Greetings all I am hoping that somebody will know a little bit more than me, I am selling a UMD in the marketplace of this type but I have a few of these UMD that will not run in retail psp at all. I do not have a test or tool unit to run them either. They are clear UMD but checking the rear ring data the serials are e.g UMDT-99xxx. I cannot dump them using pspfiler either although I guess I could try to use usb based dumper. Any ideas? Or maybe some experts who know a little bit more about them than me. Kind regards, will try to add pictures in the coming days. R
Here the pictures You'll notice the disc have holes pressed in the plastic casing, I rescued these from destruction but I can't run or dump them. Hope someone will know more than me Kind regards.
These are going to be review copies most likely. I have a QA unit that can run these. The innermost ring should have id info.
The data stored on UMD discs are encrypted and possibly the data on these review discs are encrypted with a key different from that on a retail disc (or even not encrypted at all) so that would be why you don't see any "reaction" on a retail PSP from those discs. It's about the same as putting a out of region UMD video disc on a PSP. It won't play simply because the PSP cannot decrypt the disc.
Thank you both for your replies. I found another one of these discs and the front of the UMD says. Electric Adjustment Disc. Same serial as the above discs UMDT-99813 I guess without trying them with a tool unit they're not going to be much use. Kev that's the serial on the rings btw.
That sounds like service center discs. If that's the case, they're used with the unit open and with a probe with pogo pins attached to it's main board. A computer controls what the drive is doing with the disc, not the PSP CPU. And that process generates data which is then stored on the "Lepton" (drive controller chip) flash for unique adjustment for that specific UMD mechanics. That's why PSPs have no visible pots or adjustment points on the motherboard... It's all done with software.
Wow. Thank you for the information. I wonder if we can dump the umds? I will try and get a photo up ASAP. I've got a lot of these kicking around as I was able to rescue some from China a few months ago. They're from a service centre or QA as I also received many games with fpqa Sony logos etc. Thank you for the information once more I greatly appreciate it, if assembler has a unit that could run them then we could really get some good research going. Everything you said makes sense, they just constantly say loading and don't get to the point of saying they cannot be read, the retail unit Just repeatedly tried to read the UMD.
Would be awesome to get more of those service discs. PS2 had adjustment discs and test discs (bootable discs which would run code on the PS2 unit and allow for actual hardware tests to be run on the unit). I would believe similar discs actually exist for PSP, PS Vita, PS1, PS2, PS3 and maybe even for the PS4.
That could be a factory disc. You said China? Then it's very possible that was actually used on a production line.
My assumption is all the UMD I had found were sent to china to disappear, if you know what I mean, because I had found American test samples,Spot kiosk discs, and euro pre production umds there in same source. I spoke to the seller who said he bought a container from Hong Kong, with no knowledge of the contents until arrival. I can only go from his words for now
Then it must be service center material. Wow SONY quality waste management. (put it under the rug) Some things never change... haha
Who knows the truth, I'm just happy to get my hands on them. I will get all the software for dumping following some browsing in the next few days see what I can do
You should be able to read those UMDs by reencrypting your idstorage to include these keys or passing them directly to Spock: int __sceFactoryGetUMDKey(unsigned int part1, unsigned int part2, u8* out) { u8* key = NULL; int ret = 0, x, i; u8 key_00001708[16] = { 0x05, 0x8F, 0xE5, 0x35, 0xA0, 0x4C, 0x89, 0xB1, 0xC0, 0x12, 0xAD, 0xE7, 0xDA, 0x06, 0xD9, 0x22 }; u8 key_000016D0[16] = { 0x80, 0x8C, 0x8D, 0xA8, 0x66, 0x65, 0x5C, 0x11, 0x35, 0x12, 0xA6, 0xBF, 0x96, 0x6D, 0x3C, 0x46 }; u8 key_00001698[16] = { 0x77, 0xA5, 0x97, 0xDE, 0x0A, 0xF3, 0xEF, 0x40, 0x06, 0x96, 0x00, 0x9C, 0x03, 0x3C, 0xE3, 0xAE }; u8 key_00001664[16] = { 0x9F, 0x26, 0xB3, 0x3D, 0x66, 0xAF, 0xFC, 0xF7, 0xC6, 0xC0, 0x1A, 0x35, 0xAB, 0x32, 0x24, 0x22 }; u8 key_00001614[16] = { 0xAA, 0x62, 0x42, 0x04, 0x9E, 0x40, 0xFB, 0xBF, 0x91, 0x16, 0xC3, 0x23, 0x6F, 0xEA, 0x17, 0xEF }; u8 key_00001598[16] = { 0x1A, 0x4A, 0xA0, 0x55, 0x30, 0x8D, 0x2B, 0xBC, 0x63, 0x2B, 0x54, 0x68, 0xBB, 0x3A, 0x9D, 0x5B }; u8 key_00001564[16] = { 0xF2, 0x2C, 0x77, 0xAA, 0x4B, 0x1C, 0x14, 0x01, 0x9D, 0xE5, 0x53, 0x23, 0xE3, 0x41, 0x3D, 0x21 }; u8 key_000014D0[16] = { 0x42, 0x01, 0x82, 0x19, 0x24, 0xFF, 0x0C, 0x34, 0xEB, 0xB4, 0x3F, 0x5D, 0xCA, 0x80, 0x7E, 0x8D }; u8 key_00001498[16] = { 0x40, 0x78, 0x66, 0xEB, 0x9B, 0xA5, 0xE9, 0x29, 0x0B, 0x2F, 0x8E, 0x4D, 0x30, 0x11, 0x67, 0x54 }; u8 key_00001460[16] = { 0x27, 0xC7, 0x59, 0xF1, 0x48, 0xD8, 0x7E, 0xA8, 0xC0, 0xC2, 0x7F, 0x01, 0x3A, 0xE6, 0xEC, 0xD6 }; u8 key_000013F0[16] = { 0x3A, 0xBA, 0x2E, 0x14, 0xC1, 0x07, 0x37, 0x9F, 0x5F, 0x03, 0x3F, 0x79, 0x4D, 0xE0, 0xCE, 0x7E }; u8 key_000013BC[16] = { 0x71, 0x16, 0x41, 0x21, 0xC3, 0xE0, 0x6A, 0xB5, 0x76, 0x57, 0x35, 0x90, 0xAB, 0x22, 0x3E, 0xFD }; }; You could also enable the UMD drive TEST mode and dump the discs' raw sectors and decrypting those with the above keys.