Method for limiting protected data in storing device from being copied to personal computer (PC) end

A storage device and data replication technology, applied in the direction of program/content distribution protection, preventing unauthorized use of memory, etc., can solve the problems of rising R&D costs, unable to copy songs, unable to play, etc., to reduce the risk of inventory, protect Works well, achieves simple effects

Inactive Publication Date: 2013-05-15
SINO WEALTH ELECTRONICS
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are two options: one is that the song file adopts a special audio format with a copyright protection mechanism, and the player also needs to support the corresponding copyright protection mechanism. As mentioned above, the player can use the Microsoft DRM technology. The user can freely manage the song files in the player directly through the Windows Explorer, but because the purchased songs have been encrypted by DRM technology, even if the user copies them and puts them on other players, they cannot be played; Yes, the song files are in the standard MP3 format without special processing, but after the player is connected to the PC, it is necessary to use the PC software provided by the manufacturer to copy the user's own song files to the player, and the player cannot be copied to the player through this software. Copy the songs in it to achieve the purpose of copyright protection
Among these two solutions, the first one adopts the Microsoft standard DRM method, and the cost of the whole system is relatively high, and related authorization fees need to be paid, and the implementation of DRM technology on the player will also increase the cost, resulting in overall manufacturing and sales. In addition, Microsoft's DRM technology currently only supports Windows operating systems, and does not support common Linux and MAC OS; the second solution is simpler than the first one, and the player does not need to support complex encryption technology However, the manufacturer still needs to develop a special tool for the PC, and even develop corresponding versions for different operating systems. The research and development costs have increased significantly. In addition, users need to use this tool when managing song files on the player. Tools are obviously not as convenient as directly operating in the operating system, resulting in greatly reduced user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for limiting protected data in storing device from being copied to personal computer (PC) end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with specific embodiment and accompanying drawing, set forth more details in the following description so as to fully understand the present invention, but the present invention can obviously be implemented in a variety of other ways different from this description, Those skilled in the art can make similar promotions and deductions based on actual application situations without violating the connotation of the present invention, so the content of this specific embodiment should not limit the protection scope of the present invention.

[0025] figure 1 It is a flow chart of a method for copying protected data in a storage device to a PC under the limitation of an embodiment of the present invention. This method can be used to protect data when copying copyright-protected data in a storage device to a PC, to avoid acquired by the user. Such as figure 1 As shown, the above methods may include:

[0026...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for limiting protected data in a storing device from being copied to a personal computer (PC) end. The method includes that the protected data is copied to the storing device with a normal method; the storing device performs address analysis and recording storage on the protected data; the storing device detects a data reading command sent by the PC end and an address of data needing to be read when the storing device is connected with the PC end; the storing device compares the address required by the PC end to be accessed with an address of the protected data which are recorded and stored; and if the address required to be accessed is located in the address of the data recorded and stored, the data are transmitted to the PC end after being modified, and otherwise, the data are directly read and transmitted to the PC end. The method for limiting the protected data in the storing device from being copied to the PC end is simple to achieve, convenient to use, and dispensed with a complex authorization mechanism. The storing device can achieve the data copy limiting only through the method of firmware modifying, hardware modifying is not required, and hardware cost is not increased.

Description

technical field [0001] The invention relates to a method for limiting copying of protected data in a storage device to a PC, and can be used in the technical field of copyright protection. Background technique [0002] Copyright protection has always been an obstacle between manufacturers and consumers. On the one hand, consumers hope to obtain unrestricted use experience, on the other hand, manufacturers hope that their products can be sufficiently protected from being stolen by other manufacturers. [0003] For multimedia players, the contradiction brought about by the copyright protection mechanism is particularly obvious. Taking portable music players as an example, ordinary MP3 songs have no copyright protection mechanism, and users can freely copy and share them with others. Therefore, Microsoft has developed the WMA format that supports DRM (Digital Rights Management) technology as the digital carrier of genuine music. Song files encrypted by DRM can only be played ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/10G06F12/14
Inventor 张钦
Owner SINO WEALTH ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products