Claims
- 1-28. (canceled)
- 29. A method of operating a computing platform comprising:
receiving secured data comprising an encrypted first portion of a data product and an unencrypted second portion of the data product, said unencrypted second portion being unusable by the computing platform without decrypting said encrypted first portion; decrypting said encrypted first portion with a decryption key; and executing a program on the computing platform to use the data product including both the first portion and the second portion for an intended purpose, wherein said program is not included with said data product.
- 30. The method of claim 29 wherein said first portion of the data product includes decompression parameters for the data product.
- 31. The method of claim 29 wherein said first portion of the data product comprises indices into data contained in the second portion of the data product.
- 32. The method of claim 29 wherein said first portion of the data product comprises global data pertaining to the data product as a whole.
- 33. The method of claim 29 wherein the data product further includes an encrypted authorization key and said method further comprising decrypting said encrypted authorization key to obtain verification information.
- 34. The method of claim 33 wherein said verification information comprises an ID code associated with the computing platform entitled to access the data product.
- 35. The method of claim 33 wherein said verification information comprises an ID code associated with a storage medium entitled to hold the data product.
- 36. The method of claim 33 wherein said verification information comprises an ID code associated with a user entitled to use the data product.
- 37. The method of claim 33 wherein said decrypting said authorization key provides said decryption key for decrypting said first portion of the geographic database.
- 38. A computing system comprising:
a processor; a data storage medium coupled to said processor, the data storage medium holding a set of data comprising an encrypted first portion of a data product and an unencrypted second portion of the data product, wherein the first portion comprises critical data that enables use of the data product; and a routine executable by the processor for decrypting the encrypted first portion of the data product, thereby enabling a program executable by said processor to use the data product including both the first portion and the second portion for an intended purpose, wherein said program is not included with said data product.
- 39. The system of claim 38 wherein said data product is a geographic database.
- 40. The method of claim 38 wherein said critical data includes decompression parameters for the data product.
- 41. The system of claim 38 wherein said set of data further including an encrypted authorization key.
- 42. The system of claim 41 further comprising a second routine executable by the processor for decrypting the encrypted authorization key to obtain verification information to validate use of the data product.
- 43. The system of claim 41 further comprising a second routine executable by the processor for decrypting the encrypted authorization key to obtain a decryption key for decrypting the first portion of the data product.
- 44. A data product stored on a medium comprising:
an encrypted first portion; and an unencrypted second portion, wherein said first portion comprises critical data that when decrypted enables a program executed on a computing platform to use the data product including both said first portion and said second portion for an intended purpose, said program is not included with said data product.
- 45. The data product of claim 44 wherein said data product comprises a geographic database.
- 46. The data product of claim 44 wherein said critical data comprises indices into data contained in said second portion.
- 47. The data product of claim 44 wherein said critical data comprises global data pertaining to said data product as a whole.
- 48. The data product of claim 44 wherein said encrypted first portion includes an authorization key.
INCORPORATION BY REFERENCE
[0001] This specification is filed contemporaneously with two other U.S. patent applications, entitled respectively “Method and System for Mass Distribution of Geographic Data for Navigation Systems” and “Encryption Method for Distribution of Data,” each by the same inventor as the present invention, and each assigned to the owner of the present invention. The entirety of each of these other applications is hereby incorporated by reference.
[0002] This specification is also related to the subject matter of U.S. Pat. No. 5,951,620 (the '620 patent), which is entitled “System and Method for Distributing Information for Storage Media,” and which issued on Sep. 14. 1999 to Navigation Technologies Corporation of Rosemont, Ill. The entirety of the '620 patent is also hereby incorporated by reference.
Continuations (1)
|
Number |
Date |
Country |
Parent |
09663893 |
Sep 2000 |
US |
Child |
10823132 |
Apr 2004 |
US |