会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • OPTICAL DISC
    • 光盘
    • US20070183299A1
    • 2007-08-09
    • US11623967
    • 2007-01-17
    • Markus SpitzlingerWalter HinterhoelzlThomas GoeblMarkus PrennKlaus HolzapfelAndreas Winter
    • Markus SpitzlingerWalter HinterhoelzlThomas GoeblMarkus PrennKlaus HolzapfelAndreas Winter
    • G11B7/24
    • G11B20/00934G11B20/00086G11B20/0063G11B20/00644
    • An optical disc (11 to 18) having sectors (3) each having a sector ID further comprises: a first area (4) having a first set of sectors (313-315) sequentially arranged on the disc (11 to 18) according to their respective IDs, a second area (5) having a second set of sectors (316-318) sequentially arranged on the disc (11 to 18) according to their respective IDs, the second area (5) being located after the first area (4) in respect of a disc scan direction (B) and having at least one sector ID which duplicates that of a sector in the first set of sectors, a start sector (33) located before the first area (4), and navigation data indicating to an optical disc reader, after having read the start sector (33), to displace its pickup reader device to a first target sector (316, 317, 352) having a sector ID of one of the sectors of the second area (5) or of a sector located after the second area (5), wherein the number of sectors between the start sector (33) and the first target sector is chosen such that the optical disc reader jumps from the start sector (33) to the first target sector using a cross track mode.
    • 具有扇区(3)的具有扇区ID的光盘(1 1至1 8 8)还包括:第一区域(4),具有第一组扇区( 根据它们各自的顺序地布置在盘(1 SUB 1至1×8)上的3个13-13 - 15 15) ID,第二区域(5),其具有顺序地布置在盘(1)上的第二组扇区(3×16×3×18) 根据它们各自的ID,到第一区域(5),第二区域(5)相对于盘扫描方向(B)位于第一区域(4)之后,并且具有至少一个扇区ID, 与第一区域(4)之间的开始扇区(3 <3> SUB)之间的第一组扇区的扇区重复,以及在读取开始之后向光盘读取器指示的导航数据 将其拾取读取器装置移位到第一目标扇区(3×16,3×17,3,52) ) 设置第二区域(5)的扇区之一或位于第二区域(5)之后的扇区中的扇区ID,其中开始扇区(3> 3 )和 选择第一目标扇区使得光盘读取器使用交叉轨道模式从起始扇区(3 <3>>)跳转到第一目标扇区。
    • 4. 发明申请
    • Method for converting non copy protected data into copy protected data
    • 将非拷贝保护的数据转换为拷贝保护的数据的方法
    • US20060291651A1
    • 2006-12-28
    • US11438312
    • 2006-05-23
    • Klaus HolzapfelWalter HinterhoelzlThomas GoeblMarkus PrennRupert Schoenauer
    • Klaus HolzapfelWalter HinterhoelzlThomas GoeblMarkus PrennRupert Schoenauer
    • H04N7/167
    • G11B20/00818G11B20/00086G11B20/00449G11B20/00579G11B20/00768G11B20/00826G11B20/00927G11B20/00949G11B27/00G11B2220/2562H03M7/30
    • The invention relates to a method for effectively converting non copy protected data (1) into copy protected data (5). The non copy protected data (1) comprises data structure data, controlling data and content data. The content data are embedded into data structures defined by the data structure data, and are processible by using the controlling data. The method comprises the following steps: transferring at least parts (9) of said data structure data and/or said controlling data via a first communication network (3), from a first network location (2) to a second network location (4), generating modified data structure data and/or modified controlling data at said second network location (4) in dependence of said data structure data/controlling data supplied to said second network location (4), transferring said modified data structure data and/or modified controlling data via a second communication network (6) from said second network location (4) to a third network location (2), generating, at said third network location (2), said copy protected data by embedding said content data into modified data structures being implied by said modified data structure data and/or by replacing said controlling data by said modified controlling data.
    • 本发明涉及一种有效地将非复制保护数据(1)转换为复制保护数据(5)的方法。 非复制保护数据(1)包括数据结构数据,控制数据和内容数据。 内容数据被嵌入到由数据结构数据定义的数据结构中,并且可以通过使用控制数据来处理。 该方法包括以下步骤:从第一网络位置(2)到第二网络位置(4),经由第一通信网络(3)至少传送所述数据结构数据和/或所述控制数据的至少一部分(9) 根据提供给所述第二网络位置(4)的所述数据结构数据/控制数据在所述第二网络位置(4)生成修改的数据结构数据和/或修改的控制数据,传送所述修改的数据结构数据和/或修改 通过第二通信网络(6)将数据从所述第二网络位置(4)控制到第三网络位置(2),在所述第三网络位置(2)通过将所述内容数据嵌入到修改数据中来产生所述复制保护数据 由所述修改的数据结构数据暗示结构和/或通过所述修改的控制数据替换所述控制数据。