[go: up one dir, main page]

WO2005048256A2 - A data carrier having security mark and apparatus for handling such data carrier. - Google Patents

A data carrier having security mark and apparatus for handling such data carrier. Download PDF

Info

Publication number
WO2005048256A2
WO2005048256A2 PCT/IB2004/003611 IB2004003611W WO2005048256A2 WO 2005048256 A2 WO2005048256 A2 WO 2005048256A2 IB 2004003611 W IB2004003611 W IB 2004003611W WO 2005048256 A2 WO2005048256 A2 WO 2005048256A2
Authority
WO
WIPO (PCT)
Prior art keywords
data carrier
mark
security mark
optical
security
Prior art date
Application number
PCT/IB2004/003611
Other languages
French (fr)
Other versions
WO2005048256A3 (en
Inventor
Pim Theo Tuyls
Johan Paul Marie Gerard Linnartz
Original Assignee
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics N.V. filed Critical Koninklijke Philips Electronics N.V.
Publication of WO2005048256A2 publication Critical patent/WO2005048256A2/en
Publication of WO2005048256A3 publication Critical patent/WO2005048256A3/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00876Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy

Definitions

  • a data carrier having security mark and apparatus for handling such data carrier having security mark and apparatus for handling such data carrier.
  • the present invention relates to a data carrier having a security mark.
  • the invention proposes to use a security mark which is of the optical type.
  • the main idea of the invention is to use a device which is disclosed in the article: "Physical One- Way Function" by Ravikanth Pappu et al., in SCIENCE, Vol.297, 20 September 2002, ⁇ p.2026- 2030.
  • Fig.1 shows a data carrier in accordance with the invention.
  • Fig.2 shows an apparatus suitable for a data carrier shown in Fig.1 , according to the invention.
  • Fig.3 shows another embodiment of an apparatus according to the invention.
  • Fig.1 shows a data carrier according to the invention.
  • the data carrier is an optical disc 1.
  • a mark 2 is put on the data carrier 1. This mark may be put on a dead zone ZD of the carrier, or even on an active zone ZA , in which case the mark has the reference 2' .
  • the mark that the invention proposes in a preferred embodiment is disclosed in the document cited above.
  • Fig.2 shows an apparatus in which a data carrier 1, notably an optical disc, is placed.
  • the data carrier 1 is shown in cross-section.
  • an optical head 10 comprising a lens 12 focuses a laser light beam 14.
  • This optical head 10 is placed in a moving part using a sledge 16 for large displacements and using actuators 20 and 21 for small displacements.
  • the sledge 16 is moved by a motor 17. These displacements are performed in directions indicated by arrows 24 and 26.
  • the head 10 comprises a photo-detector for providing a signal OPT which represents the reflection of the beam 14 onto the carrier 1.
  • This signal OPT is applied to a signal distributor 27, which provides signals for a display unit 30 so that the contents of disc can be displayed together with some other information pertinent to the use of the apparatus.
  • the distributor 27 also provides other signals for the operation of the apparatus, notably for acting on the sledge 16 and on actuators 20 and 21 in that signals TRf and TRr, respectively, are supplied to control devices 35 and 36.
  • a speckle pattern analyzing device 40 which provides an authentication code when the light is reflected from the mark 2. If this authentication is wrong or absent, reading of the carrier is stopped by cutting, for instance, the signal OPT. When actuated, the sledge 16 and the actuators 20 and 21, can position the optical head 10 on the optical security mark. The optical head is thus used for reading the data recorded in the data carrier and for anlyzing the optical mark as well.
  • the first proposed solution is based on the theory of "Physical One Way Functions"
  • POWFs [R.Pappu, et al.] [R.Pappu, et al.] cited above.
  • a coherent laser beam irradiates the optical microstructure, it produces a speckle pattern that can be recorded by a camera.
  • the optical head 10 is used for this purpose, i.e. for analyzing the speckle pattern.
  • the speckle pattern analyzing device 40 applies an algorithm (e.g. based on a wavelet transform) to the recorded speckle pattern in order to turn it into a string of bits. This string of bits is then the unique identification string associated with the disc having the embedded microstructure. It is noted that several bit strings may be derived from a POWF.
  • an additional optical head 60 is provided for analyzing the security mark 2.
  • This head 60 may be in a well defined position along the radius of the optical disc. This is found to be not too limitative for security as the analyzing of the mark is estimated to be strong enough for the authentication.
  • the reading of the stream gives the string that enables the operation of the apparatus.
  • the additional optical head 60 is set to a given wavelength, to a 3D angle, and to a spatial light modulation pattern such that the speckle pattern can be processed. The idea is that such a microstructure is difficult to clone and that it is impossible to simulate the passage of light through such disordered media.
  • the content provider issues content (software, music, movies, ...) on a disc, which also contains an identification string.
  • a microstructure with weak non-linearity properties that is difficult to clone is embedded in this disc.
  • the content provider then stores for various challenges (different wavelengths, 3D angles, ...) the unique fingerprint of the microstructure together with the identification string in a database.
  • challenges different wavelengths, 3D angles, ...) the unique fingerprint of the microstructure together with the identification string in a database.
  • the user of the content asks for some service, he sends his identification string (that he finds on his disc) to the content provider.
  • the content provider then sends a challenge to the user in order to find out whether he is a legitimate user.
  • the owner lets his physical device probe the microstructure in the disc in accordance with the challenge and sends the reply to the content provider.
  • the content provider compares the answers with the responses stored in his database according to the identification string. If the answers correspond to the data stored in the database, the content provider knows that he is doing business with someone who is a legitimate owner of the content. It follows that someone who has copied the content on the disc cannot copy the microstructure, so the protocol will not be successfully finished.
  • the "storage" of a key is claimed. This key is derived from the POWF by irradiations with a laser beam and is embedded in an optical disc.An example is an optical microstructure (weakly non-linear optical medium) which when irradiated with a laser beam gives a unique fingerprint of the structure (as before).
  • the robust part of the speckle pattern may be used as (part of) a key with which the content on the disc can be encrypted.
  • Another embodiment of the invention is to "store" the key by embedding a holographic medium (keys can be stored in contrast in a holographic medium) in the disc in which the key is stored. So the security mark is qualified as being of holographic type. Then the device 40 has to be modified by the application of a unique spatial modulation filter, which has to be put on top of the holographic medium in order to retrieve the key. Again, it is the idea that the structures are difficult to clone and can therefore be used for content protection purposes.
  • the term "security mark” means a mark which can be used for authentication and/or encryption. The authentication mark may be derived by feeding a challenge. The security mark may be used as a key with which the contents of optical disc can be decrypted. Finally, this physical identifier may also be used for disc type recognition.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Optical Recording Or Reproduction (AREA)
  • Holo Graphy (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

The present invention relates to a data carrier (1) having a security mark (2) in which a code is embedded, which security mark is of an optical type. For instance, the mark is of the POWF (Physical One Way Functions) type which gives a speckle pattern for a specific light. From this speckle pattern it is possible to determine a code from which it is possible to get an authentication mark or a decrypting key. In an alternative, it is possible to use a hologram from which a key or authentication mark can be derived by using a unique spatial modulation filter at the level of the analysis of the security mark.

Description

A data carrier having security mark and apparatus for handling such data carrier.
FIELD OF THE INVENTION The present invention relates to a data carrier having a security mark.
BACKGROUND OF THE INVENTION This kind of data carrier is well known and finds its application, especially in the avoidance of fraudulent copying of its contents. It is well known to put some security mark on a data carrier, for instance a hole in a floppy disc in a defined place. This makes it difficult to copy the floppy disc with the hole in the right place with respect to the data. In the apparatus designed to handle the data contained in the floppy disc, means are provided for checking the place of hole and for refusing to operate if it is not found in the right place. These old measures are not very well suited for optical discs and not sufficient from a content protection point of view. The invention proposes an above-mentioned data carrier, notably an optical disc, in which measures are provided for obtaining a better authentication of the data carrier.
SUMMARY OF THE INVENTION The invention proposes to use a security mark which is of the optical type. The main idea of the invention is to use a device which is disclosed in the article: "Physical One- Way Function" by Ravikanth Pappu et al., in SCIENCE, Vol.297, 20 September 2002, ρp.2026- 2030. These and other aspects of the invention are apparent from and will be elucidated, by way of non-limitative example, with reference to the embodiment(s) described hereinafter.
BRIEF DESCRIPTION OF THE DRAWINGS The present invention will now be described in more detail, by way of example, with reference to the accompanying drawings, wherein: Fig.1 shows a data carrier in accordance with the invention. Fig.2 shows an apparatus suitable for a data carrier shown in Fig.1 , according to the invention. Fig.3 shows another embodiment of an apparatus according to the invention.
DETAILED DESCRIPTION OF THE INVENTION Fig.1 shows a data carrier according to the invention. The data carrier is an optical disc 1. In accordance with the invention, a mark 2 is put on the data carrier 1. This mark may be put on a dead zone ZD of the carrier, or even on an active zone ZA , in which case the mark has the reference 2' . The mark that the invention proposes in a preferred embodiment is disclosed in the document cited above. Fig.2 shows an apparatus in which a data carrier 1, notably an optical disc, is placed. The data carrier 1 is shown in cross-section. On this carrier, which is driven into rotation by a motor 3, an optical head 10 comprising a lens 12 focuses a laser light beam 14. This optical head 10 is placed in a moving part using a sledge 16 for large displacements and using actuators 20 and 21 for small displacements. The sledge 16 is moved by a motor 17. These displacements are performed in directions indicated by arrows 24 and 26. The head 10 comprises a photo-detector for providing a signal OPT which represents the reflection of the beam 14 onto the carrier 1. This signal OPT is applied to a signal distributor 27, which provides signals for a display unit 30 so that the contents of disc can be displayed together with some other information pertinent to the use of the apparatus. The distributor 27 also provides other signals for the operation of the apparatus, notably for acting on the sledge 16 and on actuators 20 and 21 in that signals TRf and TRr, respectively, are supplied to control devices 35 and 36. According to the first aspect of the invention, a speckle pattern analyzing device 40 is provided which provides an authentication code when the light is reflected from the mark 2. If this authentication is wrong or absent, reading of the carrier is stopped by cutting, for instance, the signal OPT. When actuated, the sledge 16 and the actuators 20 and 21, can position the optical head 10 on the optical security mark. The optical head is thus used for reading the data recorded in the data carrier and for anlyzing the optical mark as well. The first proposed solution is based on the theory of "Physical One Way Functions"
(POWFs) [R.Pappu, et al.] cited above. According to the idea, it is proposed to embed a weakly non-linear optical microstructure into a disc. When a coherent laser beam irradiates the optical microstructure, it produces a speckle pattern that can be recorded by a camera. Preferably, the optical head 10 is used for this purpose, i.e. for analyzing the speckle pattern. The speckle pattern analyzing device 40 applies an algorithm (e.g. based on a wavelet transform) to the recorded speckle pattern in order to turn it into a string of bits. This string of bits is then the unique identification string associated with the disc having the embedded microstructure. It is noted that several bit strings may be derived from a POWF. The bit strings that are derived depend on the way in which the POWF is challenged. In another embodiment of the invention shown in Fig.3, an additional optical head 60 is provided for analyzing the security mark 2. This head 60 may be in a well defined position along the radius of the optical disc. This is found to be not too limitative for security as the analyzing of the mark is estimated to be strong enough for the authentication. The reading of the stream gives the string that enables the operation of the apparatus. The additional optical head 60 is set to a given wavelength, to a 3D angle, and to a spatial light modulation pattern such that the speckle pattern can be processed. The idea is that such a microstructure is difficult to clone and that it is impossible to simulate the passage of light through such disordered media. Commercial applications could then be supported in according with the following procedure. The content provider issues content (software, music, movies, ...) on a disc, which also contains an identification string. A microstructure with weak non-linearity properties that is difficult to clone is embedded in this disc. The content provider then stores for various challenges (different wavelengths, 3D angles, ...) the unique fingerprint of the microstructure together with the identification string in a database. When the user of the content asks for some service, he sends his identification string (that he finds on his disc) to the content provider. The content provider then sends a challenge to the user in order to find out whether he is a legitimate user. Then, the owner lets his physical device probe the microstructure in the disc in accordance with the challenge and sends the reply to the content provider. The content provider compares the answers with the responses stored in his database according to the identification string. If the answers correspond to the data stored in the database, the content provider knows that he is doing business with someone who is a legitimate owner of the content. It follows that someone who has copied the content on the disc cannot copy the microstructure, so the protocol will not be successfully finished. As a second application, the "storage" of a key is claimed. This key is derived from the POWF by irradiations with a laser beam and is embedded in an optical disc.An example is an optical microstructure (weakly non-linear optical medium) which when irradiated with a laser beam gives a unique fingerprint of the structure (as before). The robust part of the speckle pattern may be used as (part of) a key with which the content on the disc can be encrypted. Another embodiment of the invention is to "store" the key by embedding a holographic medium (keys can be stored in contrast in a holographic medium) in the disc in which the key is stored. So the security mark is qualified as being of holographic type. Then the device 40 has to be modified by the application of a unique spatial modulation filter, which has to be put on top of the holographic medium in order to retrieve the key. Again, it is the idea that the structures are difficult to clone and can therefore be used for content protection purposes. The term "security mark" means a mark which can be used for authentication and/or encryption. The authentication mark may be derived by feeding a challenge. The security mark may be used as a key with which the contents of optical disc can be decrypted. Finally, this physical identifier may also be used for disc type recognition.

Claims

CLAIMS:
1) A data carrier having a security mark, characterized in that this security mark is of an optical type.
2) A data carrier as claimed in claim 1, wherein the security mark is a mark from which an authentication code can be derived in that a challenge is fed into said mark.
3) A data carrier as claimed in claim 1 or 2, characterized in that this security mark is of the POWF (Physical One Way Functions) type.
4) A data carrier as claimed in claim 1 or 2, characterized in that the security mark is of the holographic type.
5) A data carrier as claimed in claims 1 to 4, characterized in that the data carrier is an optical disc.
6) A data carrier as claimed in claim 1, 2, 3 or 5, characterized in that the security mark provides a speckle pattern from which said security is derived.
7) A data carrier as claimed in claim 4 or 5, characterized in that the security mark comprises an hologram from which said authentication code is derived.
8) An apparatus suited for handling a data carrier as claimed in claim 3 or 6, characterized in that it comprises a speckle pattern analyzing device.
9) An apparatus suited for handling a data carrier as claimed in claim 4 or 7, characterized in that it comprises a unique spatial modulation filter for determining the hologram from which an authentication code is derived. 10) An apparatus as claimed in claim 8 or 9, characterized in that it comprises one optical head for reading the data recorded in the data carrier and for reading the optical mark
11) An apparatus as claimed in claimss 8 or 9, characterized in that it comprises a first optical head for reading the data recorded in the data carrier and a second optical head for treading the optical mark.
12) An apparatus as claimed in claims 8 to 11, comprising an authentication detector for deriving said authentication code and for enabling the handling of the data carrier when the authentication code is judged to be correct.
13) Optical data carrier with a security mark from which an embedded key is derived by means of which the contents can be decrypted.
PCT/IB2004/003611 2003-11-14 2004-11-04 A data carrier having security mark and apparatus for handling such data carrier. WO2005048256A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP03300217 2003-11-14
EP03300217.1 2003-11-14

Publications (2)

Publication Number Publication Date
WO2005048256A2 true WO2005048256A2 (en) 2005-05-26
WO2005048256A3 WO2005048256A3 (en) 2005-07-28

Family

ID=34585924

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2004/003611 WO2005048256A2 (en) 2003-11-14 2004-11-04 A data carrier having security mark and apparatus for handling such data carrier.

Country Status (2)

Country Link
TW (1) TW200523897A (en)
WO (1) WO2005048256A2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006013528A1 (en) * 2004-07-29 2006-02-09 Koninklijke Philips Electronics N.V. Information carrier with copy protection, system for reading such an information carrier
GB2428948A (en) * 2005-07-27 2007-02-07 Ingenia Technology Ltd Key distribution by combination with a signature obtained from a scan of an unmodified token
WO2007023420A1 (en) * 2005-08-23 2007-03-01 Koninklijke Philips Electronics N.V. Information carrier authentication with a physical one-way function
FR2894371A1 (en) * 2005-12-06 2007-06-08 Univ Louis Pasteur Etablisseme DIGITAL SECURITY CODING SECURITY SYSTEM FOR OPTICAL DISCS.
EP1918913A1 (en) * 2006-10-31 2008-05-07 Thomson Holding Germany GmbH & Co. OHG Method for producing a security mark on an optical data carrier
WO2008152547A1 (en) * 2007-06-12 2008-12-18 Nxp B.V. Secure storage
US7564345B2 (en) 2004-11-12 2009-07-21 Verayo, Inc. Volatile device keys and applications thereof
US7646869B2 (en) 2003-04-29 2010-01-12 Koninklijke Philips Electronics N.V. System for copy protection of an information carrier
US8630410B2 (en) 2006-01-24 2014-01-14 Verayo, Inc. Signal generator based device security
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1730675B1 (en) 2004-03-12 2015-05-20 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
RU2380750C2 (en) 2004-03-12 2010-01-27 Инджениа Текнолоджи Лимитед Methods and devices for creation of printing products with possibility of their identification and their subsequent verification
GB2417592B (en) 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
JP5123181B2 (en) 2005-07-27 2013-01-16 インジェニア・テクノロジー・(ユーケイ)・リミテッド Authenticity verification
CN101923647B (en) 2005-12-23 2013-01-09 英根亚控股有限公司 Optical authentication
GB2466311B (en) 2008-12-19 2010-11-03 Ingenia Holdings Self-calibration of a matching algorithm for determining authenticity
GB2466465B (en) 2008-12-19 2011-02-16 Ingenia Holdings Authentication
GB2476226B (en) 2009-11-10 2012-03-28 Ingenia Holdings Ltd Optimisation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8812890D0 (en) * 1988-05-31 1988-07-06 De La Rue Co Plc Security device & methods & apparatus for verification
FR2849245B1 (en) * 2002-12-20 2006-02-24 Thales Sa METHOD FOR AUTHENTICATION AND OPTICAL IDENTIFICATION OF OBJECTS AND DEVICE FOR IMPLEMENTING THE SAME
CN1781151B (en) * 2003-04-29 2010-09-01 皇家飞利浦电子股份有限公司 System for copy protection of an information carrier

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US7646869B2 (en) 2003-04-29 2010-01-12 Koninklijke Philips Electronics N.V. System for copy protection of an information carrier
WO2006013528A1 (en) * 2004-07-29 2006-02-09 Koninklijke Philips Electronics N.V. Information carrier with copy protection, system for reading such an information carrier
US7564345B2 (en) 2004-11-12 2009-07-21 Verayo, Inc. Volatile device keys and applications thereof
US8756438B2 (en) 2004-11-12 2014-06-17 Verayo, Inc. Securely field configurable device
US7839278B2 (en) 2004-11-12 2010-11-23 Verayo, Inc. Volatile device keys and applications thereof
US7702927B2 (en) 2004-11-12 2010-04-20 Verayo, Inc. Securely field configurable device
GB2428948B (en) * 2005-07-27 2007-09-05 Ingenia Technology Ltd Keys
GB2428948A (en) * 2005-07-27 2007-02-07 Ingenia Technology Ltd Key distribution by combination with a signature obtained from a scan of an unmodified token
US8887309B2 (en) 2005-08-23 2014-11-11 Intrinsic Id B.V. Method and apparatus for information carrier authentication
WO2007023420A1 (en) * 2005-08-23 2007-03-01 Koninklijke Philips Electronics N.V. Information carrier authentication with a physical one-way function
US10803900B2 (en) 2005-08-23 2020-10-13 Intrinsic Id B.V. Method and apparatus for information carrier authentication
WO2007065995A1 (en) * 2005-12-06 2007-06-14 Universite Louis Pasteur, U.L.P. System for securing by diffractively digitally encoding optical discs
FR2894371A1 (en) * 2005-12-06 2007-06-08 Univ Louis Pasteur Etablisseme DIGITAL SECURITY CODING SECURITY SYSTEM FOR OPTICAL DISCS.
US8630410B2 (en) 2006-01-24 2014-01-14 Verayo, Inc. Signal generator based device security
US8953235B2 (en) 2006-10-30 2015-02-10 Thomson Licensing Method for producing a security mark on an optical data carrier
EP1918913A1 (en) * 2006-10-31 2008-05-07 Thomson Holding Germany GmbH & Co. OHG Method for producing a security mark on an optical data carrier
KR101413209B1 (en) * 2006-10-31 2014-06-27 톰슨 라이센싱 Method for generating a security indication on an optical data carrier
JP2008117399A (en) * 2006-10-31 2008-05-22 Thomson Licensing Method for generating a security mark on an optical data carrier
WO2008152547A1 (en) * 2007-06-12 2008-12-18 Nxp B.V. Secure storage
US9214183B2 (en) 2007-06-12 2015-12-15 Nxp B.V. Secure storage
US8782396B2 (en) 2007-09-19 2014-07-15 Verayo, Inc. Authentication with physical unclonable functions

Also Published As

Publication number Publication date
WO2005048256A3 (en) 2005-07-28
TW200523897A (en) 2005-07-16

Similar Documents

Publication Publication Date Title
WO2005048256A2 (en) A data carrier having security mark and apparatus for handling such data carrier.
US9686082B2 (en) Generating and processing an authentication certificate
US5572589A (en) Disc serialization
JP6883676B2 (en) Methods and systems for marking manufactured items to detect unauthorized refills
US8447038B2 (en) Method and systems using identifier tags and authenticity certificates for detecting counterfeited or stolen brand objects
US20080149700A1 (en) Speckle Pattern For Authenticating An Information Carrier
US9548863B2 (en) Method for unambiguous marking of an object
JP2007537527A (en) Identification system
DE69435066D1 (en) A method for preventing unintentional betrayal of the stored digital secrets by a trustee
JP2009506613A (en) Information carrier authentication by physical one-way function
JPH10260939A (en) Computer network client machine authentication method, client machine, host machine and computer system
CN100527812C (en) Recording medium and production method, playback method, and playback device thereof
CA2528917A1 (en) Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data
US6865554B1 (en) Device and method for producing an optical registration carrier by means of a master mold, an optical registration carrier
CN116599750A (en) System and method for ensuring traceability of data change by utilizing encryption technology
JP4355585B2 (en) Personal authentication method, personal authentication system, and optical information recording medium
US20100161994A1 (en) Method and apparatus for authenticating static data carriers
US20080010459A1 (en) System and method of securing optical media
Tuyls et al. A data carrier having security mark and apparatus for handling such data carrier
CN100592330C (en) Identification systems using mechanical vibrations on identifiers
Potlapally Optical fingerprinting to protect data: a proposal
JPWO2003102925A1 (en) Magnetic recording medium authentication method, magnetic recording medium authentication system, and certifiable magnetic recording medium
US20090003143A1 (en) Recording Medium, Recording/Reproduction Apparatus and Replay Apparatus

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase