The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Disclosed is a method to prevent illegal copying of copyrighted material recorded on media such as optical discs.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
94% of the total text.
Page 1 of 1
A method of copy protection for recordable media
Disclosed is a method for preventing illegal copying of copy-righted materials recorded
on media such as optical discs. This method takes advantage of natural defects found
in the recording media. Many approaches exists that make artificial defects by ways
such as punching holes or by simply marking a certain area defected to fool players.
These method can be easily defeated because these defects can be easily reproduced
on new media. The disclosed method is harder to defeat because the defect cannot be
The method includes the following steps.
(1) At the time of formatting the disc, locate a small portion of the disc space that
contains natural defects, and format the rest space as usual. (2) At the time of recording, read the defects to obtain an encryption key by encoding
the "noisy" defects with a well known strong error correction code. (3) Encode the copy-righted material with the encryption key and record on the disc. (4) At the time of play back, the encryption key is reconstructed in the same way as
described in step (2). Use this key to decrypt the material.
If the encrypted contents is copied from one disc to another, the contents cannot be
decrypted at the time of play back because the original encryption key cannot be
reconstructed from the new disc.
The construction of the encryption key is only needed each time before play back, so
that a strong error correction code can be used to gua...