G11B20/00695

Information carrier comprising access information

An apparatus for reading out information from an information carrier includes a reading unit for reading out user information and access information from the information carrier. The user information are stored in a first region of the information carrier and the access information are stored in a second region of the information carrier. The apparatus further includes an access controller for providing access to the user information in dependence on the access information. The access information are stored in a first portion of the second region, and the dummy information are stored in a second portion of the second region according to a similar format as used for storing the access information.

Information processing device, information processing method, and program

An information processing device including: a data processing unit that generates an encryption key of content; and a communication unit that transmits an encryption key generated by the data processing unit, wherein the data processing unit generates, as the encryption key, individual keys that are different for each new content recording processing on a recording medium in a content recording device, and transmits the individual keys through the communication unit.

Methods, nodes and communication device for establishing a key related to at least two network instances

A method of establishing a key related to at least two network instances is disclosed performed in a network node. The network instances are used in serving a communication device. The method comprises obtaining a first key relating to at least a first network instance; obtaining a second key relating to an additional network instance; determining, based on the first key and the second key, a joint key for use in protecting communication with the communication device on the at least first network instance and on the additional network instance. A method in a communication device, network node, communication device, computer programs and computer program products are also disclosed.

METHODS, NODES AND COMMUNICATION DEVICE FOR ESTABLISHING A KEY RELATED TO AT LEAST TWO NETWORK INSTANCES

A method of establishing a key related to at least two network instances is disclosed performed in a network node. The network instances are used in serving a communication device. The method comprises obtaining a first key relating to at least a first network instance; obtaining a second key relating to an additional network instance; determining, based on the first key and the second key, a joint key for use in protecting communication with the communication device on the at least first network instance and on the additional network instance. A method in a communication device, network node, communication device, computer programs and computer program products are also disclosed.

Location-based regulation of access
09894078 · 2018-02-13 · ·

Generally, access to content may be regulated by receiving a content request initiated at a jukebox for access to a content selection, identifying a jukebox location corresponding to a location of the jukebox, determining a permissible location for rendering the content selection, relating the jukebox location to the permissible location, and enabling the content request when the permissible location supports access to the content selection from the jukebox location.

Anti-piracy feature for optical discs

Disclosed are techniques and systems for manufacturing an optical disc having a stochastic (i.e., non-deterministic) anti-piracy feature in the form of a multi-spiral structure, and for verifying the feature on the optical disc to authenticate the disc for playback. The multi-spiral structure may be comprised of multiple partially interleaved, and partially overlapping, spiral data tracks formed in a designated area of the optical disc. A process of forming the multi-spiral structure may include forming, in the designated area, a first spiral data track with first track pitch and a second spiral data track with second track pitch that is different than the first track pitch. The multi-spiral structure may be analyzed to determine verification parameters for verifying the multi-spiral structure, and those verification parameters may be encrypted so that they may be subsequently decrypted and used to verify the multi-spiral structure on a disc reading device.