[go: up one dir, main page]

Lachniet, 2008 - Google Patents

8, Author retains full rights.

Lachniet, 2008

Document ID
7761424043059584201
Author
Lachniet M
Publication year

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00485Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
    • G11B20/00492Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
    • G11B20/00514Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein the entire content is encrypted with the same key, e.g. disc key or master key

Similar Documents

Publication Publication Date Title
Huber et al. Social snapshots: Digital forensics for online social networks
Quick et al. Cloud storage forensics
US9961030B2 (en) Method and system for sender-controlled messaging and content sharing
CN106302337B (en) Vulnerability detection method and device
US20200052983A1 (en) Data leakage protection in cloud applications
US8843637B2 (en) Managed peer-to-peer content backup service system and method using dynamic content dispersal to plural storage nodes
US20070139231A1 (en) Systems and methods for enterprise-wide data identification, sharing and management in a commercial context
Salamh et al. What’s on the horizon? An in-depth forensic analysis of Android and iOS applications
Shafqat Forensic investigation of user's web activity on Google Chrome using various forensic tools
US20210336796A1 (en) System and computer method including a blockchain-mediated agreement engine
Pandey et al. Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime
Mannan et al. Privacy-enhanced sharing of personal content on the web
Shaaban et al. Practical windows forensics
Teing et al. Private cloud storage forensics: Seafile as a case study
Easttom Digital forensics, investigation, and response
Van Dongen Forensic artefacts left by windows live messenger 8.0
Azhar et al. Forensic investigations of Google Meet and Microsoft Teams–two popular conferencing tools in the pandemic
Breitinger et al. A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage
Babbin Security log management: identifying patterns in the chaos
US20100250708A1 (en) Digital media referral and distribution
CN106295366B (en) Sensitive data identification method and device
Akinbi et al. Forensic analysis of open-source XMPP/Jabber multi-client instant messaging apps on Android smartphones
Lachniet A Forensic Primer for Usenet Evidence
Lachniet 8, Author retains full rights.
Schroader et al. Alternate Data Storage Forensics