Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for protecting user information against manipulations

A user information and user technology, applied to a computer program and a record carrier implementing the method, reading the protected and uncontrolled user information field, and being able to solve problems such as impossibility

Inactive Publication Date: 2008-09-03
KONINK PHILIPS ELECTRONICS NV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when using conventional means, it is not possible to store restricted sector information in a safe and unmanipulated manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting user information against manipulations
  • Method and device for protecting user information against manipulations
  • Method and device for protecting user information against manipulations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]FIG. 1 shows a block diagram of an apparatus for protecting user information from manipulation according to the present invention. User information U such as administrative and / or security information stored on the same medium or transmitted together with said user information, eg for copy protection of content, is stored in the user channel with the first storage means 1 . The user channels are divided into a plurality of user channel groups, each group comprising one or more sectors. Thus, user data U is broken down and stored in these packets. In the assignment unit 2, status information on the status of the user channel groupings is assigned to these groups. By definition, different types of states of these packets should be distinguished by using predetermined types of state information. Thereafter, the second storage means 3 store said state information in an additional covert channel which is inaccessible with conventional means. Thus, intrusion into state info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method of protecting user information (U) against manipulations. In order to provide a high level of protection against any kind of manipulation without increasing the overhead significantly a method is proposed comprising the steps of: (a) storing said user information (1) in user channel packets of a user channel, (b) assigning state infomation (2) to said user channel packets said state infomation being used to indicate if a user channel packet has been manipulated and / or is unstable or not, and (c) storing said state information (3) assigned to said user channel packets in an additional hidden channel embedded in said user channel, said state information assigned to a user channel packet being stored in the associated hidden channel packet. The invention relates further to a corresponding method of reading user information.

Description

technical field [0001] The present invention relates to methods and apparatus for protecting user information from manipulation. Furthermore, the invention relates to a corresponding method and a device for reading user information that is protected from manipulation. Furthermore, the invention relates to a computer program and a record carrier for implementing the method. Background technique [0002] More and more content stored on any type of record carrier should be protected against intrusion and illegal copying. This is increasingly applied to CDs and is typical of DVDs. A number of different ways of providing copy protection have been suggested. Security information such as copy protected data and other kinds of administrative data is thus provided on the medium. For example, a rewritable optical disc includes security information in an adaptation layer. However, each type of rewritable media presents unique risks in that non-compliant systems are able to selecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G11B20/00G06F21/62G06F12/14G06F21/10G06F21/60G06F21/73G11B11/00G11B20/10G11B20/12
CPCG11B20/00086G11B20/0021G11B20/00369
Inventor W·F·J·方蒂恩
Owner KONINK PHILIPS ELECTRONICS NV