. The file structure catalog images, directory, moving images, voice directory, directory management and music (HiFi) directory. Under option perform, record and reproduce music program. The following describes the music directory. Music catalog has two types of files. The first type is a file BLIST.MSF playback control (referred to in subsequent PBLIST). Another type is the file A3Dnnnnn.MSA ATRAC3 data, which stores the encrypted music data. M the music directory can contain up to 400 ATRAC3 data files (namely, 400 music programs). The ATRAC3 data files registered in the file management and playback are generated by the recorder/playback.

On Fig shows a diagram of the structure of the control file playback. Figure 9 shows a schematic structure of one ATRAC3 data file. The control file playback is the file is a fixed length of 16 kilobytes. The ATRAC3 data file consists of the attribute header and zone encrypted music data for each music program. Attribute data has a fixed length of 16 kilobytes. The structure of the attribute header is similar to the structure of the file control playback.

The control file playback, shown in Fig consists of a header, name NM1-S memory card (for single-byte code), name NM2-S memory card (for double-byte code), table TRKTBL sequence playback programs and additional information INF-S memory card. Attribute header (shown in Fig.9) at the beginning of the data file consists of a header name NM1 program (for single-byte code), name NM2 programs (for double-byte code), information TRKINF about the track (such as the key information tracks)information PRTINF part of and additional information INF tracks. The header contains information about the number of all parts, attribute names, the size of additional information, etc.

For attribute data, followed by music ATRAC3 data. Music data is segmented into blocks of 16 KB. Each block begins with a header. The header contains the initial value for decoding the encrypted data. Encrypted music data of the ATRAC3 data file. Thus, other data, such as the control file playback, title, etc. are not encrypted.

Below are the relationship between music programs and ATRAC3 data files with links to figa-10C. One track is equivalent to one music program. Additionally, one music program consists of one ATRAC3 data file (see Fig.9). The ATRAC3 data file is audio data compressed in the ATRAC3 format. The ATRAC3 data file is recorded in one cluster on the card 40 memory. One cluster has a memory capacity of 16 kilobytes. One cluster contains several programs. The minimum unit of erase of flash memory 42 is one unit. In the case of card 40 memory for musical data block is a synonym of the cluster. Additionally, one cluster is equivalent to one sector.

One music program consists mainly of one part. However, when editing music program one music program can be written which consists of several parts. The part is a unit of data, which is recorded sequentially. Usually one track consists of one part. Connection of parts of the music program control using information PRTINF part of the attribute in the header of each music program. In other words, the size of the part represented by the size PRTSIZE (4 bytes) of information PRTINF part. The first two bytes of the size PRTSIZE part is the number of all clusters of the current part. The next two bytes represent the position of the start of the audio unit (SU) and the final audio unit (SU) of the first and last clusters, respectively. In the following audio unit is referred to as a SU. Thanks to this recording part, when editing, you can avoid the movement of music data. When editing the music data for each block, the unit block edit much more than a unit of sound editing unit.

The sound unit is the minimum unit parts. In addition, the audio unit is the minimum unit of data if the audio data is compressed in accordance with the ATRAC3 format. One sound unit is sound data, in which data of 1024 samples with a frequency of 44.1 kHz (1024×16 bit 2 channel) compressed data, which is about 10 times smaller than the original data. The duration of one sound of the howling unit is about 23 MS. Usually one part consists of several thousand sound units. If one cluster consists of 42 audio units, one cluster provides the sound for one second. The number of parts forming one track, depends on the size of the additional information. Because the number of parts is obtained by subtracting the header, the name of the program, additional data, etc. from one block, then in the absence of additional information, you can use the maximum number of parts (645 parts).

On figa shows a diagram of the file structure for the case when sequentially recorded two music program CD-ROM or the like, the First program (file 1) is, for example, of the five clusters. Since one cluster cannot contain two files first and second programs, the file 2 starts with the beginning of the next cluster. Thus, the end of part 1 relating to the file 1 is in the middle of the cluster, and the remaining area of the cluster does not contain data. Similarly, the second music program (file 2) consists of one part. In the case of file 1 part size equal to 5. The first cluster starts with zero sound units. The last cluster ends on the fourth sound unit.

There are four types of editing processes, namely the separation process, the process combiner the tion, the erase process and the process of moving. The separation process is performed to divide one track into two parts. After executing the process of dividing the total number of records is incremented. In the process of splitting one file is divided into two files one file system. Thus, in this case, the updated control file playback and the file allocation table. The process of combining is performed to merge the two records into one. After completing the process of combining the total number of records is reduced by one. In the process of combining two files together in one file system files. Thus, after executing the process of combining the updated control file playback and the file allocation table. The erase process is performed to erase one entry. After performing the erase process, the number of entries is decremented by one. The move process is performed to change the sequence of entries. Thus, after performing the erase process or transfer process updates the control file playback and the file allocation table.

On FIGU shows the scheme of merger of two programs (file 1 and file 2), shown in figa. In the process of combining the combined file consists of two parts. The piano is GS shows a diagram of the separation, when one program (file 1) is divided in the middle of the cluster 2. After the separation process file 1 consists of clusters 0, 1 and the initial part of cluster 2. File 2 consists of a finite part of cluster 2 and cluster 3 and 4.

As described above, according to the variant of implementation of the present invention, since a part of the record created by combining (see figv), then the initial position of the part 1, the final position of the parts 1 and end position of the part 2 can be set using audio units. Thus, to seal the space in the result of combining is not necessary to move the music data part 2. In addition to this, the result of the division (see figs) there is no need to move data and to seal the space at the beginning of file 2.

Figure 11 shows a detailed diagram of the structure of the data file PBLIST control playback. On figa and 12B shows a portion of the header and the rest of the file PBLIST control playback. The size of the file, the playback control is one cluster (one block in 16 kilobytes). The size of the header shown in figa equal to 32 bytes. The remainder of the file PBLIST control playback, shown in figv contains the zone name NM1-S (256 bytes) (for memory card), zone names NM2-S (512 bytes), an area of the content key, zone control (MAC access to the rede), zone S-YMDhms, zone table TRKTBL control sequence playback (800 bytes), the area of additional information INF-S (14720 bytes) and an area of redundant header information. The initial position of these zones are defined in the control file playback.

The first 32 bytes from (0×0000) to (0×0010), shown in figa used for the header. In the zone file of 16 bytes call sites. As shown in figa, the header is located on the first and second sections. The header contains the following zones. The area designated as “Reserve”is not a specific area. Usually in the backup area, write a zero (0×00). However, even if back in the area recorded some data, the data recorded in the backup area are ignored. In the future some reserve areas can be used. Additionally, it is prohibited to write data in the backup area. If the optional area is not used, it is treated the same as the reserve area.

Area BLKID-TLO

Value: BLOCKID FILE ID

Function: Identifies the top of the file for playback control.

Value: fixed value equal to “TL=0” (for example, 0x544C2D30)

Area MCode (2 bytes)

Value: manufacturer Code

Function: Identifies the manufacturer and model of the recorder/playback

Value: the highest 10 bits (manufacturer code) and 6 MAV is Shih bits (the model code).

Area corrections (4 bytes)

Value: the Number of overwrites file PBLIST

Function: Increment for each overwritten file playback control.

Value: starts at 0 and is incremented by 1.

Area S-YMDhms (4 bytes) (not required)

Value: Year, month, day, hour, minute and second recorded by the recorder/playback using a reliable watch.

Function: Identification of the last recorded date and time.

Value: bits 25 to 31: the years from 0 to 99 (1980 to 2079), bits 21 to 24 months 0 to 12 bits 16 to 20 days from 0 to 31 bits 11 to 15: hours from 0 to 23 bits 05 to 10: minutes from 0 to 59, bits 00 to 04: seconds from 0 to 29 (interval in two bits).

Area SY1C+L (2 bytes)

Value: the name attribute (byte code) memory card recorded in the area NM1-S.

Function: represents the code symbols and the language code in the form of byte code.

Value: code character (S): one byte older order

00: no code symbols, a binary number,

01: ASCII (American standard code for information interchange)

02: ASCII+KANA,

03: modified 8859-1,

81: MS-JIS

82: KS With 5601-1989,

83: GB (United Kingdom) 2312-80,

90: S-JIS (Japanese industrial standards) (for voice).

Language code (L): one byte of the lowest order.

Identifies the languages based on EBU Tech 3258

00: not installed

08: German

09: English

0A: Spanish

0F: French

15: Italian

ID: Danish

65: Korean

69: Japanese

75: Chinese

If the data is not recorded, then the whole area is 0.

Area SN2C+L (2 bytes)

Value: the name attribute memory card in the area NM2-S.

Function: represents the code symbols and the language code in the form of byte code.

Value: same as for SN1C+L.

Area SINFSIZE (bytes).

Value: the total size of the additional information memory card in the zone INF-S.

Function: represents the size of the data in the form of increment of 16 bytes. If the data is not recorded, this whole area 0.

Size: size: 0×0001 to 0×39C (924).

Area T-TRK

Value: the total number of tracks

Function: represents the total number of tracks.

Value: 1 to 0×0190 (maximum 400 tracks).

If the data is not recorded, then the whole area is 0.

Area VERNo

Value: the number of versions of the format

Function: represents the number of older versions (one byte) and the number of minor versions (the younger one byte).

Value: 0×0100 (version 1.0) 0×0203 (version 2.3)

Below is a description of the zones following the header (see Fig).

Area NM1-S

Value: the name of the memory card (in the form of single-byte code).

Function: represents the name of the memory card in the form of single-byte code (maximum of 256). At the end of this Zap zone is described code completion (0× 00). The size is calculated from the code completion. If the data is not recorded, it is recorded zero (0×00) from the beginning (0×0020) this zone in at least one byte.

Value: code different characters.

Area NM2-S

Value: the name of the memory card (in the form of a double-byte code).

Function: represents the name of the memory card in the form of a double-byte code (maximum 512). At the end of this zone is recorded code completion (0×00). The size is calculated from the code completion. If the data is not recorded, it is recorded zero (0×00) from the beginning (0×0120) this zone in at least two bytes.

Value: code different characters.

Area CONTENTS KEY (content key)

Value: the value for the music program. Is secured using MG(M) and recorded. Same as the content key.

Function: used as a key, necessary to calculate the MAC for S-YMDhms.

Value: 0 to 0×FFFFFFFFFFFFFFFF

Area MAC

Value: the value to check the copyright infringement.

Function: represents the value created using S-YMDhms and content key.

Value: 0 to 0×FFFFFFFFFFFFFFFF.

Area TRK-nnn

Value: the number of the reproducible sequence (SQN) of the ATRAC3 data file.

Function: represents FNo TRKINF.

Value: 1 to 400 (0×190).

If no paths, then the whole area is 0.

Zone INF-S

Value: d the additional information memory card (for example, information related photos, songs, instructions and so on).

Function: represents a variable length of additional information from the header. Can be used with various types of additional information. Each type of additional information is the identification (ID) and data size. Every additional information, including header, consists of at least 16 bytes and an integer times of 4 bytes. Details are given in the next section.

Value: see section “data Structure for more information.

Area S-YMDhms (4 bytes) (not required)

Value: year, month, day, hour, minute and second recorded by the recorder/playback using a reliable watch.

Function: Identification of the last recorded date and time.

Value: bits 25 to 31: the years from 0 to 99 (1980 to 2079),

bits 21 to 24 months 0 to 12,

bits 16 to 20 days from 0 to 31,

bits 11 to 15: hours from 0 to 23

bits 05 to 10: minutes from 0 to 59

bits 00 to 04: seconds from 0 to 29 (interval of two seconds).

In the last field of the file playback control records the same BLKID-TLO, MCode, and REVISION (correction), and in the header.

While recording data on the memory card it may be by mistake or accidentally disconnected, or can be shut off power to the device for playback/recording. If he was so what th wrong mode, the defect must be detected. As mentioned above, at the beginning and at the end of each unit there is a zone Fix. When each data record the value of the Correction is increased by one step. If the defect ends in the middle of a block, the value of the Correction at the beginning of the block does not match the value of the Correction at the end of the block. Thus, such a defective disconnection may be detected. Since there are two zones Fix, abnormal disconnection can be detected with high probability. Upon detection of an abnormal shutdown, generates an alarm, for example, in the form of error messages.

Additionally, because in the beginning of a block (16K bytes) is written to a fixed value BLKID-TLO, when the destruction of the file allocation tables use a fixed value as the reference value for data recovery. In other words, using the support by a fixed amount, you can define the file type. As the fixed value BLKID-TLO is written with an excess in the header and end of each block, it is possible to ensure reliability. As an alternative solution can be redundantly recorded the same file for playback control.

The amount of data of the ATRAC3 data file is significantly larger than the number of data of the file management information is a recording situation. Additionally, as will be described below, to the ATRAC3 data file is added to the block number BLOCK SERIAL. However, since the memory card is written a lot of ATRAC3 data files, to prevent their redundancy is used as CONNUMO and BLOCK SERIAL. Otherwise, when the destruction of the file allocation table is difficult to recover the file. In other words, the ATRAC3 data file can consist of multiple blocks, which are distributed. To identify blocks of the same file using CONNUMO. Additionally, to identify the order of blocks in the ATRAC3 data file using the sequence number block SERIAL.

Similarly, the manufacturer code (MCode) redundantly recorded at the beginning and end of each block, in order to identify the manufacturer and model in the case when the file is written correctly, and the file allocation table is not destroyed.

On figs shows the data structure of additional information. Additional information consists of the following header and data of different lengths. The header has the following zones.

Zone INF

Value: FIELD ID (identity field)

Function: represents the beginning of additional information (fixed length).

Value: 0×69.

Zone ID

Value: key code for more information.

Function: represents a category for more information.

elicina: 0 to 0× FF.

Area size)

Value: the size of the individual additional information.

Function: represents the size of each type of additional information. Although the data size is not limited, it must be at least 16 bytes and an integer times of 4 bytes. The remainder of the data should be filled with zero (0×00).

Size: 16 to 14784 (0×S).

Area MCode

Value: manufacturer Code

Function: Identifies the manufacturer and model of the recorder/playback

Value: the highest 10 bits (manufacturer code) and 6 low-order bits (the model code).

Area C+L

Value: the attribute characters in the data area, starting with the twelfth bytes.

Function: represents the code symbols and the language code in the form of byte code.

Value: the same as for the SNC+L.

Area DATA (data)

Value: some additional information.

Function: represents each type of further information variable length data. Real data always begin with the twelfth byte. The length (size) of the real data should be at least 4 bytes and an integer times of 4 bytes. The remainder of the zone data must be filled with zeros (0×00).

Value: determined individually depending on the content of each type of additional information.

On Fig shows a table of correlation values code key (0 is about 63) additional information and its type.

Value (0 to 31) of the code of the given key information about the symbols of music. Values (32 to 63) of the key code given uniform resource locators (URL) (Web information). Information about the symbols of music and information URLS contain information about the character of the album title, artist name, certificazioni brand (CM), etc. as additional information.

On Fig shows a table of correlation values (64 to 127) codes, key additional information and its types. Size (64 to 95) of key codes assigned to the routes/other. Values (96 to 127) given to the Manager/digital data. For example, ID=98 represents TOC-ID as additional information. TOC-ID represents the number of the first music program, the number of the last music program, the number of the current program, the total duration of the presentation and duration of the current music program, relevant information TOC (table of contents) of the CD.

On Fig shows a table of correlation values (128 to 159) codes, key additional information and its types. Size (128 to 159) codes given key information synchronized playback. On Fig EMD indicates electronic distribution of music.

Below are descriptions of real-world examples of additional information with links to figa-E. Also as figs, figa shows the structure further inform the process. On FIGU shows the structure for the case where the key code ID=3 (additional information is the name of the artist). SIZE=0×1C (28 bytes) represents the data length of 28 bytes of additional information, including header; C+L indicates that the code symbols C=0×01 (ASCII) and the language code L=0×09 (English). Variable length data after byte 12 are single-byte data “SIMON &GRAFUNKEL” as the name of the contractor. Since the data length of the additional information must be multiples of 4 bytes, the remainder is filled with zeros (0×00).

On figs key code ID=97 indicates that additional information is ISCR (international standard recording code: code copyright). SIZE=0×14 (20 bytes) indicates that the data length of the additional information is 20 bytes. With=0×00 and L=0×00 indicates that the characters and the language is not selected. Thus, the data are a digital code. Variable length data are byte code ISRC determining copyright (country, copyright owner, year of entry and the sequence number).

On fig.16D key code ID=97 indicates that the recorded data and time are optional information. SIZE=0×10 (16 bytes) indicates that the data length of the additional information is 16 bytes. With=0×00 and L=0×00 indicates that the characters and the language is not selected is. Thus, the data are a digital code.

Variable length data are four-byte code (32 bits)that identifies the recording date and time (year, month, day, hour, minute, second).

On five key code ID=107 indicates that the log replay is additional information. SIZE=0×10 (16 bytes) indicates that the data length of the additional information is 16 bytes. With=0×00 and L=0×00 indicates that the characters and the language is not selected. Thus, the data are a digital code. Variable length data are four-byte code that defines the log replay (year, month, day, hour, minute, second). If the recorder/playback is a function of the log replay, it writes the data to 16 bytes each time the playback of music data.

On Fig shows the layout of the data in the file A3Dnnnn ATRAC3 data if the audio unit (SU) is N bytes (for example, N=384 bytes). On Fig shows the attribute header (1 unit), and the file of music data (1 unit). On Fig shows the first byte (0×0000 to 0×7 FF0) each field two blocks (16×2=32 kilobytes). As shown in Fig, the first 32 bytes of attribute header is used as a header; 256 bytes are used as zone NM1 (256 bytes) music programs and 512 bytes are used in quality is TBE area NM2 (512 bytes) the name of the music program. The header attribute header contains the following areas.

Area BLKID-HDO (4 bytes)

Value: FIELD BLOCKID ID

Function: identifies the top of the ATRAC3 data file.

Value: fixed value equal to “HD=0” (for example, 0×48442D30).

Area MCode (2 bytes)

Value: manufacturer code

Function: identifies the manufacturer and model of the recorder/playback.

Value: the highest 10 bits (manufacturer code) and 6 low-order bits (the model code).

Area BLOCK SERIAL (4 bytes)

Value: sequential track number

Function: starts at 0 and is incremented by 1. Even if the music program is being edited, then this value is not changed.

Value: 0 to 0×FFFFFFFF

Area N1C+L (2 bytes)

Value: represents the attribute data (NM1) tracks (the name of the musical program).

Function: represents the code symbols and code language data NM1 in the form of byte code.

Value: same as for SN1C+L.

Area N2C+L (2 bytes)

Value: represents the attribute data (NM2) of the track (the name of the musical program).

Function: represents the code symbols and code language data NM2 in the form of byte code.

Value: same as for SN1C+L.

Area INFSIZE (2 bytes)

Value: Total amount of additional information of the current track.

Function: represents the size of the data in the form of a multiple of 16 bytes. If the data is not recorded is, the area is 0.

Value: 0×0000 to 0×S (966).

Area T-PRT (2 bytes)

Value: the number of all bytes

Function: represents the number of parts, which form a current path. Typically, the value of T-PRT is equal to 1.

Value: 1 to 285 (645 decimal)

Area T-SU (4 bytes)

Value: the total number of sound units (SU).

Function: represents the total number of sound units of one track, which is equivalent to the duration of program execution.

Value: 0×01 to 0×001FFFFF.

Area INX (2 bytes) (not required)

Value: the relative position of the index.

Function: used as a pointer representative part of the musical program. The value of INX is specified as value, which is obtained by dividing the

the number of sound units 4 at the current position of the program. This value INX 4 times more than the number of sound units (about 93 MS).

Value: 0 to 0×FFFF (maximum about 6084)

Zone XT (2 bytes) (not required)

Value: duration of the index.

Function: indicates the playing time, denoted by INX-nnn, the value of which is equal to the number of sound units divided by 4. The value of the INDEX is 4 times greater than the magnitude of the normal sound units (about 93 MS).

Value: h (not installed); 0×01 to 0×FFFF(up 6084); 0xFFFF (up to the end of the music program).

Below is a description of the areas of NM1 and NM2 of the names of the musical program.

Area NM1

Value: a string of characters that names the music program.

Function: represents the name of a musical program in the form of single-byte code (up to 256 characters) (variable length). The zone name must end code end (0×00). The size should be calculated by code completion. If the data is not recorded, since the beginning (h) zone should be written zero for at least one byte.

Value: various character codes.

Area NM2

Value: a string of characters that names the music program.

Function: represents the name of a musical program in the form of a double-byte code (up to 512 characters) (variable length). The zone name must end code end (0×00). The size should be calculated by code completion. If the data is not recorded, since the beginning (0×0120) zone should be written zero for at least two bytes.

Value: various character codes.

Data of 80 bytes, starting from a fixed position (0×320) attribute header, called area TRKINF information track. This area is primarily used for General protective control information and management information of the copy. On Fig shows part of the area TRKINF. Area TRKINF with the contains the following zones.

Area CONTENTS KEY (content key) (8 bytes)

Value: the value for each music program. The value of the content key is protected by the block protect card memory and then written.

Function: used as a key to play the music program. Is used to calculate the MAC.

Value: 0 to 0×FFFFFFFFFFFFFFFF

Area MAC (8 bytes)

Value: the value to check the copyright infringement.

Function: represents the value that is created by using multiple values TRKINF, including the cumulative amount of content and a secret number.

Secret serial number is the serial number stored in the secret area of the memory card. The recording device without copyright protection cannot read data from the secret area of the memory card. On the other hand, the recording medium copyright protection, which can read data from the memory card has access to the secret area.

Area (1 byte)

Value: the attribute is part of the

Function: represents the information about the compression part.

Value: items will be described below (see Fig and 20).

Below is a description of zone A. In the following description mono mode (N=0 or 1) is defined as total special mode where bit 7=1, the auxiliary signal=0, the main is signal=(L+R). The playback device without copyright protection to ignore the information bits 2 and 1.

Bit 0 of the zone And provides information about the on or off state of the predistortion. Bit 1 zone And represents the information on the pass play or normal play. Bit 2 zone And provides information about the type of data, such as audio data, Fax data, or the like, Bit 3 zones not defined. Using combinations of bits 4, 5 and 6 is determined by the mode information data ATRAC3, as shown in Fig. In other words, N is the magnitude of the mode of three bits. For the five types of modes, which are mono (N=0 or 1), LP (N=2), SP (N=4), EX (N=5) and HQ (N=7) provides recording time (only in the case of memory cards with capacity of 64 megabytes), the data rate and the number of sound units in the same block. The number of bytes in one sound unit depends on the mode. The number of bytes in 1 audio unit in the mono mode is 136. The number of bytes in 1 audio unit in the LP mode is 192. The number of bytes in 1 audio unit in the SP mode is 304. The number of bytes in 1 audio unit in the EX mode is 384. The number of bytes in 1 audio unit in the HQ mode is 512. Bit 7 zone a represents the modes ATRAC3 (0: stereo 1: General).

As an example, below is a description of the use is for cards with memory capacity of 64 MB in SP mode. Card with a memory capacity of 64 MB 3968 has blocks. In SP mode, because 1 audio unit is 304 bytes, one block has 53 sound units. One sound unit equivalent (1024/44100) seconds. Thus, one block has a duration (1024/44100)×53×(3968-10)=4863 C=81 min. transmission Rate is (44100/1024)×304×8=104737 bits per second.

Area LT (one byte)

Value: flag restrictions playback (bits 7 and 6) and section protection (bits 5 to 0).

Function: represents the limit for the current track

Value: bit 7: 0=no restriction, 1=limit, bits 6: 0: the action is not finished 1: action completed, bits 5 to 0: protection section (reproduction is prohibited if different from 0)

Area FNo (2 bytes)

Value: file number

Function: represents the number originally recorded tracks, which specifies the position of the calculated values of the MAC in a secret area of the memory card.

Value: 1 to 0×190 (400).

Area MG (D) SERIAL-nnn (16 bytes)

Value: represents the sequence number of the block protect (integrated circuit 20 protection) recording device/playback.

Function: unique value for each device, recording/playback.

Value: 0 to 0×FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF.

Area CONNUM (4 bytes)

Value: cumulative amount of content.

Function: represents the unique value, umulative for each program. The value controls the power protection device recording/playback. The upper limit value is 232that is 4200000000. Used to identify the recorded program.

Value: 0 to 0×FFFFFFFF.

Area YMDhms-S (4 bytes) (not required)

Value: the date and time of playback of the track with limited play.

Function: represents the date and time at which starts reproduction rights for electronic music distribution.

Value: The same as when recording the date and time in other zones.

Area YMDhms-E (4 bytes) (not required)

Value: the date and time the end of the track, with limited play.

Function: represents the date and time at which it ends the right of reproduction for electronic music distribution.

Value: The same as when recording the date and time in other zones.

Area MT (1 byte) (optional)

Value: maximum value allowed for playback number of times.

Function: represents the maximum number of times of reproduction for electronic music distribution.

Value: 1 to 0×FF. When not using the value of MT is 00.

Area ARTICLE (1 byte) (optional)

Value: the number of times of playback.

Function: represents the number of times vosproizvedeny is within the permitted number of times of playback. Each time the playback data, the value of the ARTICLE is reduced by one step.

Value: 0×00 to 0×FF. If bit 7 zone LT is 1 and the value CT is equal to 0, the data reproduction is prohibited.

Area SS (1 byte)

Value: manage backups (COPY CONTROL).

Function: control the copy operation.

Value: bits 6 and 7 present information to control copying. Bits 4 and 5 present information to control copying. Bits 4 and 5 present information copy control for the operation of high-speed digital copying. Bits 2 and 3 represent the level of authentication of the protection block. Bits 1 and 0 is not defined.

Examples of zone SS:

(bits 7 and 6)

11: permitted operation unlimited copy

01: copying prohibited

00: allowed operation single-copy

(bits 3 and 2)

00: authentication level MG record analog/digital input signals equal to 0.

If the operation of the digital recording using the data from the CD-ROM (bits 7 and 6): 00 (bits 3 and 2): 00.

Area CN (1 byte) (optional)

Value: the number of times permitted copying in the system control high-speed serial copying.

Function: extends the permission to copy on the number of times copying is not permitted limited the eat for a single copy and has permission to copy freely. Has effect only in the first generation copy. The value CN is reduced by one step during each backup.

Value:

00: copying prohibited

01 to 0×FF: number of times

0×FF: unlimited number of times up

For area TRKINF of the track information area should (PRTINF) information management parts of 24 bytes, starting with 0×0370. If one track is composed of many parts, the size of the zones PRTINF individual parts are consecutive on the time axis. On Fig shows part of the area PRTINF. Below is a description of zones in the zone PRTINF in their order.

Area PRTSIZE (4 bytes)

Value: the size of the piece.

Function: represents the size of the part. Cluster: 2 bytes (the highest position), the starting sound unit: 1 byte (upper), the final audio unit: 1 byte (lowest position).

Value: cluster: 1 to 0×1F40 (8000),

starting sound unit: 0 to 0×AO (16) (it should be noted that the audio unit starts at 0).

Area PRTKEY (8 bytes)

Value: the value of the encryption part.

Function: encryption part. The initial value is 0. It should be noted that there need to be rules for editing.

Value: 0 to 0×FFFFFFFFFFFFFFFF.

Area CONNUMO (4 bytes)

Value: key originally created cumulative amount of content.

Function: clearly the op is delaet identification of the content.

Value: same value as the value of the key initial cumulative amount of content.

As shown in Fig, attribute header of the ATRAC3 data file contains additional information INF. Additional information is the same information as the additional information INF-S (see 11 and 12V) control file playback, except that the starting position is not fixed. The position of the last byte (multiple of 4 bytes) at the end of one or more parts followed by data of the additional information INF.

Zone INF

Value: for more information on paths.

Function: represents a variable length of additional information from the header. May be there are many different types of additional information. Each zone additional information has an identification code and data size. Each area of the additional information consists of at least 16 bytes and an integer times of 4 bytes.

Value: same as for zone INF-S additional information file control playback.

The above attribute header followed by data for each block of the ATRAC3 data file. As shown in Fig, to each block added to the header. Below is a description of each block.

Area BLKID-A3D (4 bytes)

Value: BLOCKID FILE I

Function: identifies the top ATRAC3 data.

Value: fixed value equal to “A3D” (e.g., 0×41334420).

Area MCode (2 bytes)

Value: manufacturer code.

Function: identifies the manufacturer and model of the recorder/playback.

Value: 10 bits (manufacturer code); 6 low-order bits (the model code).

Area CONNUMO (4 bytes)

Value: the cumulative amount of the original content created by you.

Feature: uniquely identifies the identification of contents. Even when editing the contents of the value CONNUMO is not changed.

Value: same value as the value of the initial key cumulative amount of content.

Area BLOCK SERIAL (4 bytes)

Value: the sequence number assigned to each track.

Function: starts at 0 and is incremented by 1. Even when editing the contents of the value area BLOCK SERIAL is not changed.

Value: 0 to 0×FFFFFFFF.

Area BLOCK-SEED (8 bytes)

Value: key to encrypt a single block.

Function: the beginning of the block is a random number that is generated by the block protection device recording/playback. For the random number value is increased by 1. If the value of the zone BLOCK-SEED lost and sound is not generated within one second is equivalent to one unit, then the same information is recorded in the header and at the end of the Loka. Even when editing the contents of the value BLOCK-SEED is not changed.

Value: initial random number of 8 bits.

Area INITIALISATION VECTOR (vector initialisatie) (8 bytes)

Value: the value required for encryption, decryption, ATRAC3 data.

Function: represents the initial value required for encryption and decryption ATRAC3 data for each block. The block starts with 0. The next block starts with the last encrypted value in 8 bits in the last audio unit. If the block is shared, then used the last eight bytes immediately before the beginning of the sound unit. Even when editing the contents of the value INITIALISATION VECTOR is not changed.

Value: 0 to 0×FFFFFFFFFFFFFFFF.

The SU-nnn

Value: the audio unit.

Function: represents the data compressed from 1024 samples. The number of bytes of output data depends on the compression mode. Even when editing the contents of the value SU-nnn does not change. For example, in the SP mode N=384 bytes.

Value: the value of the ATRAC3 data.

On Fig, since N=384, 42 audio units recorded in the same block. The first two fields (4 bytes) of the block are used as a header In the last field (2 bytes) redundantly recorded zone BLKID-A3D, MCode, CONNUMO and BLOCK SERIAL. Thus, the M bytes of the remaining area of the block is (16384-384×216× 3=208) bytes. As described above, redundantly recorded area BLOCK-SEED of 8 bytes.

If the destroyed area of the file allocation table, looking all blocks of flash memory. Determines whether the value of the area ID BLKID at the beginning of each block TLO, HDO or A3D. As shown in figa-24C, at step SP1 determine whether or not the value of the area ID BLKID at the beginning of the upper block BLKID-TLO. If the result at step SP1 is "No", move on to step SP2. At step SP2, the block number is incremented by 1. After that, at step SP3 determine, found the last block or not.

If the result at step SP3 is "No", then return to step SP1.

If the result at step SP1 is "Yes", then move on to step SP4. At step SP4 determines that the searched block is a file PBLIST control playback. After that, move on to step SP5. At step SP5 is recorded in the register number N of all records T-TRK file PBLIST control playback. For example, if the memory contains 10 data files to ATRAC3 (10 music programs), T-TRK put 10.

Then based on the value of a count of all records T-TRK consistently refer to the TRK-TRK 001 to-400 units. In this example, since the recorded 10 music programs, refer to the TRK-TRK 001 to-010 blocks. Since the number of files recorded in TRK-XXX (where X=1-400), then at step SP7 is recorded in the memory table, which correlates the number C is recorded TRK-XXX with the file number FNO. Then at step SP8 reduced by one step size N, entered into the register. Cycle step SP6, SP7 and SP8 is repeated until N becomes equal to 0 at the step SP9.

If the result of determination at the step SP9 is “Yes”, then move on to step SP10. At step SP10 To step SP10, the pointer is again mounted on the upper block. The search process is repeated from the top of the block. Then move on to step SP11. At step SP11 determine whether or not the value of the area ID BLKID upper block size BLKID-HDO. If the result of determination at step SP11 is "No", move on to step SP12. At step SP12 increase the number by one step. At step SP13 determine found or not the last block.

If the result of determination at step SP13 is "No", then return to step SP11. The search process is repeated until the result of determination at step SP11 not going to be "Yes."

If the result of determination at step SP11 is "Yes", then move forward to the step SP14. At step SP14 determine whether the block attribute header (according Fig) (0×0000 to 0×03FFF shown in Fig) at the beginning of the ATRAC3 data file.

Then, in step SP15, based on the number FNO of the file recorded in the memory sequence number BLOCK SERIAL of the same ATRAC3 data file and key CONNUMO cumulative amount of content contained in the attribute header. If you have recorded 10 ATRAC3 data files and there are 10 blocks, led the rank zone ID BLKID upper blocks which is BLKID-TLO, the search process continues until you inspect 10 blocks.

If the result of determination at step SP13 is "Yes", then move on to step SP16. At step SP16, the pointer is again transferred to the upper block. The search process is repeated from the top of the block.

After that, move on to step SP17. At step SP17 determine whether the value of the area ID BLKID upper block size BLKID-A3D.

If the result of determination at step SP17 is "No", move on to step SP18. At step SP18, the block number increases by one step. After that, at step SP18′ determine, found or not the last block. If the result of determination at the step SP18’ is "No", then return to step SP17.

If the result of determination at step SP17 is "Yes", then move on to step SP19. At step SP19 determines that the block contains the data to ATRAC3. Then move on to step SP20. At step SP20, based on the serial number BLOCK SERIAL recorded in the data block ATRAC3, and the key CONNUMO cumulative amount of content, they are brought into memory.

In the same ATRAC3 data file, the total number is chosen as the key CONNUMO cumulative amount of content. In other words, if the ATRAC3 data file consists of 10 units, then the total number is given for all values of zones CONNUMO.

Additionally, if ATRAC3 data consist of 10 blocks, the sequence numbers 1 to 0 are assigned the values of the zones BLOCK SERIAL is oracouelo non ten blocks.

In accordance with the values of the zones CONNUMO and BLOCK SERIAL determines whether the current block is the same content and the order of playback of the current block in the same content (namely, the sequence of connections).

If recorded 10 ATRAC3 data files (namely, 10 music programs) and each of the ATRAC3 data files consists of 10 blocks, then there are 100 data blocks.

Based on the values of the zones CONNUMO and BLOCK SERIAL you can get the playback order of the musical programs 100 data blocks and the sequence of their connection.

If the result of determination at step SP19 is "Yes", then all blocks are scanned and the detection file playback control, ATRAC3 data file and the attribute file. Thus, at step SP21, based on the values of the zones CONNUMO, BLOCK SERIAL, FNO and TRK-X in the sequence of blocks included in the memory, receive the connection status of the files.

After receiving the connection state in a free area of memory may be generated in the file allocation table.

Below is a description of the control file, according to the second variant of implementation of the present invention. On Fig shows the file structure according to the second variant of implementation of the present invention. As shown in Fig, music directory contains a file TRKLIST.MSF information management track (referred to in subsequent TRKLIST), backup file TKLISTB.MSF information management track (referred to in subsequent TRKLISTB), file INFLIST.MSF additional information (it contains the artist name, code ISCR, time stamp data, static images, etc) (this file is called in the following INFLIST), file A3Dnnnn.MSF (referred to in subsequent A3Dnnnn) ATRAC3 data. File TRKLIST contains two zones NAME1 and NAME 2. Area NAME1 is the area that contains the name of the memory card and the name of the program (for single-byte code corresponding to ASCII/ISO-8859-1 characters). Area NAME2 is the area that contains the name of the memory card and the name of the program (for double-byte code corresponding to the code MS-JIS/Hankul/Chinese).

On Fig shows the relationship between the file TRKLIST information management tracks, areas NAME1 and NAME 2 and file A3Dnnnn ATRAC3 data. File TRKLIST file is a fixed length of 64 Kbytes (16 Kbytes ×4). Area 32 kilobytes is used to control the tracks. The remaining 32 kilobytes are used for zones NAME1 and NAME 2. Although zone NAME1 and NAME2 application name can be provided in a separate file management information track, the system having a small memory capacity, convenient full control of the file management information of the paths and file names of the programs. Area TRKINF-nnnn information track and area PRTINF-nnnn information of the file TRKLIST information management tracks are used to control data file A3Dnnnn file INFLIST additional information. Only the file A3Dnnnn ATRAC3 data is encrypted. On Fig the data length in the horizontal direction is 16 bytes (0 to F). The hexadecimal number in the vertical direction represents the value at the beginning of the current line.

According to the second variant of implementation, there are three file, namely the file TRKLIST control paths (including file name), the file INFLIST additional information and file A3Dnnnn data. According to the first variant of implementation (see Fig.7, 8 and 9), two files are used, namely the file PBLIST playback control for management of the entire memory card and the ATRAC3 data file for storing programs.

Below is a description of a data structure according to the second variant of implementation. For simplicity, in the description of the data structure according to the second variant execution is a description of parts similar to parts of the first version of the runtime.

On Fig detail showing the file structure TRKLIST information management tracks. In file TRKLIST information management track one cluster (block) consists of 16 kilobytes. The size and data file TRKLIST the same as in the standby file TRKLISTB. The first 32 bytes of the file management information tracks can be used as a header. As well as the header file PBLIST control playback, the file header TRKLIST contains the zone BLKID-TLO/NL1 (spare the Isle of identification) (4 bytes), zone T-TRK (2 bytes) to the total number of lanes, area code MCode manufacturer (2 bytes), an area of REVISION (correction) (4 bytes) for the number of times of rewriting TRKLIST and area S-YMDhms (4 bytes) (not required) to update the date and time. Values and functions of these zones data are the same as in the first embodiment. Additionally, the file TRKLIST contains the following areas.

Area YMDhms (4 bytes)

Represents the data (year, month, day) the last file update TRKLIST.

Area N1 (1 byte) (optional)

Is the serial number of the memory card (numerator). When using memory cards to the value N1 is equal h.

Area N2 (1 byte) (optional)

Is the serial number of the memory card (denominator). When using memory cards to the value N2 0×01.

Area MSID (2 bytes) (not required)

Represents the identification code of the memory card. If you use a lot of memory cards, the value MSID each memory card are the same (T.B.D.) (T.B.D. - (to be determined) indicates that this value can be determined in the future).

Area S-TRK (2 bytes)

Is a special track (to be determined). Typically, the value S-TRK is 0×0000.

Area PASS (2 bytes) (not required)

Represents the password (to be determined).

Area RDAs (2 BA is that) (not required)

Represents the definition playback application (to be determined) (usually the value of ARR is 0×0000).

Zone INF-S (2 bytes) (not required)

Is a pointer to additional information of the whole memory card. If additional information is not available, the value INF S is 0×00.

The last 16 bytes of the file TRKLIST used for zone BLKID-TLO, zone MCode and zone REVISION, which correspond to the zones of the header. Backup file TRKLISTB contains the above title. In this case, the header contains the zone BLKID-TLO, zone MCode and zone REVISION.

The header should area TRKINF of information tracks on each track and area PRTINF information part regarding every part of the track (music program). On Fig shows the area following the area TRKLIST. In the lower part of the zone TRKLISTB shows in detail the structure of these zones. On Fig shaded area represents the unused area.

Area TRKINF-nnn information track and area PRTINF-nnn information part contains bands of the ATRAC3 data file. In other words, the area TRKINF-nnn information track and area PRTINF-nnn information pieces each containing zone LT (1 byte) flag restrictions play area CONTENTS KEY content key (8 bytes), an area of MG(D) SERIAL sequence number protection unit of the recording device/playback (16 bytes), the area of XT (2 bytes) (not obligations is LNO) to represent the part of the characters of the musical program, zone INX (2 bytes) (not required), the area YMDhms-S (4 bytes) (not required), the area YMDhms-E (4 bytes) (not required), area MT (1 byte) (not required), zone ARTICLE (1 byte) (not required), the area SS (1 byte) (not required), area CM (1 byte) (optional) (these zones YMDhms-S, YMDhms-E, MT, CT, CP and CN are used for information about restricting playback information and copy control), area (1 byte) attribute part of the area PRTSIZE size pieces (4 bytes), the area PRTKEY key part (8 bytes) and the area CONNUM cumulative amount of content (4 bytes). Values, functions and values of these areas are the same as in the first embodiment. Additionally, the area TRKINF-nnn information track and area PRTINF-nnn information pieces each containing the following zones.

Area (1 byte)

Fixed value (THAT=0×74).

Zone INF-nnn (optional) (2 bytes)

Is a pointer to additional information (0 to 409) each track. 00: musical program without additional information.

Area FNM-nnn (4 bytes)

Represents the file number (0×0000 to 0×FFFF) ATRAC3 data.

The number nnnn (in ASCII) names (A3Dnnnn) ATRAC3 data file is converted into 0xnnnnn.

Zone APP-CTL (4 bytes) (not required)

Represents a parameter to the application (should be defined). (Typically, the value APP-CTL 0×0000).

Area P-nnn (2 bytes)

Represents the number of parts (1 to 2039), who left the music program. This zone corresponds to the above-described area of the T-PART.

Area PR (1 byte)

Fixed value (PR=0×50).

Below is a description of zones NAME1 (for single-byte code) and NAME2 (for double-byte code) for control names. On Fig shows the detailed structure of the zone NAME1 (for zone single-byte code). Each zone NAME1 and NAME2 (which will be described later) is divided into segments of 8 bytes. Thus, one field consists of 8 bytes. 0×8000, i.e. at the beginning of each of these areas is the title. The header is followed by index and name. The last field zone NA1 contains the same zone as the header.

Area BLKID-NM1 (4 bytes)

Represents the contents of the block (fixed value) (NM1=0×4E4D2D31).

Area PNM1-nnn (4 bytes) (not required)

Is a pointer to the zone NM1 (for single-byte code).

Area PNM1-S

Is a pointer to the name of the memory card.

nnn (1 to 408) represents a pointer to the name of the music program.

The pointer represents the initial position (2 bytes) block type code symbol (2 bits) and the size of the data (14 bits).

Area NM1-nnn (2 bytes) (not required)

Represents the name of the memory card and the name of the musical program for single-byte code (variable length). Code completion (h) recorded in the end zone.

On Fig shows the detailed structure of the zone NAME2 (for dubit the new code). 0×8000, i.e. at the beginning of the zone, is the title. The header is followed by index and name. The last zone field NAME2 contains the same zone as the header.

Area BLKID-NM2 (4 bytes)

Represents the contents of the block (fixed value) (NM2=0×4E4D2D32).

Area PNM2-nnn (4 bytes) (not required)

Represents the pointer area NM2 (for double-byte code).

Area PNM2-S

Is a pointer to the name of the memory card.

nnn (1 to 408) represents a pointer to the name of the music program.

The pointer represents the initial position (2 bytes) block type code symbol (2 bits) and the size of the data (14 bits).

Area NM2-nnn (optional)

Represents the name of the memory card and the name of the musical program for double-byte code (variable length). Code completion (h) recorded in the end zone.

On Fig shows the location of the data (for one block) file A3Dnnnn ATRAC3 data for the case when 1 audio unit (SU) consists of N bytes. In this file, one field consists of 8 bytes. On Fig shows the values of the upper part (0×0000 to 0×3FF8) of each field. The first four fields of the file are used for the header. The title is the same as in the first exemplary embodiment, where the attribute header of the data file precedes the data block (see Fig). The header contains the area BLKID-A3D (4 bytes), the area code MCode manufacturer 2 bytes), zone BLOCK SEED block of random numbers (8 bytes)required for the encryption process, the area CONNUMO (4 bytes) for a cumulative amount of the initial content area BLOCK SERIAL number of each track (4 bytes) and zone INITIALISATION VECTOR IV (8 bytes)required for the process of encryption/decryption. Second from the end of the field block redundantly contains the zone BLOCK SEED. The last field contains the zone BLKID-A3D and MCode. Also as in the first embodiment, the header is followed by data SU-nnnn sound units.

On Fig shows the detailed structure of the file INFLIST management additional information that contains further information. In the second embodiment, at the beginning of the file INFLIST is located next title. The header is followed by the pointer and zones.

Area BLKID-INF (4 bytes)

Represents the contents of the block (fixed length) (INF=0×494E464F).

The T-DAT (2 units)

Represents the total number of data zones (0 to 409).

Area MCode (2 bytes)

Is the code of the manufacturer of the device recording/playback.

Area YMDhms (4 bytes)

Is updated the date and time of recording.

Zone INF-nnnn (4 bytes)

Is a pointer to the zone data) additional information (variable length, at the same time on 2 bytes (fields)). The initial position presents senior 16 bits (0000 to FFFF).

Area DaaSlot-0000 (0× 0800)

Represents the offset from the beginning (on the same box).

The size of the data represented by the lower 16 bits (0001 to 7FFF). Locking the pointer is set to the most significant bit (MSB). MSB=0 (allowed), MSB=1 (locked).

The size of the data represents all the amount of data of the music program.

The data start at the beginning of each field. Field area with no data filled in 00.

The first zone INF represents the index information of the whole album (usually, INF-409).

On Fig shows the structure of additional information. At the beginning of the zone data for more information is the header of 8 bytes. The structure of the additional information is the same as in the first embodiment (see figs). In other words, the additional information contains a zone IN (2 bytes) as identification, area key ID code (1 byte), the area SIZE (2 bytes), which represents the size of each zone additional information, area code MCode manufacturer (2 bytes). In addition, the additional information contains an area of SID (1 byte) extra key code.

According to the second variant of implementation of the present invention, in addition to the file system defined as the format of the memory card, use the file TRKLIST information management tracks or music data. Thus, even if p is of trusina the file allocation table, then you can restore the file. On Fig shows a graphical diagram of the program of recovery file. To restore the file using a computer, which handles the file recovery program and who has access to the memory card, and a memory device (hard drive, RAM or the like) connected to the computer. The computer has a function equivalent to the digital processor 30 signals. Below is a description of the recovery process the file using file TRKLIST information management tracks.

All blocks of flash memory, the file allocation table, which was destroyed examined for the presence of TL-0 as size (BLKID) in the upper position of each block. In addition, all blocks are scanned to detect NM1 as values (BLKID) in the upper position of each block. After that, all blocks are scanned to detect NM2 in size (BLKID) in the upper position of each block. All contents of the four blocks (file management information of the track) is recorded, for example, hard disk, reducing computer.

The number of all paths obtained from data located after the 4 bytes of the file management information tracks. Receive the twentieth byte area TRKINF-001 information track, the value CONNUM-001 first music program Velicina next zone R-001. The number of parts produced using the size of the zone R-001. Get the size of the zones PRTSIZE all parts of the track 1 zone PRTINF. The number n of all blocks (clusters) is obtained by calculation.

After receiving the file information management track, move on to step 102. At step 102 conduct a search of the voice data file (data file ATRAC3). In the flash memory searched all blocks that are not included in the control file. Select blocks, the upper value (BLKID) which is A3D.

Conduct the search unit, in which the size of the zone CONNUMO in the sixteenth byte ASDnnnn same value CONNUM-001 first music program file management information track, and in which the size of the area BLOCK SERIAL that begins with the twentieth byte equal to 0. After receiving the first block of the searched block (cluster), in which the size of the zone CONNUM is the same as in the first block and the size of the area BLOCK SERIAL is increased by 1 (1=0+1). After receiving the second unit conducted a search of the unit in which the value CONNUM is the same as in the second block, and the value area BLOCK SERIAL is increased by 1 (2=1+1).

By repeating the process of conducting the view of the ATRAC3 data file until you have received n blocks (clusters) of track 1. After receiving all blocks (clusters) are sequentially recorded on the hard disk.

The same process specified for track 1, repeat for track 2. Other with Awami, conduct the search unit, in which the size of the zone CONNUMO the same as the value CONNUM-002 first music program file management information track, and in which the size of the area BLOCK SERIAL begins on the twentieth byte. After that, as well as for track 1, hold the view of the ATRAC3 data file until you find the last block (cluster) n’. After receiving all blocks (clusters) are sequentially recorded on the hard disk.

By repeating the above process for all tracks (the number of tracks equal to m) all ATRAC3 data are recorded on the hard disk, which is controlled by restoring the computer.

At step 103 memory card, the file allocation table, which was destroyed, start again and restore the file allocation table. In the memory card to create the specified directory. After that, the file management information tracks and the ATRAC3 data file for m track copy from hard drive to memory card. Thus, the recovery process is complete.

In the control file and data file important parameters (in particular, the codes in the header) can be written three times instead of two times. If data is written redundantly, the same data can be recorded in any position, if they are spaced from each arc on one page or more.

Below is a description of the process of discovery is fake data file, according to the first variant of implementation. Various types of information, you can check for the presence of fake information, such as file PBLIST.MSF control playback and the ATRAC3 data file, which is compressed audio data. Because the file PBLIST.MSF control playback contains information S-YMDhms time, check the information in time to prevent tampering by the user.

Code for detection of tampering is created by calculating a content key (ck) of the ATRAC3 data file created in conjunction with the file PBLIST.MSF control playback using the hash function. Additionally, because the file can be erased or moved, the value of the content key (ck) remember in another file. If S-YMDhms time is not entered, all values of the hash functions are set to zero without calculations. If data has been update information S-YMDhms time, then calculate all the values of the hash function.

If there are fakes of the ATRAC3 data file, i.e. the audio data, the attribute And track, flag restrictions playback, security features, LT, ordinal MG(D), the cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT allowed playback IMEI : is doing, the area of the SS copy control and the number of times CN (optional) allowed high-speed digital copying, to prevent tampering by the user. Code check forgery create by calculating the code of the content (IC) of the ATRAC3 data file using a hash function. If the ATRAC3 data file was divided or combined, using the content key re-compute the hash function.

On Fig shows a block diagram of a circuit for detection of tampering with digital recording device, according to this invention. If the memory card is connected to a digital recorder or if you pressed the play button, then authentication is connected to the memory card. After successful authentication of the memory card of the digital processor 30 signals starts reading the file TRKLIST.MSF information management tracks from the flash card memory 40 memory static random access memory 31.

As shown in Fig, in the file management information track containing the block 70 size restrictions playback. The file management information track is memorized in a predetermined area of the flash memory card 40 to the memory. Block 70 size restrictions playback is read from the flash memory static RAM 31 (36). Block 70 size limit playback to check on the availability of support is key. Shown in Fig contour detection of tampering includes circuit 71 computing the hash function, an encryption circuit 22 having the specified areas 72 and 73 of the memory that is a nonvolatile memory circuit 74 discovery of matches and a control part 75. The control portion 75 has an internal circuit 76 time. Scheme 71 computing the hash function circuit 74 detection of coincidences and the control part 75 supplemented hardware structure and software processes. Software process performs digital processor 30 signals. Scheme 71 computing the hash function can be supplemented, for example, a functional device, which is an encryption scheme 22.

The control part 75 monitors the status of the attached memory cards 40. If the card 40 memory connected to the digital audio playback device, the control part 75 determines whether the playback operation of the files listed in the card 40 to the memory in accordance with a given information block 70 size restrictions playback. The specified information is, for example, attribute And track, flag restrictions playback, the item LT protection, serial number, MG(D), the cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number is ω times ARTICLE a track, the number of times MT resolved playback key of the SS copy control, the number of times CN allowed high-speed digital copy (not necessarily), the content key (ck), etc. with regard to the date/time start playback and the date/time of expiration of play, then they are compared with the date/time of the internal circuit 76 time to determine the admissibility of playback operations. On the basis of the number of times the ARTICLE a track and the corresponding number of times MT resolved playback verify the validity playback operations.

Scheme 71 computing the hash function computes a hash function of the individual parameters of the block 70 size restrictions playback. The values of the hash function is obtained using a hash function. If the block 70 size restrictions playback tampered with, the hash function is changed. The hash function is generally defined in ISO/IEC 10118-1, JIS X5057-1. The hash function is a function which cannot be computed two different input values that cause the same output value. The result of the calculation circuit 71 computing the hash function serves on the encryption scheme 22.

Management information is available from the control part 75 in non-volatile memory encryption schemes 22. A hash function computed before about what aracia play put in a given area 72 of the RAM as the current values of the hash function. On the other hand, the values of the hash function computed after the previous playback operations, entered into as of the previous values of the hash functions in a given area 73 of the memory. The current values of the hash function and the previous value, the hash function stored in the encryption scheme 22, read, and served in scheme 74 identify matches. Values in predetermined areas 72 and 73 of the flash memory encryption schemes 22 cannot be read outside the digital recording device audio information. Thus, it is impossible to have outside access to the values of the hash functions listed in the zone 72 and 73. Outside you can only read result of the detection circuit 74 identify matches. Area, in which there is no access from the outside, is called secure against forgery area.

Scheme 74 match compares the current values of the hash function with the previous values of the hash function. Depending on the coincidence of the current values of the hash function with the previous values of the hash functions define, did the fake block 70 size restrictions playback. The output of circuit 74 match served to the control part 75.

The control module 75 determines whether the playback operation is permitted or prohibited in accordance with the definitions, cos the bathrooms on the attribute And track, the flag restrictions playback, the item LT protection, serial number, MG(D), cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback, the key of the SS copy control, the number of times CN allowed high-speed digital copy (not necessarily), the content key (ck), and the output circuit 74 identify matches. The control part 75 generates control information corresponding to the result of determination. In other words, if you determine that the block 70 size restrictions playback has not been tampered with and the playback operation is permitted, the control part 75 generates the control information, which allows the playback operation.

On the other hand, if the block 70 size restrictions playback has been tampered with, then the control part 75 generates control information that prohibits playback operation. Even if the block 70 size restrictions playback has not been tampered with, but the playback operation is prohibited in accordance with the attribute And track, flag restrictions playback, the item LT protection, serial number, MG(D), the cumulative number CONNUM content, date/time is February YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback key of the SS copy control, the number of times CN allowed high-speed digital copy (not necessarily), the content key (ck), the playback operation is prohibited.

In the above example was given of a process for detection of tampering of the ATRAC3 data file. Similarly, the process of detecting fakes is for information time S-YMDhms contained in the file PBLIST.MSF control playback. Code detecting fakes is created by calculating the content key (ck) of first programme of the ATRAC3 data file is created with the file PBLIST.MSF control playback using the hash function.

The process of calculation in this example is the same as for ATRAC3 data file. For this calculation process can be shared path used for ATRAC3 data file. Because the file can be erased or moved, the value of the content key (ck) remember in another file. If S-YMDhms time was not entered, all values of the hash functions are set equal to zero without performing calculations. If data has been update information S-YMDhms time, the calculated values of the hash function is tion.

On Fig shows the process in which the terminal of the electronic music distribution (EMD) (not shown) loads the memory card the ATRAC3 data file in a format according to the first variant of implementation. In addition, Fig shows the process in which the terminal EMD loads it into the memory card the ATRAC3 data file that has been compressed and encrypted, through the line shared line digital network with integrated services, telephone line or a satellite communication line). In this example, assume that the terminal EMD connected a new memory card (flash memory), which has not yet been used.

If the EMD terminal connected a new memory card, then at step SP101 create a file PBLIST.MSF control playback. Additionally, you create information date/time of download. Information date/time is stored as the information of the S-YMDhms-time file PBLIST.MSF control playback.

At step SP102 if the ATRAC3 data file is accepted by the shared line (line digital network with integrated services, telephone line or lines, satellite communication) and recorded in the flash memory, then create attribute header, shown in Fig.9, and add to the ATRAC3 data file.

At step SP103 using the content key (ck)contained in the attribute header, scheme 71 calculation Hae the function calculates information S-YMDhms-time file PBLIST.MSF control playback using the hash function and places the calculated value in the area 73 of the memory encryption schemes 22.

At step SP104 using the content key (ck)contained in the attribute header, scheme 71 computing the hash function computes the information restrictions playback (attribute And track, flag restrictions playback, the item LT protection, the date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback key of the SS copy control and the number of times CN allowed high-speed digital copying (optional)) ATRAC3 data file using a hash function. The calculated values obtained by using the schema 71 computing the hash function, making the area 73 of the memory encryption schemes 22.

Additionally, by using the content key (ck)contained in the attribute header, scheme 71 computing the hash function computes a sequence number MG(D) and cumulative number CONNUM content created with the attribute of the file using a hash function. The calculated values obtained by using the schema 71 computing the hash function, making the area 73 of the memory encryption schemes 22. Because data is written to a new flash memory, no data is recorded in the zone 72 memory encryption schemes 22.

At step SP105 determine disconnected or not the flash memory from the terminal EMD. If d is the query result of the determination at step SP105 is "Yes", then move on to step SP106. At step SP106 determine whether re-attached memory card. If the result of determination at step SP105 is "No", move on to step SP107. At step SP107 determine disconnected or not powered from terminal EMD.

If the result of determination at step SP107 is "Yes", then move on to step SP108. At step SP108 determine that it is again powered on.

If the result of determination at step SP106 is "Yes" or if the result of determination at step SP108 is "Yes", then move on to step SP109. At step SP109 using the content key (ck)contained in the attribute header, scheme 71 computing the hash function calculates information S-YMDhms-time file PBLIST.MSF control playback using the hash function. The calculated values obtained by using the schema 71 computing the hash function, making the area 72 memory encryption schemes 22.

At step SP110 determine coincide or not the current values of the hash function added to the zone 72 memory encryption schemes 22, with the previous values of the hash functions made in the area 73 of the memory encryption schemes 22. If the result of determination at step SP110 is "Yes", then the current values of the hash function added to the zone 72 memory encryption schemes 22, copying to the previous values of the hash functions made in the area 73 of the memory encryption scheme is s 22.

At step SP111 determine, or had not issued a command to reproduce. If the result of determination at step SP111 is "Yes" and if the result of determination at step SP110 is "Yes", then move on to step SP112. At step SP112 using the content key (ck)contained in the attribute header, scheme 71 computing the hash function computes the attribute And track, flag restrictions playback, the item LT protection, ordinal MG(D), the cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback key of the SS copy control and the number of times CN allowed high-speed digital copying (optional) attribute of the file added to the file data ATRAC3 corresponding to the command to reproduce, using the hash function. The calculated values obtained by using the schema 71 computing the hash function, making the area 72 memory encryption schemes 22.

After that, move on to step SP113. At step SP113 determine match or not, a hash function is added to the zone 72 memory encryption schemes 22, obtained by the circuit 71 computing the hash function, the values of the hash functions made in the area 73 of the memory encryption schemes 22.

Rhythm is and 74 match compares the calculated current values of the hash function with the previous calculated values of the hash function. If they match, determines that no attribute information And track, flag restrictions playback, item LT protection, serial numbers MG(D), the cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback key of the SS copy control and the number of times CN allowed high-speed digital copying (optional) attribute of the file has not been tampered with. After that, move on to step SP114. At step SP114 allow the execution of the replay operation of the ATRAC3 data file.

If the result of determination at step SP113 is "No", then determine what kind of attribute information And track, flag restrictions playback, item LT protection, serial numbers MG(D), the cumulative number CONNUM content, date/time YMDhms-S start playback, date/time YMDhms-E expiration playback, the number of times the ARTICLE a track, the number of times MT resolved playback key of the SS copy control and the number of times CN allowed high-speed digital copying (optional) attribute of the file has been tampered with. In this case, move on to step SP115. At step SP115 prohibit done is the playback operations of the ATRAC3 data file. After that, move on to step SP116. At step SP116 set a flag counterfeits.

After playing ATRAC3 data file to determine that it is set to the number of times the ARTICLE the track playing and the amount of time the MT is allowed to play. If the specified value was set for the number of times the ARTICLE play a track, then it is determined as 1. If the number of times the ARTICLE the track playing is 0 and the specified number (any positive integer) is set to the number of times the MT is allowed to play, since the playback operation has been performed, the number of times the permitted playback, the playback operation of the ATRAC3 data file is prohibited.

Below is a detailed description of the actual operation example of the terminal EMD in the format according to the second variant of implementation. Figure 3 shows an example of a process in which the terminal EMD loads a music file having limiting playback, equal to two times. For simplicity, it is assumed that the date/time of expiration of the playback is not limited. Terminal EMD has the same encryption scheme (not shown), as described above, the digital recording device sound. Encryption scheme authenticates the attached memory card. After successful authentication, the attached memory card the encryption scheme writes the encrypted audio file (ATRAC3 data file in the memory card. Additionally, the terminal EMD provides information restrictions playback in digital audio recording.

Digital recorder sound performs a formatting process for the audio file and information restrictions playback and writes the formatted data in flash memory. On Fig when the terminal EMD loads data into digital audio recording, he performs the process indicated by the position S201. At step S1 digital recorder sound receives data with the limitation of the number of times of playback, and sets MT=2 and NT=2 in the area TRKINF file TRKLIST information management tracks.

Additionally, the circuit 71 computing the hash function computes a hash function of several parameters (block 70 size limit reproduction), including MT, ST and identification code of the content. A hash function computed by the circuit 71 computing the hash function, is recorded in an area of 73 encoding scheme 22. After that, if I lose power digital recording device, sound, or if you have disconnected the card 40 to the storage unit 70 size restrictions playback is checked for fake information. If necessary, each time the operation of the playback unit 70 size restrictions playback can be checked on the subject for the presence of fake information.

After removing the memory cards 40 and reattaching, if at step S3 is given the command to reproduce, then move on to step S202. At step S4 scheme 71 computing the hash function computes a hash function block 70 size restrictions playback. A hash function computed by the circuit 71 computing the hash function shall be entered as the current values of the hash functions in the area 72 memory encryption schemes 22. The current values of the hash function and the previous value, the hash function is read and fed to the circuit 74 identify matches. Scheme 74 match compares the current values of the hash function with the previous values of the hash function. Depending on their coincidence circuit 71 a match to decide was or not tampered with block 70 size restrictions playback. Scheme 74 match delivers the detected result to the control part 75.

In accordance with the output circuit 74 match the operating part 75 generates control information. In other words, if the block 70 size restrictions playback has not been tampered with, since the current values of the hash function are the same as with the previous values of the hash function, it is fake information does not reveal. In this case, since the number of times playback of the ARTICLE is not equal to 0, then move on to step S5. In step 5, the control part 75 generates control information for controlling the playback operation and starts the playback operation. After performing playback operations move to step S6. At step S6, the number of times ART reproduction reduced by one step and thereby define ST=1. Additionally, calculate values of the hash function block 70 value constraints play and contribute as previous values of the hash functions in the area 73 of the memory.

After removing the memory cards 40 and re-attaching, if at step S7 is given the command to reproduce, then move on to step S203. At step S203 perform the same process as in step S202. In other words, calculate values of the hash function block 70 size restrictions playback and compare with the previous values of the hash function. Thereby determine was or not tampered with block 70 size restrictions playback (step S8). If the block 70 size restrictions playback has not been tampered with, then perform the playback operation (step S9). After that, the number of times the ARTICLE is reduced by 1 and thereby define ST=0 (step S10).

After setting the number of times the ARTICLE playback to zero (ST=0) number of times ARTICLE playback has priority regardless of whether forged block 70 size restrictions playback. Thus, the playback operation is prohibited. For example, after removing the memory cards 40 and the subsequent accession the Oia, if the team play was given at the step S11, then move on to step S12. At step S12 calculates the hash function block 70 size restrictions playback and compare the current values of the hash function with the previous values of the hash function. Since the current values of the hash function are the same as with the previous values of the hash function, it is usually the playback operation is permitted. However, since the number of times the ARTICLE playback is set to zero (ST=0), the playback operation is prohibited. Thus, in this case, the control part 75 generates control information that prohibits playback operation (step S13). Additionally, by using a speaker and/or display, the user is informed that, because the number of times the ARTICLE playback corresponds to the number of times MT resolved playback, the playback operation is prohibited.

Below is a description of the case, when tampered with the file TRKLIST information management tracks. For example, it is assumed that the file TRKLIST was forged at step S111 and the number of times MT resolved playback was forged 10 (MT=10).

If at step S22, the command was given to play, then move on to step S23. At step S23 calculate values of the hash function block 70 size restrictions playback. Value is a hash function is recorded in the area 72 of the RAM as the current values of the hash function. Scheme 74 match determines whether the current values of the hash function with the previous values of the hash function. In this case, since the block 70 size restrictions playback has been tampered with, the circuit 74 match determines that they are not the same. Thus, the control part 75 generates control information that prohibits playback operation (step S23). Thus, at step S24, the playback operation is not performed. In this case, using a speaker and/or display, the user is informed that since the block 70 size restrictions playback tampered with, the playback operation is prohibited.

After that, move on to step S25. At step S25 sets the flag counterfeits at a specified position (for example, in the area of the Reserve shown on Fig) area TRKINF file TRKLIST. Calculate values of the hash function and remember. In a state where a flag is set forgery, even if the number of times MT resolved playback is set to 2 (MT=2), because the flag is a fake, the playback operation is prohibited (step S26). In other words, before playing ATRAC3 data file check for the flag counterfeits. When the detection flag counterfeits control part 75 determines that the playback operation is prohibited. Thus, in this case, the beam control part 75 generates the control information, which prohibits the playback operation. Thus, the playback operation is not performed.

In the example above, each time when the operation of the playback number of times ARTICLE playback is reduced by 1. When the number of times the ARTICLE playback becomes zero (ST=0), the playback operation is prohibited. As an alternative solution, at each operation of the playback, it is possible to increase the number of times the ARTICLE of playback on 1. When the number of times the ART of play is equal to the number of times MT resolved playback (MT=ST), the playback operation may be prohibited. As another alternative solutions, you can reduce the number of times MT allowed play to 1, instead of using the number of times the ARTICLE playback.

Below is a description of a case in which set only the date/time YMDhms-E) expiration playback for the track, with the limitation of the playback area TRKINF file TRKLIST, without the use of the number of times the MT is allowed to play and the number of times the ARTICLE playback.

When loading a music file with the date/time of expiration of the playback terminal EMD in the memory card, the date/time of expiration of the playback record in the file management is possible by the information tracks of the memory card. Calculate values of the hash function block 70 size limit play, including the date/time of expiration playback. The values of the hash function contribute as previous values of the hash functions in the area 73 of the memory encryption schemes 22. After that, if you disconnected the power to the digital recording device, if you loose the card 40 memory or, if necessary, when issued the command to reproduce before performing the operation, the playback check unit 70 value constraints play for fake information. Additionally, compare the date/time of the internal circuit 76 time date/expiry time of playback.

After removing the memory cards 40 and its subsequent merger, when issued the command to reproduce calculate values of the hash function block 70 size restrictions playback. Scheme 74 match compares the current values of the calculated values of the hash function with the previous calculated values of the hash function. Depending on the comparison result of the coincidence circuit 74 match determines whether forged block 70 size restrictions playback. Additionally, the circuit 74 match compares the date/time of the internal circuit 76 time date/time osteceni the period of play. If the block 70 size restrictions playback has not been tampered with and date/time of the internal circuit 76 time as a result of comparison in scheme 74 the match is before the date/time of expiration playback, it performs the playback operation.

On the other hand, if the results of the validation with schema 74 coincidence detection unit 76 size restrictions playback has been tampered with, the playback operation is prohibited. Additionally, if the results of the validation with schema 74 match date/time of the internal circuit 76 time exceeds the expiration date of the play, even if the block 70 size restrictions playback has not been tampered with, an alarm flag is set expiration to a predetermined position (for example, in the area of the Reserve shown on Fig) area TRKINF file TRKLIST. In addition, the date/time of expiration playback has priority in relation to what was or was not tampered with block size limit play. Thus, the playback operation is prohibited.

In other words, before playback of the data file are compared to the current values of the hash function and the previous value of the hash function. If they do not match and found that the block 70 size restrictions playback tampered with, then the Opera the Oia reproduction is prohibited. However, even if the current values of the hash function are the same as with the previous values of the hash function, but disrupted date/expiry time of playback, the playback operation is prohibited. If the playback operation is prohibited, with the help of a loudspeaker or a display, the user receives an appropriate message. Even if the date/time of the internal circuit 76 time exceeds the time/date of expiry playback, the values of the hash function block 70 size restrictions playback calculate and contribute in memory for comparison with future fake information.

Below is a description of a case in which set only the date/time YMDhms-S) start playing a music file in the area TRKINF file TRKLIST instead of the number of times the MT is allowed to play and the number of times the ARTICLE playback.

When loading a music file from the terminal EMD in the memory card to record the date/time of the playback. Calculate values of the hash function block 70 size limit play, including the date/time of the playback, and served in the encryption scheme 22. The values of the hash function contribute as previous values of the hash functions in the area 73 of the memory encryption schemes 22. After that, if you disconnected the power to the digital recording device or if you loose the card 40 memory is on before performing the operation, the playback check unit 70 size restrictions playback on the subject of forgery. Additionally, check whether the date/time of the internal circuit 76 time management part 75 date/time start playback.

For example, after removing the memory cards 40 and its subsequent merger, when issued the command to reproduce compare the values of the current values of the hash function with the previous values of the hash function. Depending on the match or not, determine whether the forged block 70 size restrictions playback. Additionally, compare the date/time of the internal circuit 76 time from date/time to start playback. If the block 70 size restrictions playback has not been tampered with and date/time diagram 76 internal clock is greater than the date/time of the playback, you can enable the playback operation.

On the other hand, if the block 70 size restrictions playback has been tampered with, as in the case above, the playback operation is prohibited. Additionally, even if the block 70 size restrictions playback has not been tampered with, but the date/time of the internal circuit 76 time does not exceed the date of commencement of play, then the priority date/time start playing against fake information. Thus, the playback operation is prohibited.

In the example above, the DL is the detection of fake information, calculate the value of the hash function of the individual parameters (identification number content the number of times the ART of play, the number of times MT resolved playback, date/time of expiration of the playback and the date/time of the start of playback) block size limit play. As an alternative solution, the values of the hash function can be calculated for each music file.

In the example above, this invention is applied for a digital audio recording. In the alternative, the invention can be applied to other devices that process other types of data such as video data, audio data, program data, etc.

According to this invention, calculates the hash information of the playback restrictions. The obtained values of the hash functions are entered in the memory area to which it is impossible to access from the outside of the device. Depending on whether the same or not the previous value, the hash function using the current values of the hash function, define, or had not been tampered with, the information restrictions playback. If the control module detects fake information corresponding to the output comparing means, the control part prohibits playback operation. Thus, according to this invention, it is possible to reliably detect falsified information. When detecting the position of fake information, the playback operation of the file with fake information, may be prohibited.

Although the invention are presented and described with reference to a preferred variant implementation, for specialists in this field it is clear that you can make these and various other changes, omissions and additions in form and content, without departing from the idea and scope of this invention.

1. Reproducing device for reproducing data from the recording medium having an area and management area, and zone program is used to write multiple files, and zone control is used to control prohibiting fake information about a specific file, written in the area of the program containing computing tool designed to calculate prohibiting falsification of information managed in the management area of the recording medium each time you play the file recorded on the recording medium, compare tool for comparing the magnitude prohibiting falsification of information computed by the computing means in response to a command to play prior to the current team to play with the size of prohibiting falsification of information computed by the computing means in response to the current command for the reproduction, and the coincidence cf is vniiaemi values save values prohibiting falsification of information, computed by the computing means in response to the current command for the reproduction as a measure prohibiting the falsification of information computed by the computing means in response to a command to play prior to the current command to the playback, and control means designed to allow playback of the file corresponding to the current command for the reproduction, in the case of coincidence of the values of prohibiting falsification of information calculated in response to a command to play prior to the current command for the reproduction, and the magnitude of prohibiting falsification of information calculated in response to the current command for playback.

2. Reproducing device according to claim 1, characterized in that is made use of as prohibiting falsification of information, at least the number of times of playback and/or size restrictions playback.

3. Reproducing device according to claim 1, characterized in that is made use of as prohibiting the falsification of information, attribute information, flag restriction information, date/time start playback, date/time expiration playback, the number of times playback of the file, the number of times the permitted playback, the control flag copy the cation and the number of times allowed high-speed digital copy.

4. Reproducing device according to claim 1, characterized in that the computing means is arranged to calculate, based on the hash function.

5. Reproducing device according to claim 1, characterized in that the control means further comprises an internal timer, and the control means is arranged to prohibit playback operations, if information date/time counted by the internal timer corresponds to the date/time of expiration of playback.

6. Reproducing device according to claim 1, characterized in that the control means further comprises an internal timer, and the control means is arranged to prohibit playback operations, if information date/time counted by the internal timer corresponds to the date/time playback starts.

7. Reproducing device according to claim 1, characterized in that the control means further comprises an internal timer and reproducing device configured to reproduce data from the recording medium, in which the management area contains information date/time counted by the internal timer, the computing means is additionally configured to calculate information date/time using a given function of the comparing means is additionally made with the possibility of comparing the value of information date/time, computed by the computing means in response to the previous current command to reproduce, with the magnitude of information date/time calculated in response to the current command, and the coincidence of the compared values of the conservation value of information date/time computed by the computing means in response to the current command to play as the quantity of information date/time computed by the computing means in response to a command to play prior to the current command for the reproduction, and the control means is arranged to permit playback operations, if the amount of information date/time calculated in response to the previous current command to reproduce, as a result of the specified comparing means corresponds to the information of date/time calculated in response to the current command for playback.

8. Reproducing device according to claim 1, characterized in that the use of files, each of which contains information of the encryption key, and computing means configured to compute both the information of the encryption key contained in the file corresponding to the current command to reproduce, and prohibiting the falsification of information by using the specified options is I.

9. Reproducing device according to claim 1, characterized in that the use of files, each of which contains information of the encryption key, and create a new data encryption key when editing a specific file, and the computing means is arranged to calculate the data encryption key and prohibiting falsification of information by using the specified options.

10. Playback device for playback of the file from the recording medium on which recorded the main file and the control file playback, and the main file includes attribute header to control prohibiting forgery information, file playback control is used to control at least the time information containing:

the computational tool used to calculate prohibiting falsification of information managed in the management area of the recording medium, using the specified function with each playing the main file recorded on the recording medium, and to calculate the time information using the specified function with each update time;

first comparing means designed to compare the magnitude prohibiting falsification of information calculated by vychislitelnykhsistem in response to a command to reproduce, prior to the current command on the play, with the magnitude prohibiting falsification of information calculated in response to the current command for the reproduction, and the coincidence of the compared values save values prohibiting falsification of information computed by the computing means in response to the current command for the reproduction as a measure prohibiting the falsification of information computed by the computing means in response to a command to play prior to the current command to reproduce;

second comparing means designed to compare the value of the time information calculated by the computing means in connection with the previous information time value of the time information calculated by the computing means corresponding to the current time information, and the coincidence of the compared values of the conservation value of the time information calculated by the computing means corresponding to the current information time, as the value of time information calculated by the computing means in connection with the previous time information; and

control tool designed to allow playback of the main file, if the value of prohibiting falsification of information calculated in response to a command to reproduce, preaches the existing current command to reproduce, the same as in the result of the first comparing means with the magnitude prohibiting falsification of information calculated in response to the current command to reproduce, or if the value of the time information calculated in connection with the previous time information matches the result of the second comparing means with the value of the time information corresponding to the current time information.

11. Reproducing device according to claim 10, characterized in that is made use of as prohibiting falsification of information, at least the number of times of playback and/or size restrictions playback.

12. Reproducing device according to claim 10, characterized in that is made use of as prohibiting the falsification of information, attribute information, flag restriction information, date/time start playback, date/time expiration playback, the number of times playback of the file, the number of times the permitted playback, the control flag up and the number of times allowed high-speed digital copy.

13. Reproducing device according to claim 10, characterized in that the computing means is arranged to calculate, based on the cache function.

14. Reproducing device according to a10, characterized in that the control means further comprises an internal timer, and the control means is arranged to prohibit playback operations, if the information is date/time counted by the internal timer corresponds to the date/time of expiration of playback.

15. The playback device of claim 10, wherein the control means further comprises an internal timer, and the control means is arranged to prohibit playback operations, if the information is date/time counted by the internal timer corresponds to the date/time playback starts.

16. The playback device of claim 10, wherein the control means further comprises an internal timer, and reproducing device is made use of master files, each of which contains information of the encryption key, and computing means configured to compute both the information of the encryption key contained in the main file corresponding to the current command to reproduce, and prohibiting the falsification of information using the specified function.

17. Reproducing device according to claim 10, characterized in that made with the possibility of generating information of time when each record of the file, and you shall slideline means is arranged to calculate the key information and the time information, contained in the main file, using the specified options.

18. Reproducing device according to claim 10, characterized in that the use of master files, each of which contains information of the encryption key, and create a new data encryption key when editing a specific file, and computing means configured to compute a new data encryption key and prohibiting falsification of information by using the specified options.

19. The method of playback data from the recording medium having an area and management area, and the area of the program used to write multiple files, and zone control is used to control prohibiting fake information about a specific file, recorded in the zone of the program, containing the steps:

calculations using computational tools prohibiting falsification of information managed in the management area of the recording medium, each time you play the file recorded on the recording media;

comparison with comparing money values prohibiting falsification of information calculated in the step of calculating, in response to the previous current command to reproduce, with the magnitude prohibiting falsification of information calculated in the step of calculating the CTE is on the current team to play, and the coincidence of the compared values save values prohibiting falsification of information computed by the computing means in response to the current command for the reproduction as a measure prohibiting the falsification of information computed by the computing means in response to a command to play prior to the current command for reproduction; and

allow playback of the file by means of the control means corresponding to the current command to the playback, if the value of prohibiting falsification of information calculated in response to the previous current team to play matches in the result of the comparison by the phase comparison with the magnitude prohibiting falsification of information calculated in response to the current command for playback.

20. How to play file from the recording medium on which recorded the main file and the control file playback, and the main file has the attribute header to control prohibiting forgery information, file playback control is used to control at least the time information, comprising stages:

calculations using computational tools prohibiting falsification of information managed in the management area of the recording medium, using the specified function when kardanvalsrevice the main file, recorded on the recording medium, and calculating the time information using the specified function with each update time;

comparison by the first comparing means values prohibiting falsification of information calculated in the step of calculating, in response to the previous current command to reproduce, with the magnitude prohibiting falsification of information calculated in the step of calculating, in response to the current command for the reproduction, and the coincidence of the compared values save values prohibiting falsification of information computed by the computing means in response to the current command for the reproduction as a measure prohibiting the falsification of information computed by the computing means in response to a command to play prior to the current command to reproduce;

comparison by the second comparing means value of the time information calculated in the step of calculating the corresponding previous information of time, with the magnitude information of time calculated at the step of calculating corresponding to the current time information, and the coincidence of the compared values of the conservation value of the time information calculated in the step of calculating the corresponding current information time, as the value of information lying is neither, calculated at the step of calculating corresponding to the previous time information; and

resolution by means of the control means play the main file, if the value of prohibiting falsification of information calculated in response to the previous current command to reproduce the same results in comparison with the size of prohibiting falsification of information calculated in response to the current command to reproduce, or if the value of the time information calculated in connection with the previous information of time, the same as in the comparison with the value of time information corresponding to the current time information.



 

Same patents:

FIELD: digital memory technologies.

SUBSTANCE: board has rewritable power-independent memory and control circuit, means for storing address, pointing at limit between authentication area and non-authentication area, circuit for changing size of said areas. Reading device contains estimation means, reading information, pointing at number of times, for which digital data can be read, and playback means. Second device variant additionally has means for digital output of contents.

EFFECT: higher efficiency.

3 cl, 23 dwg

FIELD: computer science.

SUBSTANCE: method includes protective mathematical conversion of service data of network frame prior to transfer to environment for transfer of a LAN. To said protective conversion the data is subjected, which is contained in headers of network frames of channel level, and also in headers of all encapsulated network packets and segments. As a result the very possibility of interception is prevented.

EFFECT: higher efficiency.

7 cl, 2 dwg

FIELD: digital memory technologies.

SUBSTANCE: board has rewritable power-independent memory and control circuit, means for storing address, pointing at limit between authentication area and non-authentication area, circuit for changing size of said areas. Reading device contains estimation means, reading information, pointing at number of times, for which digital data can be read, and playback means. Second device variant additionally has means for digital output of contents.

EFFECT: higher efficiency.

3 cl, 23 dwg

FIELD: microprocessors.

SUBSTANCE: device has central processing devices, including first cryptographic block, at least one peripheral block, including second cryptographic block, device also has data bus, random numbers generator, conductor for supplying clock signal, conductor for providing random numbers signal, set of logical communication elements, while each cryptographic block has register of displacement with check connection.

EFFECT: higher level of unsanctioned access protection.

7 cl, 1 dwg

FIELD: electronics.

SUBSTANCE: device has signaling bus, loaded with clock signal, at least one couple of buses serving for encoding one bit, detector circuit, multiplexer. According to method in case of first value of signal of signal bus two buses of one couple detect same level of signal, and in case of second value of signal of signal bus two buses of one couple detect different signal levels, detect forbidden states during operation of board, change process of system functioning, to generate alarm in that way.

EFFECT: higher reliability of protection.

2 cl, 7 dwg

FIELD: copy protection.

SUBSTANCE: system has content distribution block, multiple recording and playback devices for digital data, calculations processing block, meant to perform communications with recording and playback devices and performing calculations processing for transferring license payments.

EFFECT: higher reliability of copy protection.

5 cl, 55 dwg

FIELD: computers.

SUBSTANCE: method includes, on basis of contents of central processor registers, received after processor performs some sort of command, by means of mathematical logical operation, forming certain finite control sum and storing it in memory, and on basis of contents of registers, received before start of execution by said processor of directly next command, certain starting checksum is formed, while if starting checksum mismatches finite checksum, error message is generated, which can be followed by halting of processor operation or blocking of chip board with its removal from circulation.

EFFECT: higher reliability.

2 cl, 2 dwg

FIELD: technologies for authentication of information.

SUBSTANCE: method includes performing absolute identification for confirming legality of data carrier according to first rule in preset time. Authentication information is recorded on this data carrier in previously set position. Process of arbitrary authentication is performed for confirming legality of said data carrier in accordance to second rule in arbitrary time. First rule includes announcing confirmation of standard match, if information for authentication is detected as registered in selected preset position. Second rule in given arbitrary authentication process includes announcing standard match, if information for authentication is detected as not registered in arbitrary positions, different from given preset position.

EFFECT: higher reliability.

6 cl, 12 dwg

Processor // 2248608

FIELD: computers, data protection.

SUBSTANCE: processor has bus interface device, device for selection/decoding of commands, device for dispatching/execution, program string decoding device, which string is selected from program and loaded in first levels command cash, which contains a set of N two-input elements XOR, keys memory, storing different N-bit decoding keys.

EFFECT: higher efficiency.

2 dwg

The invention relates to computing
The invention relates to computing, and in particular to information and computer systems and networks, and can be used in the network integrity monitoring for protection of information resources in workstations, informational, and functional servers, etc

Processor // 2248608

FIELD: computers, data protection.

SUBSTANCE: processor has bus interface device, device for selection/decoding of commands, device for dispatching/execution, program string decoding device, which string is selected from program and loaded in first levels command cash, which contains a set of N two-input elements XOR, keys memory, storing different N-bit decoding keys.

EFFECT: higher efficiency.

2 dwg

FIELD: technologies for authentication of information.

SUBSTANCE: method includes performing absolute identification for confirming legality of data carrier according to first rule in preset time. Authentication information is recorded on this data carrier in previously set position. Process of arbitrary authentication is performed for confirming legality of said data carrier in accordance to second rule in arbitrary time. First rule includes announcing confirmation of standard match, if information for authentication is detected as registered in selected preset position. Second rule in given arbitrary authentication process includes announcing standard match, if information for authentication is detected as not registered in arbitrary positions, different from given preset position.

EFFECT: higher reliability.

6 cl, 12 dwg

FIELD: computers.

SUBSTANCE: method includes, on basis of contents of central processor registers, received after processor performs some sort of command, by means of mathematical logical operation, forming certain finite control sum and storing it in memory, and on basis of contents of registers, received before start of execution by said processor of directly next command, certain starting checksum is formed, while if starting checksum mismatches finite checksum, error message is generated, which can be followed by halting of processor operation or blocking of chip board with its removal from circulation.

EFFECT: higher reliability.

2 cl, 2 dwg

FIELD: copy protection.

SUBSTANCE: system has content distribution block, multiple recording and playback devices for digital data, calculations processing block, meant to perform communications with recording and playback devices and performing calculations processing for transferring license payments.

EFFECT: higher reliability of copy protection.

5 cl, 55 dwg

FIELD: electronics.

SUBSTANCE: device has signaling bus, loaded with clock signal, at least one couple of buses serving for encoding one bit, detector circuit, multiplexer. According to method in case of first value of signal of signal bus two buses of one couple detect same level of signal, and in case of second value of signal of signal bus two buses of one couple detect different signal levels, detect forbidden states during operation of board, change process of system functioning, to generate alarm in that way.

EFFECT: higher reliability of protection.

2 cl, 7 dwg

FIELD: microprocessors.

SUBSTANCE: device has central processing devices, including first cryptographic block, at least one peripheral block, including second cryptographic block, device also has data bus, random numbers generator, conductor for supplying clock signal, conductor for providing random numbers signal, set of logical communication elements, while each cryptographic block has register of displacement with check connection.

EFFECT: higher level of unsanctioned access protection.

7 cl, 1 dwg

FIELD: digital memory technologies.

SUBSTANCE: board has rewritable power-independent memory and control circuit, means for storing address, pointing at limit between authentication area and non-authentication area, circuit for changing size of said areas. Reading device contains estimation means, reading information, pointing at number of times, for which digital data can be read, and playback means. Second device variant additionally has means for digital output of contents.

EFFECT: higher efficiency.

3 cl, 23 dwg

FIELD: computer science.

SUBSTANCE: method includes protective mathematical conversion of service data of network frame prior to transfer to environment for transfer of a LAN. To said protective conversion the data is subjected, which is contained in headers of network frames of channel level, and also in headers of all encapsulated network packets and segments. As a result the very possibility of interception is prevented.

EFFECT: higher efficiency.

7 cl, 2 dwg

FIELD: data carriers.

SUBSTANCE: device for reproduction of data from data carrier, program zone of which is used for recording a set of files, and control zone - for controlling copy protection data concerning the file, recorded in program zone, has computer for calculating copy protection information for each time file is reproduced, comparison means for comparing value, calculated on reproduction command, being prior to current one, to value, calculated on current reproduction command, and if these values coincide, the last value is stored as copy protection value, calculated on reproduction command , prior to current one and control means for allowing reproduction of file, appropriate for current command, if value, calculated as response to command, previous relatively to current command, coincides as a result of comparison to value, calculated as a response to current command.

EFFECT: higher reliability, higher efficiency.

4 cl, 46 dwg

FIELD: data carriers.

SUBSTANCE: device has calculating, reserving and recording modules. Each variant of semiconductor memory card contains area for recording user data for controlling volume and area for recording user data. On carrier method for computer initialization is recorded, including calculation of size of volume control information, reserving areas and recording therein of control information for volume and user data, recording main boot record and sectors table in first section of first area, skipping preset number of sectors, recording information of boot sector of section, file allocation table and root directory element to following sectors.

EFFECT: higher efficiency.

5 cl, 59 dwg

Up!