Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for controlling medium playback

A medium and data technology, applied in hardware monitoring, instrumentation, computing, etc., can solve problems such as increased opportunities for problems, increased costs, and increased equipment costs for presenting data.

Inactive Publication Date: 2007-04-11
INTEL CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

To achieve such constraints, expensive and complex security techniques are generally used to control the release of digital data
Such security technologies increase the cost of providing data to customers, increase the cost of the equipment that presents the data, and increase the chances of problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling medium playback
  • Method for controlling medium playback
  • Method for controlling medium playback

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] In order to overcome the limitations of the prior art, and more specifically to eliminate the need for complex security measures to protect published data, destructive read memories are used to store data. As used herein, the term "data" is intended to include any type of data that can be stored in memory, such as music, audio, video, computer software, digital images, etc. Instructions for digital signal processors, etc. When accessing data in destructive read memory, the accessed memory is automatically erased by the read action.

[0011] An example of destructively read memory is magnetic core memory developed by Jay Forrester at the Massachusetts Institute of Technology (MIT) in the 1950s. In core memory, binary bits (1 / 0) are stored as magnetic fields in tiny rings of ferrous material. To read the state of the bit in the ring, the magnetic field is changed to a known state, whereby the magnetic field stored by the ring is lost. The value (1 / 0) of the read bit is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A destructive-read memory is one that the process of reading the memory causes the contents of the memory to be destroyed. Such a memory may be used in devices that are intended to acquire data that may have associated usage restrictions, such as an expiration date, usage count limit, or data access fee for the acquired data. Typically, to enforce usage restrictions, and protect against theft, complex and often costly security techniques are applied to acquired data. With destructive-read memory, complex and costly security is not required for stored data. In one embodiment, a write-back mechanism, which may employ security, is responsible for enforcing usage restrictions. If the write-back mechanism determines continued access to acquired data is allowed, then it writes back the data as it is destructively read from the memory.

Description

technical field [0001] The present invention relates generally to distributing commercial products, and more particularly to using destructive read memory to provide restricted access to distributed commercial products without having to use cumbersome protective techniques to prevent Unexpected access to the product. Background technique [0002] There have been many recent advances in community file sharing technologies and the technologies required to digitally encode music data, audio and / or visual data. These advances allow people (or machines) to easily share and exchange such data, directly or indirectly through sharing services. Such sharing techniques can be used to help diffuse commercial and non-commercial data, such as music. An important problem hindering such proliferation is the difficulty in enforcing copyright and / or sharing policies for certain data. [0003] For example, one person may wish to "rent" a song or movie by allowing another person to download...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F1/00G06F21/00
CPCG06F2221/2143G06F2221/0797G06F21/79G06F2221/0773G06F21/1077G06F21/109G06F11/30
Inventor 约翰·加内
Owner INTEL CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More