Claims
- 1. A method for providing security for stored data on a compact disk read-only memory (CD-ROM), comprising steps of:
- (a) providing the stored data in an encrypted form in formatted sectors of a recording region on the CD-ROM, decrypting of the encrypted data requiring a keyword; and
- (b) programming the keyword into a programming region on the CD-ROM by damaging the physical structure of the recording track in selected sectors in the programming region, the selected sectors spanning a region of the CD-ROM having a digital storage capacity of up to 500 megabytes.
- 2. The method of claim 1 wherein step (b) is performed by mounting the CD-ROM in a drive configured for rotating the CD-ROM, focusing a laser beam to converge on the physical features of the recording track, and controlling the laser beam to do the damaging.
- 3. The method of claim 1 further comprising a step of transporting the CD-ROMS with the encrypted data to point-of-sale retail outlets remote from a manufacturing and copying facility prior to the programming step.
- 4. The method of claim 1 wherein the recorded information comprises plural computer files, each encrypted in a fashion to require a unique digital keyword, and wherein each file is associated with a unique keyword programmed in the programming region.
- 5. The method of claim 4 wherein the plural computer files are executable code files, and the programming step comprises programming digital keywords for selectively activating individual ones of the executable code files for use by a host computer.
- 6. A method for providing access control to only selected files of multiple files stored on a compact disk read-only memory (CD-ROM), comprising steps of:
- (a) recording the files in an encrypted form in formatted sectors of a recording region on the CD-ROM; and
- (b) programming digital keywords for decrypting only the selected files into a programming region of the CD-ROM by damaging the physical structure of the recording track in selected sectors in the programming region, the selected sectors spanning a region of the CD-ROM having a digital storage capacity of up to 500 megabytes.
- 7. The method of claim 6 wherein the multiple files are application program files.
- 8. The method of claim 1 wherein, in the programming step, an executable computer program file is programmed into the programming region rather than a digital keyword, the sequence of physically damaged and undamaged sectors forming executable digital code.
- 9. An encrypted compact disk read-only memory (CD-ROM), comprising:
- a recording region wherein information is recorded in an encrypted fashion responsive to a decryption algorithm based on a unique keyword; and
- a programming region having formatted sectors along a data track wherein one or more decryption keywords are programmed by damaging the data track in selected sectors;
- wherein the damaged sectors forming a keyword span a region of the CD-ROM having a digital storage capacity of up to 500 megabytes.
- 10. The method of claim 1 wherein the keyword is formed non-sequentially by damaged sectors scattered over the programming region.
- 11. The method of claim 6 wherein the keyword is formed non-sequentially by damaged sectors scattered over the programming region.
- 12. A CD-ROM as in claim 9 wherein the keyword is formed non-sequentially by damaged sectors scattered over the programming region.
CROSS REFERENCE TO RELATED APPLICATIONS
This is a continuation of U.S. patent application Ser. No. 08/097,767 filed Jul. 26, 1993, now abandoned.
US Referenced Citations (5)
Number |
Name |
Date |
Kind |
4577289 |
Comerford et al. |
Mar 1986 |
|
4584641 |
Guglielmino |
Apr 1986 |
|
4644493 |
Chandra et al. |
Feb 1987 |
|
4695993 |
Takagi et al. |
Sep 1987 |
|
5027396 |
Platteter et al. |
Jun 1991 |
|
Foreign Referenced Citations (1)
Number |
Date |
Country |
8802202 |
Mar 1988 |
WOX |
Continuations (1)
|
Number |
Date |
Country |
Parent |
97767 |
Jul 1993 |
|