Patent classifications
G11B20/0013
Information carrier comprising access information
An apparatus for reading out information from an information carrier includes a reading unit for reading out user information and access information from the information carrier. The user information are stored in a first region of the information carrier and the access information are stored in a second region of the information carrier. The apparatus further includes an access controller for providing access to the user information in dependence on the access information. The access information are stored in a first portion of the second region, and the dummy information are stored in a second portion of the second region according to a similar format as used for storing the access information.
Apparatus and method for recording and erasing user data on a recordable optical disc
An information recording apparatus includes: a first memory which stores synchronization data for updating data on a recordable optical disc and/or adding data to the recordable optical disc; a second memory which stores erasure information indicating data to be erased; and a controller which controls addition, update, and erasure of data on the optical disc. The controller records the synchronization data onto the optical disc. After recording the synchronization data, the controller records, onto the optical disc, management information indicating the state of the optical disc on which the synchronization data has been recorded and the state of the optical disc resulting from erasure according to the erasure information. Subsequently, the controller closes the session. After closing the session, the controller physically erases the data to be erased which has been recorded on the optical disc.
INFORMATION RECORDING APPARATUS AND DATA ERASURE METHOD
An information recording apparatus includes: a first memory which stores synchronization data for updating data on a recordable optical disc and/or adding data to the recordable optical disc; a second memory which stores erasure information indicating data to be erased; and a controller which controls addition, update, and erasure of data on the optical disc. The controller records the synchronization data onto the optical disc. After recording the synchronization data, the controller records, onto the optical disc, management information indicating the state of the optical disc on which the synchronization data has been recorded and the state of the optical disc resulting from erasure according to the erasure information. Subsequently, the controller closes the session. After closing the session, the controller physically erases the data to be erased which has been recorded on the optical disc.
Secure direct memory access
Examples are disclosed for establishing a secure destination address range responsive to initiation of a direct memory access (DMA) operation. The examples also include allowing decrypted content obtained as encrypted content from a source memory to be placed at a destination memory based on whether destination memory addresses for the destination memory fall within the secure destination address range.
SECURE DIRECT MEMORY ACCESS
Examples are disclosed for establishing a secure destination address range responsive to initiation of a direct memory access (DMA) operation. The examples also include allowing decrypted content obtained as encrypted content from a source memory to be placed at a destination memory based on whether destination memory addresses for the destination memory fall within the secure destination address range.
Location-based regulation of access
Generally, access to content may be regulated by receiving a content request initiated at a jukebox for access to a content selection, identifying a jukebox location corresponding to a location of the jukebox, determining a permissible location for rendering the content selection, relating the jukebox location to the permissible location, and enabling the content request when the permissible location supports access to the content selection from the jukebox location.
Secure direct memory access
Examples are disclosed for establishing a secure destination address range responsive to initiation of a direct memory access (DMA) operation. The examples also include allowing decrypted content obtained as encrypted content from a source memory to be placed at a destination memory based on whether destination memory addresses for the destination memory fall within the secure destination address range.
SECURE DIRECT MEMORY ACCESS
Examples are disclosed for establishing a secure destination address range responsive to initiation of a direct memory access (DMA) operation. The examples also include allowing decrypted content obtained as encrypted content from a source memory to be placed at a destination memory based on whether destination memory addresses for the destination memory fall within the secure destination address range.