Method and device for protecting user information against manipulations
A user information and user technology, applied to a computer program and a record carrier implementing the method, reading the protected and uncontrolled user information field, and being able to solve problems such as impossibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040]FIG. 1 shows a block diagram of an apparatus for protecting user information from manipulation according to the present invention. User information U such as administrative and / or security information stored on the same medium or transmitted together with said user information, eg for copy protection of content, is stored in the user channel with the first storage means 1 . The user channels are divided into a plurality of user channel groups, each group comprising one or more sectors. Thus, user data U is broken down and stored in these packets. In the assignment unit 2, status information on the status of the user channel groupings is assigned to these groups. By definition, different types of states of these packets should be distinguished by using predetermined types of state information. Thereafter, the second storage means 3 store said state information in an additional covert channel which is inaccessible with conventional means. Thus, intrusion into state info...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 