US20090172393A1 - Method And System For Transferring Data And Instructions Through A Host File System - Google Patents

Method And System For Transferring Data And Instructions Through A Host File System Download PDF

Info

Publication number
US20090172393A1
US20090172393A1 US11/967,622 US96762207A US2009172393A1 US 20090172393 A1 US20090172393 A1 US 20090172393A1 US 96762207 A US96762207 A US 96762207A US 2009172393 A1 US2009172393 A1 US 2009172393A1
Authority
US
United States
Prior art keywords
packet
data
file system
instruction
payload
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/967,622
Inventor
Haluk Kent Tanik
Robert Chin-Tse Chang
Po Yuan
Bahman Qawami
Farshid Sabet-Sharghi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SanDisk Technologies LLC
Original Assignee
SanDisk Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SanDisk Corp filed Critical SanDisk Corp
Priority to US11/967,622 priority Critical patent/US20090172393A1/en
Assigned to SANDISK CORPORATION reassignment SANDISK CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHANG, ROBERT CHIN-TSE, QAWAMI, BAHMAN, SABET-SHARGHI, FARSHID, TANIK, Haluk Kent, YUAN, PO
Publication of US20090172393A1 publication Critical patent/US20090172393A1/en
Assigned to SANDISK TECHNOLOGIES INC. reassignment SANDISK TECHNOLOGIES INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SANDISK CORPORATION
Priority to US14/459,964 priority patent/US9811678B2/en
Assigned to SANDISK TECHNOLOGIES LLC reassignment SANDISK TECHNOLOGIES LLC CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: SANDISK TECHNOLOGIES INC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Definitions

  • This application relates generally to the operation of non-volatile flash memory systems, and, more specifically, to a method and system for transferring data and instructions through a host file system.
  • Non-volatile memory products are many commercially successful non-volatile memory products being used today, particularly in the form of small form factor cards, which employ flash EEPROM (Electrically Erasable and Programmable Read Only Memory) cells formed on one or more integrated circuit devices.
  • Some of the commercially available card formats include CompactFlash (CF) cards, MultiMedia cards (MMC), Secure Digital (SD) cards, personnel tags (P-Tag), and Memory Stick cards.
  • Hosts include personal computers, notebook computers, personal digital assistants (PDAs), various data communication devices, digital cameras, cellular telephones, portable audio players, automobile sound systems, and similar types of equipment.
  • PDAs personal digital assistants
  • a removable card does not include a controller and the host controls operation of the memory in the card. Examples of this type of memory system include Smart Media cards and xD cards.
  • control of the memory may be achieved by software on a controller in the card or by control software in the host.
  • this type of memory can alternatively be embedded into various types of host systems.
  • host data may be stored in the memory according to a storage scheme implemented by memory control software.
  • the memory control software may interface with a host file system, which, in turn, may interface with a memory file manager which provides an application programming interface (API) to applications accessing the memory.
  • Host file systems may support a set of read and write commands to access storage systems connected to the host, may be optimized for the resource limitations or features of the host, and may include advanced features such as multi-thread support.
  • the feature set of a memory file manager communicating with the memory control software through a host file system may be limited by the command set, such as read and write commands, provided by the host file system interface.
  • a host file system may be supplemented with an additional, specialized file system, which may implement all of the required features specific to accessing the memory.
  • Implementing a specialized file system may require additional software code storage space, and a specialized file system may not leverage or implement all of the features of the host file system. Synchronization of file system information is also necessary when a host file system and specialized file system are operated in parallel with one another.
  • a method for encrypting data.
  • An encryption instruction is generated, where the encryption instruction indicates whether an encryption operation is to be executed.
  • the encryption instruction is combined with a payload of data to form a packet.
  • the packet is associated with a command to form a command set.
  • the command set is passed to a host file system process.
  • a second command set is received from the host file system process, where the second command set includes the packet associated with a second command.
  • the packet is extracted from the second command set.
  • the encryption instruction and the payload of data are extracted from the packet. At least the payload of data is encrypted based on the encryption instruction, where the encryption of at least the payload of data is independent of the host file system process.
  • a method for decrypting data there is a method for decrypting data.
  • a packet is received.
  • a decryption instruction is generated, where the decryption instruction indicates whether a decryption operation is to be executed.
  • At least a portion of the packet is decrypted using at least the decryption instruction to form a decrypted packet.
  • a second packet is formed comprising the decrypted packet.
  • the second packet is passed to a host file system process.
  • a third packet is received from the host file system process, where the third packet includes the decrypted packet.
  • the decrypted packet is extracted from the third packet.
  • the payload of data is extracted from the decrypted packet.
  • a write command and a payload of data are received from a host program.
  • An encryption instruction is formed based on a determination of whether the payload of data should be encrypted.
  • a data verification field is determined using at least the payload of data.
  • the encryption instruction, the data verification field, and the payload of data are combined to form a packet.
  • a file system level write command is generated based on the write command.
  • the packet is associated with the file system level write command to form a file system level write command set.
  • the file system level write command set is passed to a host file system process.
  • An address-level write command set is received from the host file system process, where the address-level write command set is derived from the file system level write command set and includes the packet associated with an address level command.
  • the packet is extracted from the address-level write command set.
  • the encryption instruction, the data verification field, and the payload of data are extracted from the packet.
  • the payload of data is verified using at least the data verification field.
  • At least the payload of data is encrypted based on the encryption instruction, where the encryption of at least the payload of data is independent of the host file system process.
  • a device level write command is generated based on the address level command. At least the encrypted payload of data is associated with a device level write command to form a device level write command set.
  • a decryption instruction is formed based on determining whether the packet should be decrypted. At least a portion of the packet is decrypted using the decryption instruction, to form a decrypted packet.
  • An address-level read result is formed, containing at least a portion of the decrypted packet.
  • An address-level read result is passed to a host file system process.
  • a file system level read result is received from the host file system process, where the file system level read result is derived from the address-level read result. The payload of data is extracted from the file system level read result.
  • FIG. 1 is a diagram illustrating a system for encrypting and decrypting data using commands and data passed through a file system.
  • FIG. 2 shows exemplary steps for encrypting data using commands and data passed through a file system as separate parameters.
  • FIG. 3 is a diagram illustrating a system for passing data payload, data tags, and encryption instructions through a file system as separate parameters.
  • FIG. 4 shows exemplary steps for decrypting data using commands and data passed through a file system as separate parameters.
  • FIG. 5 is a diagram illustrating a system for passing data payload, data tags, decryption status, and decryption instructions through a file system as separate parameters.
  • FIG. 6 is a diagram illustrating packetization of a data payload, data tags, and an instruction in accordance with an embodiment.
  • FIG. 7 is a diagram illustrating a system for passing a packetized data payload, data tags, and encryption instruction through a host file system in accordance with an embodiment.
  • FIG. 8 is a diagram illustrating a system for passing a packetized data payload, data tags, and decryption status through a host file system, and determining a decryption instruction, in accordance with an embodiment.
  • FIG. 9 shows exemplary steps for encrypting data using commands and data passed through a host file system, in accordance with an embodiment.
  • FIG. 10 shows exemplary steps for decrypting data and passing status through a host file system, in accordance with an embodiment.
  • DRM Digital Rights Management
  • These rules may require that some data stored in a storage system, such as a non-volatile memory card, must be in an encrypted format.
  • the DRM rules may also require that the data transmitted between the exemplary system and the storage system is in an encrypted format.
  • These rules may also specify regions of the storage system where data stored must be in an encrypted format. In one example, the regions may be defined by address ranges within a non-volatile memory.
  • an exemplary system may support additional functionality, such as encryption of data before storage and decryption of data after retrieval from the storage system.
  • a system for encrypting data written to and decrypting data read from a storage system may appear in a variety of hosts, including personal computers, notebook computers, personal digital assistants (PDAs), various data communication devices, digital cameras, cellular telephones, portable audio players, automobile sound systems, and similar types of equipment.
  • PDAs personal digital assistants
  • various data communication devices including personal computers, notebook computers, personal digital assistants (PDAs), various data communication devices, digital cameras, cellular telephones, portable audio players, automobile sound systems, and similar types of equipment.
  • FIG. 1 is a diagram illustrating a system for encrypting and decrypting data using commands and data passed through a file system.
  • a system 100 for encrypting and decrypting data written to and read from a storage system may be implemented in hardware, software, or firmware, or any combination of hardware, software or firmware.
  • the exemplary system 100 may communicate with application processes that send requests to encrypt and store data, or send requests to retrieve and decrypt data.
  • the application process may be within the same host as the system 100 , or may be remote processes that send requests over a network or other suitable communication links.
  • the system 100 may communicate with a storage system, such as a non-volatile memory, non-volatile memory card, volatile memory, disk drive, or any other local or remote storage device capable of storing data. If the storage system is remote, data to be stored and retrieved may be transmitted and received over a network or other suitable communication links.
  • a storage system such as a non-volatile memory, non-volatile memory card, volatile memory, disk drive, or any other local or remote storage device capable of storing data. If the storage system is remote, data to be stored and retrieved may be transmitted and received over a network or other suitable communication links.
  • the system 100 includes a memory file manager 102 , file system 104 , and a memory device interface 110 .
  • Each component of the system 100 may be implemented in hardware, software, or firmware, or any combination of hardware, software or firmware.
  • the file system 104 may be implemented as a combination of hardware, software, or firmware, or any combination of hardware, software or firmware.
  • the file system 104 may also be referred to as a file system process.
  • the memory device interface 110 includes a memory control interface 112 , an encryption/decryption engine 114 , and a memory interface driver 116 .
  • the memory file manager may receive requests from application processes to write data to and read data from a storage system such as a non-volatile memory in communication with a memory interface driver 116 .
  • Some of the requests from application processes may require that the encryption/decryption engine 114 encrypt data before it is written to a storage system by the memory interface driver 116 , or decrypt data after it is read from a storage system by the memory interface driver 116 .
  • the Digital Rights Management (DRM) rules may be different for each write and read request, so the memory file manager 102 may be required to dynamically configure the encryption/decryption engine 114 for each write and read request or may be required to receive status results from the encryption/decryption engine 114 .
  • the configuration of encryption/decryption engine 114 may require instructions and control parameters such as keys or key index values.
  • One such configuration may also include not encrypting a file before storage, or not decrypting that was stored in an unencrypted format. Further, some write and read requests to a storage system may be for the purpose of configuring or reading status from the storage system itself.
  • a system may need to write to a storage system to update the File Allocation Table (FAT), or read the file allocation table from memory.
  • FAT File Allocation Table
  • the data written to the storage system may not be encrypted before storage. Therefore, there is a need to be able to control the encryption/decryption engine 114 for each access to the storage system.
  • the file system 104 provides a communication link between the memory file manager 102 and the memory device interface 110 .
  • the communication link provided by a file system 104 may not be capable of passing commands suitable for configuring the encryption/decryption engine 114 .
  • a file system may provide an API that programs may use to access a storage system such as a non-volatile memory, volatile memory, disk drive, or any other local or remote storage device capable of storing data.
  • the API of a file system is evaluated in order to determine if encryption/decryption instructions and status can be passed as separate parameters within one or more functions of the file system API.
  • Win32 File I/O API One example of a file system API is the Win32 File I/O API, provided by Microsoft Corporation.
  • the Win32 API supports read and write functions for reading and writing a file on a storage system, with the following function prototypes:
  • BOOL WriteFile HANDLE hFile, LPCVOID IpBuffer, DWORD nNumberOfBytesToWrite, LPDWORD IpNumberOfBytesWritten, LPOVERLAPPED IpOverlapped
  • the ReadFile function parameters hFile, IpBuffer, nNumberOfBytesToRead, and IpOverlapped specify the file to read, the buffer to copy the file data to, the number of bytes to read, and the I/O mode to use, respectively.
  • the ReadFile function may return a boolean success flag, and parameter IpNumberOfBytesRead that indicates the number of bytes actually read.
  • the WriteFile function parameters hFile, IpBuffer, nNumberOfBytesToWrite, and IpOverlapped specify the file to write, the buffer to copy the file data from, the number of bytes to write, and the I/O mode to use, respectively.
  • the WriteFile function may return a boolean success flag, and parameter IpNumberOfBytesWritten that indicates the number of bytes actually written.
  • the Windows file system may translate the function call into low-level read and write function calls, such as read and write accesses to a logical block address or address range of a storage device.
  • the file system may then make calls to functions in the memory control software of a storage system device driver in order to complete the request.
  • a system 100 may process application requests to encrypt and write data to a storage system, and read and decrypt data from a storage system.
  • the memory file manager 102 may receive an application request to store a file on a storage system in communication with the memory interface driver 116 .
  • the application request may also contain an instruction to encrypt the file before storage, or the memory file manager 102 may determine that the file should be encrypted.
  • the memory file manager may call a function supported by the API of the file system 104 to encrypt and store the file.
  • the parameters passed to the function of file system 104 may include the file to encrypt and store, and an encryption instruction.
  • the file system 104 may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses in the non-volatile memory, and may, in response to receiving a command from the memory file manager 102 , generate a plurality of logical block address commands to transmit to the memory control interface 112 .
  • the commands may include encryption instructions.
  • the commands may be passed as function calls to the API of the memory control interface 112 , where an encryption instruction may be passed as a separate parameter of the function.
  • the LBA-level commands, encryption instructions, and associated data are received by the memory control interface 112 . If the command is an encrypted write command, the memory control interface 112 may pass the data and an encryption instruction to the encryption/decryption engine 114 for encryption.
  • the encrypted data is then written to the storage system by the memory interface driver 116 .
  • the memory file manager 102 may receive an application request to read a file on a storage system in communication with the memory interface driver 116 .
  • the application request may also contain an instruction to decrypt the file after reading it from the storage system, or the memory file manager 102 may determine that the file should be decrypted before it is returned to the application.
  • the memory file manager may call a function supported by the API of the file system 104 to decrypt and store the file.
  • the parameters passed to the function of file system 104 may include the file to read and decrypt, and a decryption instruction.
  • the file system 104 may perform file-level to logical block address (LBA) conversion, where the stored location of a file is expressed as a plurality of logical block addresses or address ranges.
  • LBA logical block address
  • the commands may include decryption instructions.
  • the commands may be passed as function calls to the API of the memory control interface 112 , where a decryption instruction may be passed as a separate parameter of the function.
  • the LBA-level commands, decryption instructions, and associated data are received by the memory control interface 112 . If the command is a decrypted read command, the memory control interface 112 may command the memory interface driver 116 to read data from the non-volatile memory, and the memory control interface 112 may direct the encryption/decryption engine 114 to decrypt the data returned from the non-volatile memory to the memory interface driver 116 .
  • the memory control interface 112 may receive the decrypted data from the encryption/decryption engine 114 , and may pass the decrypted data to the file system 104 , which then passes the data (such as complete files read from a non-volatile memory) to the memory file manager 102 . Status reported from the encryption/decryption engine 114 may be returned to the memory file manager 102 in the same way, as a separate parameter that is passed through the file system 104 .
  • the aforementioned method may utilize a file system, or modify or create a file system, with an API capable of passing this information as separate parameters.
  • a file system with an API that does not support passing encryption/decryption instructions and status as separate parameters such as the Win32 File I/O system, may be unsuitable for implementing a file system 104 in the system 100 .
  • FIG. 2 shows exemplary steps 200 for encrypting data using commands and data passed through a file system as separate parameters.
  • the exemplary steps may be utilized by a system 100 in FIG. 1 , if the file system 104 utilizes the method of passing an encryption instruction as a separate parameter from the memory file manager 102 to the memory control interface 112 .
  • an encryption instruction is generated.
  • the memory file manager 102 may receive a request from an application to encrypt and write a file to non-volatile memory.
  • the request may include other parameters, such as digital rights management (DRM) information specified by the application, which may, for example, define the encryption key and encryption algorithm that the encryption/decryption engine 114 will use.
  • DRM digital rights management
  • the memory file manager may also receive a request from an application to write a file to non-volatile memory without any encryption, in which case the encryption instruction formed will be a no-operation (NOOP), and the encryption/decryption engine 114 will simply pass through the data from the memory control interface 112 to the memory interface driver 116 .
  • NOOP no-operation
  • the memory file manager passes an instruction such as an “encrypted write” instruction, which may include encryption parameters, and the file to be encrypted and stored, to the file system.
  • the file system supports encryption and decryption instructions not usually supported by an exemplary host file system.
  • the file system may receive an instruction and associated file in step 204 , and may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses.
  • LBA logical block address
  • the file system may also generate a plurality of logical block address encrypted write instructions, where an instruction is associated with a data payload that is at least a portion of the file data to be written.
  • Control passes to step 208 , where the plurality of logical block address encrypted write instruction and data payload pairs are received.
  • step 210 for each received pair, the data payload is encrypted (or passed through) according to the received logical block address encrypted write instruction.
  • Control then passes to step 212 , where the processed data payload is written to the non-volatile memory according to the logical block address encrypted write instruction.
  • FIG. 3 is a diagram illustrating a system for passing data payload, data tags, and encryption instruction through a file system as separate parameters.
  • a system 310 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1 .
  • the file system 314 of the system 310 may be utilized as the file system 104 of system 100 in FIG. 1 , where the file system 104 utilizes the method of passing encryption/decryption instructions and status as separate parameters from the memory file manager 102 to the memory control interface 112 .
  • the system 310 utilizing a file system 314 may support an encrypted file write function 312 to encrypt and write a file to a storage system.
  • the function prototype of the encrypted file write function 312 includes separate fbuf and instruction parameters, to accommodate passing a data payload and encryption instruction to the memory control software of a storage system device driver.
  • the size of the data payload may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes.
  • the filehandle parameter indicates the file to which data is being written to.
  • the fbuf parameter accepts the file data to write, or a pointer to the file data to write.
  • An application may call the encrypted file write function 312 of the file system 314 to encrypt and write a file to a storage system.
  • the file system 314 will process the request, and may translate the file-level write request into a plurality of function calls to an encrypted sector write function 316 supported by the memory control software of a storage system device driver.
  • the function prototype of the encrypted sector write function 316 includes separate instruction and sbuf parameters, to accommodate passing the encryption instruction and at least a portion of the data payload to the memory control software of a storage system device driver.
  • the num parameter may indicate the number of bytes to write, and the lbaddr parameter indicates the logical block address where the first byte may be written to.
  • the sbuf parameter accepts the sector data to write, or a pointer to the sector data to write.
  • the API of the file system 314 accepts the encryption instruction as a parameter of one or more functions.
  • FIG. 4 shows exemplary steps 400 for decrypting data using commands and data passed through a file system as separate parameters.
  • the exemplary steps may be utilized by a system 100 in FIG. 1 , if the file system 104 utilizes the method of passing a decryption instruction as a separate parameter from the memory file manager 102 to the memory control interface 112 .
  • a packet may be received from the non-volatile memory, such as a removable memory card, through the memory interface driver 116 of FIG. 1 .
  • the packet may be received in response to a file level decrypted read command transmitted from the memory file manager 102 to the file system 104 , and received as a logical block address decrypted read command from the file system 104 .
  • a decryption instruction is generated.
  • the instruction may be based on a command received through the file system 104 , or other configuration parameters passed to encryption/decryption engine 114 .
  • the decryption instruction may be to pass through the received packet (a no-operation (NOOP)), without decrypting it.
  • NOOP no-operation
  • Control passes to step 406 , where at least a portion of the received packet is decrypted (or passed through) according to the decryption instruction.
  • at least a portion of the processed packet may be combined with other data such as status information or result flags to form a second packet.
  • the second packet is passed to the file system as the data argument of the response to a logical block address decrypted read command from the file system 104 .
  • the file system performs logical block address (LBA) to file-level conversion, where logical block address decrypted read results are associated with a result of a file-level decrypted read command.
  • LBA logical block address
  • the memory file manager receives the result of the file-level decrypted read command from the file system 104 , and may extract the decrypted file data payload from the data argument of the returned result.
  • FIG. 5 is a diagram illustrating a system for passing data payload, data tags, decryption status, and decryption instruction through a file system as separate parameters.
  • a system 550 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1 .
  • the file system 314 of the system 550 may be utilized as the file system 104 of system 100 in FIG. 1 , where the file system 104 utilizes the method of passing encryption/decryption instructions and status as separate parameters from the memory file manager 102 to the memory control interface 112 .
  • the system 550 utilizing a file system 314 may support a decrypted file read function 552 to read data from an encrypted file from a storage system, and decrypt the file data.
  • the function prototype of the decrypted file read function 552 includes separate buf, status, and instruction parameters, to accommodate receiving a data payload and decryption status from, and passing an instruction to, the memory control software of a storage system device driver.
  • the amount of data to read may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes.
  • the filehandle parameter indicates the file to which data is being read from.
  • An application may call the decrypted file read function 552 of the file system 314 to read a file to a storage system and decrypt the file.
  • the file system 314 will process the request, and may translate the file-level read request into a plurality of function calls to a decrypted sector read function 556 supported by the memory control software of a storage system device driver.
  • the function prototype of the decrypted sector read function 556 includes separate instruction, sbuf, and status parameters, to accommodate passing the decryption instruction to the memory control software of a storage system device driver, and receiving at least a portion of the data payload and decryption status as a returned result.
  • the num parameter may indicate the number of bytes to read, and the lbaddr parameter indicates the logical block address where the first byte may be read from.
  • the API of the file system 314 accommodates the decryption instruction and decryption status as separate parameters of one or more functions.
  • FIGS. 2-5 illustrate a method for passing encryption/decryption instructions and status through a file system 104 between the memory file manager 102 and the memory device interface 110 .
  • a communication link is established that allows an encryption/decryption engine to be configured and monitored by a memory file manager 102 .
  • the API of the file system 104 and the underlying software or hardware combination utilized to implement the file system 104 may need to be modified.
  • a file system 104 incapable of passing encryption commands and decryption status as separate parameters may still provide a communication link of encryption commands and decryption status between the memory file manager 102 and the memory device interface 110 in an architecture shown in the system 100 .
  • data to be encrypted may be combined with encryption commands, and passed in the data parameters of the functions supported by the file system API.
  • data read from a storage system and decrypted may be combined with decryption status, and passed in the data parameters of the read functions supported by the file system API. Because the API of many file systems support the passing of data as parameters through the file system, this approach may be utilized with file systems incapable of passing encryption/decryption instructions and status as separate parameters, such as some host file systems.
  • the combination of read or write data sometimes referred to as data payloads, with commands or status information, may be referred to as packetization.
  • FIG. 6 is a diagram illustrating packetization of a data payload, data tags, and an instruction in accordance with an embodiment.
  • a host file system command/data set 610 includes a command 612 and the data 614 .
  • the command/data set 610 may be suitable for passing through a host file system utilizing a function in the API of the host file system, such as a write file command which accepts a data argument.
  • the data argument 614 includes a plurality of packets 600 .
  • a data payload 606 might typically be passed as the data argument 614 , here, a data payload 606 , a plurality of instructions 604 , and a plurality of data tags 602 , 608 may be combined, in a processes sometimes referred to as packetization, to create a packet 600 .
  • the instruction may be an encryption instruction or a decryption instruction, or an instruction to otherwise set up, control, or receive status information from an encryption or decryption engine.
  • the data payload 606 may be the data to encrypt, or may be other data associated with instruction 604 .
  • the packet 600 may be associated with a host file system command 612 as part of a command/data set 610 , and the command/data set 610 may be passed to the host file system as command and data arguments of a supported function of the host file system. In this way, a host file system may treat packet 600 as if it contained at least a portion of the data associated with command 612 . Stated another way, the instruction 604 may be passed through the host file system as part of the data argument 612 of a host file system command/data set 610 .
  • a host file system may extract the command 612 from command/data set 610 , and associate new commands with one or more packets 600 of the data 614 .
  • the receiver such as the memory control interface 112 of the memory device interface 110 of FIG. 1 , may be adapted to process packets 600 with an embedded instruction 604 , or packets 600 without an embedded instruction 604 .
  • the host file system may still pass data 614 without embedded instructions, and therefore, a receiver may need to be able to determine if the received data is in the format of a packet 600 with embedded instructions 604 .
  • data tags 602 and 608 may be used to identify or verify a packet 600 as containing an instruction 604 and a data payload 606 .
  • a first data tag 602 within a packet 600 points to the location of a second data tag 608 within the packet 600
  • the second data tag 608 points to the location of the first data tag 602 . If the data tags 602 , 608 do not point to the expected locations within the packet 600 , then the packet 600 may not contain the instruction 604 and the data payload 606 , and may be processed accordingly.
  • Other indicators within the packet 600 may be used to distinguish between received packets 600 that contain an instruction 604 and a data payload 606 from packets that contain only data.
  • a checksum or cyclic redundancy check (CRC) value could be computed using the instruction 604 and the data payload 606 , and stored along with the instruction 604 and data payload 606 within the packet 600 .
  • the checksum or CRC value could be extracted from its expected location in the packet 600 , and compared with the calculated checksum or CRC using instruction 604 and payload data 606 extracted from the packet 600 . If the calculated CRC or checksum value matches the extracted CRC checksum value, then the packet 600 contains an instruction and payload data. If not, packet 600 may be processed as the data associated with a received command.
  • FIG. 6 demonstrates how packetization may combine an instruction 604 , with a data payload 606 and data tags 602 , 608 , in a packet 600 , other combinations are possible.
  • the data payload 606 typically associated with a command 612 may be combined with status, results, or other data to be passed through a host file system.
  • encryption or decryption status may be combined with a data payload to form a packet, and this packet could be passed through the parameters of a function supported by the API of a file system.
  • FIG. 7 is a diagram illustrating a system for passing a packetized data payload, data tags, and encryption instruction through a host file system in accordance with an embodiment.
  • a system 730 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1 .
  • the file system 734 of the system 730 may be utilized as the file system 104 of system 100 in FIG. 1 , where the file system 104 utilizes the embodiment of packetizing the encryption/decryption instructions and status with the data payloads, and passing the packets as the data parameters of the file system API functions, between the memory file manager 102 to the memory control interface 112 .
  • the system 730 utilizing a host file system 734 may support passing encryption instructions from an application to the memory control software of a storage system device driver.
  • the host file system 734 may also be referred to as the host file system process.
  • the host file system 734 may support a file write function 732 that includes an fbuf parameter in the function prototype. Typically, the fbuf parameter accepts the file data to write, or a pointer to the file data to write.
  • a process calling the file write function 732 may packetize the data payload, encryption instruction, and data tags as shown in the packet 600 of FIG. 6 , and may pass a plurality of packets 614 or a pointer to the plurality of packets 614 as the fbuf argument in a function call to the file write function 732 .
  • the total amount of data payload bytes passed in the fbuf argument may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes.
  • the filehandle parameter indicates the file to which data is being written to.
  • the host file system 734 will process the request, and may translate the file-level write request into a plurality of function calls to a sector write function 736 supported by the memory control software of a storage system device driver.
  • the function prototype of the sector write function 736 includes an sbuf parameter, to accommodate passing the data to write to a storage system.
  • the num parameter may indicate the number of bytes to write, and the lbaddr parameter indicates the logical block address where the first byte may be written to.
  • the sbuf parameter accepts the sector data to write, or a pointer to the sector data to write.
  • the sector write function 736 of the memory control software of a storage system device driver may be adapted to extract the instruction and data payload from the sbuf argument passed as part of the function call to the sector write function 736 . Therefore, the system 730 may not require a file system with an API capable of accepting the encryption instruction as a parameter of one or more functions.
  • the host file system 734 may be utilized as the file system 104 in the system 100 , because the host file system 734 may pass encryption instructions suitable to allow memory file manager 102 to configure the encryption/decryption engine 114 .
  • the memory file manager 102 may be adapted to packetize data payloads and encryption instructions into packets, and pass packets as data arguments to the write functions 732 supported by the API of the host file system 734 .
  • the memory control interface 112 may be adapted to extract data payloads and encryption instructions from the data arguments of received function calls from the host file system 734 .
  • the system 730 may also pass data tags through the host file system 734 , which may allow the sbuf argument of a call to the sector write function 736 to be identified as containing part or all of an encryption instruction and data payload.
  • the IpBuffer parameter of the WriteFile function may be used to pass encryption instructions and data payloads through a Windows host file system. Therefore, a host file system such as the Win32 file system may be utilized as the file system 104 in the system 100 that supports file encrypt and write operations. Further, any host file system capable of passing a data structure between a function in its API, and the memory control software of a storage system device driver, may be utilized as the file system 104 in accordance with an embodiment.
  • FIG. 8 is a diagram illustrating a system for passing a packetized data payload, data tags, and decryption status through a host file system, and determining a decryption instruction, in accordance with an embodiment.
  • a system 870 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1 .
  • the file system 734 of the system 870 may be utilized as the file system 104 of system 100 in FIG. 1 , where the file system 104 utilizes one embodiment of packetizing the encryption/decryption instructions and status with the data payloads, and passing the packets as the data parameters of the file system API functions, between the memory file manager 102 to the memory control interface 112 .
  • the system 870 utilizing a host file system 734 may support passing decryption status to an application from the memory control software of a storage system device driver. As explained further below, the system 870 may not have to support passing the decryption instruction through a host file system 734 .
  • the host file system may support a file read function 872 that includes a buf parameter in the function prototype.
  • the buf parameter may be a storage array or a pointer to a storage array for the file read result.
  • the file read function 872 may be called in order to read file data from a storage system.
  • the file data may be encrypted.
  • the total amount of data bytes to read may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes.
  • the filehandle parameter indicates the file to which data is being read from.
  • the host file system 734 will process the request, and may translate the file-level read request into a function call to a sector read function 876 supported by the memory control software of a storage system device driver.
  • the data payload to be returned in response to the call of the sector read function 876 contains at least a portion of the file data read from the storage system and decrypted as necessary.
  • the function prototype of the sector read function 876 includes an sbuf parameter, to accommodate returning the data read from a storage system.
  • the num parameter may indicate the number of bytes to read, and the lbaddr parameter indicates the logical block address where the first byte may be read from.
  • the sbuf parameter may be a pointer to the storage pointed to by the buf parameter of file read instruction 872 .
  • the data payload may be packetized with other data tags, result, or status information, and returned in the storage pointed to by the sbuf parameter.
  • the host file system 734 will return this data in the array pointed to by the buf parameter of the file read function 872 , where the data payload, data tags, and result or status information may be extracted.
  • the decryption instruction may be determined by the memory control software of a storage system device driver without passing the instruction through the host file system 734 .
  • the file header or a portion of the encrypted file read from the storage system may be unencrypted, and may contain a command or a partial command describing how to decrypt the remainder or other portions of the file, which may be encrypted.
  • the command 882 may include a variety of keys, key indexes, or other configuration parameters suitable for at least partially configuring a decryption engine, such as encryption/decryption engine 114 of FIG. 1 .
  • the command 882 may also be based on one or more global configuration registers located within the memory device interface 110 of FIG. 1 .
  • a file to logical block address translation engine 880 may determine the particular logical block address ranges associated with a file to be decrypted.
  • the file to logical block address translation engine 880 uses a file allocation table (FAT), and may be located within the memory file manager 102 of FIG. 1 , with a direct communication interface with the memory control interface 112 of FIG. 1 that bypasses the host file system 734 , which may be utilized as the file system 104 in FIG. 1 .
  • FAT file allocation table
  • the command 882 and the output of the file to logical block address translation engine 880 may be used to generate a decryption instruction for data read from memory in response to a call to a sector read function 876 . Therefore, the file system 734 of system 870 may not require an API capable of accepting the decryption instruction or result/status information as separate parameters of one or more functions.
  • the host file system 734 may be utilized as the file system 104 in the system 100 , because the host file system 734 may pass results/status information suitable to allow memory file manager 102 to monitor the encryption/decryption engine 114 , and because the decryption instructions may be determined by the memory device interface 110 without passing the decryption instructions through the host file system 734 .
  • the memory file manager 102 may be adapted to extract data payloads, decryption data tags, and results or status from the packets returned in response to calls to a host file system read file function call 872 .
  • the memory file manager 102 may be adapted to provide a file to logical block address translation engine 880 to allow the memory control interface 112 to determine the sectors or logical block addresses associated with a file to be decrypted. Additionally, the memory control interface 112 may be adapted to packetize data payloads, decryption data tags, and results or status and return the packetized data to the host file system 734 as return values of a sector level read command 876 .
  • the memory control interface 112 is also adapted to receive a decryption command associated with a file.
  • the memory control interface may receive a file decryption command by reading an unencrypted file header from a file that is otherwise encrypted.
  • the memory control interface 112 may be further adapted to send a request directly to memory file manager 102 to retrieve a set of logical block address ranges corresponding to the file to be decrypted.
  • the set of logical block address ranges, combined with the file decryption command, may be utilized to operate the encryption/decryption engine 114 in order to decrypt portions of a file read out from a storage system in response to a call to a sector read function 876 .
  • the IpBuffer parameter of the ReadFile function may be used to data payloads and status through a Win32 host file system. Therefore, a host file system such as the Win32 file system may be utilized as the file system 104 in the system 100 that supports file read and decrypt operations. Further, any host file system capable of passing a data structure between a function in its API, and the memory control software of a storage system device driver, may be utilized as the file system 104 in accordance with an embodiment.
  • the parameters to control encryption operations and report the status of a decryption operation are passed within the data arguments of write/read commands supported by the API of the host file system 734 .
  • the host file system 734 treats the encryption/decryption parameters identically to any other file data passed through the host file system 734 . Therefore, the encryption/decryption parameters and status do not modify the operation of the host file system 734 .
  • the host file system 734 utilized as the file system 104 of FIG. 1 does not control or modify the operation of the encryption/decryption engine 114 , and the encryption and decryption of data in the memory device interface 110 of FIG.
  • 1 is independent of any processing that the file system 104 performs in handling read and write commands.
  • the encryption instructions and decryption status By passing the encryption instructions and decryption status through the file system 104 as data arguments, the quantity or type of encryption and decryption parameters to control memory device interface 110 the may be modified without changing the API of the host file system 104 .
  • FIGS. 7 and 8 show the use of file write and read functions
  • other host file system API functions capable of passing data structures through the file system in accordance with the foregoing description may be used as well. These include, for example, data structures that are not files or portions of files.
  • exemplary systems 730 and 870 demonstrate an instruction and status results being passed through the host file system, any variety of keys, key indexes, or other configuration parameters, or status and result information, may be passed within the data arguments of commands supported by the host file system.
  • FIGS. 7 and 8 show the use of file write and read functions to encrypt and write to memory, and decrypt and read from memory
  • the write and read functions may still be used for operations that do not require encryption or decryption.
  • the file write function may also still be utilized to write an unencrypted file from a storage system.
  • a file read function may also be used to read an unencrypted file from a storage system.
  • data structures such as data tags may be used to identify the data that contains packetized instructions, status, and data payload.
  • FIG. 9 shows exemplary steps 900 for encrypting data using commands and data passed through a host file system, in accordance with an embodiment.
  • the exemplary steps may be utilized by a system 100 in FIG. 1 , if the file system 104 utilizes the disclosed embodiment of passing a packetized encryption instruction and data payload through the data parameter of a host file system function, from the memory file manager 102 to the memory control interface 112 .
  • an encryption instruction is generated.
  • the memory file manager 102 may receive a request from an application to encrypt and write a file to non-volatile memory.
  • the request may include other parameters, such as digital rights management (DRM) information specified by the application, which may, for example, define the encryption key and encryption algorithm that the encryption/decryption engine 114 will use.
  • DRM digital rights management
  • the memory file manager may also receive a request from an application to write a file to non-volatile memory without any encryption, in which case the encryption instruction formed will be a no-operation (NOOP), and the encryption/decryption engine 114 will simply pass through the data from the memory control interface 112 to the memory interface driver 116 .
  • NOOP no-operation
  • the memory file manager may combine the encryption instruction with the data payload to be encrypted to form a packet.
  • the data payload to be encrypted may be a portion or all of a data file to be written.
  • the packet may optionally include data tags, checksums, CRC values, or other flags to identify it as comprising an encryption instruction and payload.
  • the packet is associated with a command supported by the host file system, such as a “write file” command, and transmitted to the host file system as at least a portion of the data argument of a command supported by the host file system.
  • the host file system may receive a command and associated packet in step 906 , and may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses.
  • LBA logical block address
  • the host file system may also generate a logical block address write instruction, where a logical block address write instruction is associated with a packet.
  • the host file system may divide the packet into two or more fragments, and associate each fragment with a logical block address write instruction.
  • Control passes to step 908 , where a logical block address write instruction and packet is received.
  • a logical block address write instruction and packet is received.
  • two or more logical block write instruction and packet fragment pairs are received, where each packet fragment is a portion of a packet.
  • the received packet fragments are cached until a complete packet can be reassembled from the packet fragments.
  • the complete packet corresponds to the original packet received by the host file system and fragmented by the host file system.
  • the encryption instruction and data payload are extracted from the packet.
  • step 910 may extract these fields from the packet and evaluate the contents to determine or verify whether the received packet contains an encryption instruction and data payload, or is just a standard logical block write instruction without an encryption instruction embedded in the associated data argument.
  • all or a portion of the packet may be encrypted according to the encryption instruction.
  • only the encrypted results may be stored in a non-volatile memory, or the encrypted results may be stored with other information in the non-volatile memory.
  • control passes to step 912 , where the data payload is encrypted (or passed through) according to the extracted encryption instruction to form a processed data payload.
  • Control then passes to step 914 , where the processed data payload is written to the non-volatile memory, such as a removable memory card, according to the received logical block address write instruction.
  • control passes to step 912 , where the data payload is encrypted (or passed through) according to the extracted encryption instruction to form a processed data payload.
  • Control then passes to step 914 , where the processed data payload is combined with some or all of the remaining packet contents such as the encryption instruction and data tags, checksums, flags, or CRC values. The combination is then written to the non-volatile memory according to the received logical block address write instruction.
  • the entire received packet, including the data payload is encrypted and stored.
  • Control passes to step 912 , where the entire packet may be encrypted, including the data payload within the packet.
  • Control then passes to step 914 , where the encrypted packet, containing the encrypted data payload, is stored in the non-volatile memory according to the received logical block address write instruction.
  • Writing the entire packet to memory instead of just the encrypted data payload may allow the host file system's calculation of the amount of data written to memory to be consistent with the amount of data actually written to memory.
  • the storage overhead associated with storing the entire packet contents may be relatively insignificant. For purposes of illustrating the relative storage overhead associated with storing the entire packet contents, assume that a data payload is 64 kilobytes, and the data tags and encryption instruction is 16 bytes. The extra storage space to store the data tags and encryption instruction is minimal, relative to the storage space needed to store the data payload.
  • FIG. 10 shows exemplary steps 1000 for decrypting data and passing status through a host file system, in accordance with an embodiment.
  • the exemplary steps may be utilized by a system 100 in FIG. 1 , if the file system 104 utilizes the disclosed embodiment of passing a packetized data payload through the data parameter of a host file system function, from the memory control interface 112 to the memory file manager 102 .
  • a packet may be received from a non-volatile memory, such as a removable memory card, through the memory interface driver 116 of FIG. 1 .
  • the packet may be received in response to a logical block address read command issued by the file system 104 to the memory device interface 110 .
  • the logical block address read command may be issued in response to a file level read command transmitted from the memory file manager 102 to the host file system 104 .
  • the memory file manager 102 generated the file level read command in response to a read request from an application process.
  • a decryption instruction is generated.
  • the decryption instruction may be based on other configuration parameters passed to encryption/decryption engine 114 , such as decryption instructions associated with a range of logical block addresses associated with a non-volatile memory device.
  • the instruction may be based on unencrypted header information read from a file to be decrypted, and may be based on a determination that the logical block addresses being read out are associated with a file to be decrypted.
  • a decryption instruction is selected based on the logical block address associated with the received packet.
  • the packet contains additional unencrypted information used to form a decryption instruction, such as an index to a decryption key, or the information used to encrypt the data payload, such as the encryption instruction, if stored along with the data payload as described in an embodiment of step 914 of FIG. 9 .
  • the decryption instruction may also be based on one or more global configuration registers located within the memory device interface 110 of FIG. 1 .
  • the decryption instruction may be to pass through the received packet without decrypting it, also referred to as a no-operation or NOOP. Control passes to step 1006 , where at least a portion of the received packet is decrypted (or passed through) according to the decryption instruction.
  • the data payload portion of the packet is decrypted.
  • the entire packet is decrypted.
  • step 1008 at least a portion of the processed packet may be combined with other data such as status information or result flags to form a second packet.
  • the second packet is passed to the host file system as the data argument of the response to a logical block address read command issued by the file system 104 of FIG. 1 .
  • the file system performs logical block address (LBA) to file-level conversion, where logical block address read results are associated with a file-level read command result.
  • LBA logical block address
  • the memory file manager receives the result of the file-level read command from the file system 104 of FIG. 1 . Control passes to step 1014 , where the memory file manager 102 of FIG.
  • the memory file manager 102 may also extract status information or result flags from the received data as necessary to monitor the encryption/decryption engine 114 of FIG. 1 .
  • a host file system may be utilized when performing encrypted/decrypted write and read operations to a TrustedFlashTM memory device from SanDisk Corporation of Milpitas, Calif., in accordance with TrustedFlashTM protocols.
  • TrustedFlashTM refers in part to the creation, organization, and management of secure storage within a memory device.
  • Another aspect of implementing a secure system in accordance with TrustedFlashTM protocols, where a system comprises a host and a memory device with the TrustedFlashTM architecture, is the transmission of data between the host and the memory device.
  • some data transmitted between the host and the memory device must be encrypted, to prevent the data from being intercepted and read by an unauthorized party.
  • the encrypted data may include digital content to be securely stored to or read from the TrustedFlashTM memory device, such as MP3 format audio files, picture files, and video files.
  • the host may encrypt the data before transmission to the device, and the memory device may decrypt the data and perform other operations before storage.
  • the memory device may encrypt the data before transmission to the host, and the host may decrypt the received data.
  • the encryption and decryption key utilized to perform the encryption and decryption operations may be referred to as a session key, and may be generated and utilized by both the host and non-volatile memory device for one or more read and write accesses.
  • Some writes to a TrustedFlashTM memory device do not require encryption before transmission from the host to the memory device, and some of the data received from the memory device during a read operation is not encrypted.
  • Examples of unencrypted data include File Allocation Table (FAT) data, directories, and data stored in an unprotected format within the non-secure areas of the memory device, such as the public storage partition of a TrustedFlashTM memory device.
  • FAT File Allocation Table
  • other accesses to secure partitions of a TrustedFlashTM memory device, and accesses to write and read data in a protected format may require encryption of data being written to the memory device, and decryption of the data read from the memory device.
  • a host file system may be utilized as file system 104 .
  • a memory file manager 102 may receive application requests to write to or read from the non-secure areas or the secure areas of a TrustedFlashTM memory.
  • the memory file manager may form encryption instructions and data tags that may be transmitted through the file system 104 along with the data payload to be encrypted and stored, so that the memory device interface 110 may encrypt and write data to the TrustedFlashTM memory.
  • the memory file manager 102 may also receive requests to read secure areas of a TrustedFlashTM memory device, and receive status of the decryption occurring in memory device interface 110 through decryption parameters passed through the file system 104 .
  • the memory file manager 102 may also recover the data payload, data tags, and decryption status from the decrypted results returned from the memory device interface 110 through the file system 104 .
  • the memory file manager 102 may also provide a file to logical block address translation engine and direct interface to memory device interface 110 , so that memory control interface 112 may associate file decryption commands with logical block addresses of sectors read out from a storage system.
  • a host file system may be optimized for the resource limitations or features of the host, and may include enhanced features such as multi-thread support, where multiple applications may access the file system in parallel through resource sharing and scheduling algorithms.

Abstract

A method for encrypting data may generate an encryption instruction and combine it with a payload of data to form a packet. The packet is associated with a command and passed to a host file system process. The packet, now associated with a second command, is received from the host file system process. The encryption instruction and the payload of data are extracted from the packet. At least a portion of the payload of data is encrypted based on the encryption instruction. A method for decrypting data may receive a packet and generate a decryption instruction. At least a portion of the packet is decrypted using at least the decryption instruction. The second packet comprising the decrypted packet is passed to a host file system process. A third packet comprising the decrypted packet is received from the host file system process. The decrypted packet is extracted from the third packet.

Description

    TECHNICAL FIELD
  • This application relates generally to the operation of non-volatile flash memory systems, and, more specifically, to a method and system for transferring data and instructions through a host file system.
  • BACKGROUND
  • There are many commercially successful non-volatile memory products being used today, particularly in the form of small form factor cards, which employ flash EEPROM (Electrically Erasable and Programmable Read Only Memory) cells formed on one or more integrated circuit devices. Some of the commercially available card formats include CompactFlash (CF) cards, MultiMedia cards (MMC), Secure Digital (SD) cards, personnel tags (P-Tag), and Memory Stick cards. Hosts include personal computers, notebook computers, personal digital assistants (PDAs), various data communication devices, digital cameras, cellular telephones, portable audio players, automobile sound systems, and similar types of equipment. In some systems, a removable card does not include a controller and the host controls operation of the memory in the card. Examples of this type of memory system include Smart Media cards and xD cards. Thus, control of the memory may be achieved by software on a controller in the card or by control software in the host. Besides a memory card implementation, this type of memory can alternatively be embedded into various types of host systems. In both removable and embedded applications, host data may be stored in the memory according to a storage scheme implemented by memory control software.
  • The memory control software may interface with a host file system, which, in turn, may interface with a memory file manager which provides an application programming interface (API) to applications accessing the memory. Host file systems may support a set of read and write commands to access storage systems connected to the host, may be optimized for the resource limitations or features of the host, and may include advanced features such as multi-thread support.
  • The feature set of a memory file manager communicating with the memory control software through a host file system may be limited by the command set, such as read and write commands, provided by the host file system interface. A host file system may be supplemented with an additional, specialized file system, which may implement all of the required features specific to accessing the memory. Implementing a specialized file system may require additional software code storage space, and a specialized file system may not leverage or implement all of the features of the host file system. Synchronization of file system information is also necessary when a host file system and specialized file system are operated in parallel with one another.
  • SUMMARY
  • In order to address these issues, there is a need for a way to pass instructions through a host file system from a memory file manager to memory control software. Additionally, there is a need to pass status information from the memory control software to the memory file manager.
  • Thus, according to one aspect of the invention, a method is provided for encrypting data. An encryption instruction is generated, where the encryption instruction indicates whether an encryption operation is to be executed. The encryption instruction is combined with a payload of data to form a packet. The packet is associated with a command to form a command set. The command set is passed to a host file system process. A second command set is received from the host file system process, where the second command set includes the packet associated with a second command. The packet is extracted from the second command set. The encryption instruction and the payload of data are extracted from the packet. At least the payload of data is encrypted based on the encryption instruction, where the encryption of at least the payload of data is independent of the host file system process.
  • In another aspect of the invention, there is a method for decrypting data. A packet is received. A decryption instruction is generated, where the decryption instruction indicates whether a decryption operation is to be executed. At least a portion of the packet is decrypted using at least the decryption instruction to form a decrypted packet. A second packet is formed comprising the decrypted packet. The second packet is passed to a host file system process. A third packet is received from the host file system process, where the third packet includes the decrypted packet. The decrypted packet is extracted from the third packet. The payload of data is extracted from the decrypted packet.
  • According to another aspect of the invention, there is a method of transferring data and encryption instructions through a host file system. A write command and a payload of data are received from a host program. An encryption instruction is formed based on a determination of whether the payload of data should be encrypted. A data verification field is determined using at least the payload of data. The encryption instruction, the data verification field, and the payload of data are combined to form a packet. A file system level write command is generated based on the write command. The packet is associated with the file system level write command to form a file system level write command set. The file system level write command set is passed to a host file system process. An address-level write command set is received from the host file system process, where the address-level write command set is derived from the file system level write command set and includes the packet associated with an address level command. The packet is extracted from the address-level write command set. The encryption instruction, the data verification field, and the payload of data are extracted from the packet. The payload of data is verified using at least the data verification field. At least the payload of data is encrypted based on the encryption instruction, where the encryption of at least the payload of data is independent of the host file system process. A device level write command is generated based on the address level command. At least the encrypted payload of data is associated with a device level write command to form a device level write command set.
  • In yet another aspect of the invention, there is a method of transferring data and decryption instructions through a host file system. A decryption instruction is formed based on determining whether the packet should be decrypted. At least a portion of the packet is decrypted using the decryption instruction, to form a decrypted packet. An address-level read result is formed, containing at least a portion of the decrypted packet. An address-level read result is passed to a host file system process. A file system level read result is received from the host file system process, where the file system level read result is derived from the address-level read result. The payload of data is extracted from the file system level read result.
  • Other methods and systems, and features and advantages thereof will be, or will become, apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that the scope of the invention will include the foregoing and all such additional methods and systems, and features and advantages thereof.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating various aspects thereof. Moreover, in the figures, like referenced numerals designate corresponding parts throughout the different views.
  • FIG. 1 is a diagram illustrating a system for encrypting and decrypting data using commands and data passed through a file system.
  • FIG. 2 shows exemplary steps for encrypting data using commands and data passed through a file system as separate parameters.
  • FIG. 3 is a diagram illustrating a system for passing data payload, data tags, and encryption instructions through a file system as separate parameters.
  • FIG. 4 shows exemplary steps for decrypting data using commands and data passed through a file system as separate parameters.
  • FIG. 5 is a diagram illustrating a system for passing data payload, data tags, decryption status, and decryption instructions through a file system as separate parameters.
  • FIG. 6 is a diagram illustrating packetization of a data payload, data tags, and an instruction in accordance with an embodiment.
  • FIG. 7 is a diagram illustrating a system for passing a packetized data payload, data tags, and encryption instruction through a host file system in accordance with an embodiment.
  • FIG. 8 is a diagram illustrating a system for passing a packetized data payload, data tags, and decryption status through a host file system, and determining a decryption instruction, in accordance with an embodiment.
  • FIG. 9 shows exemplary steps for encrypting data using commands and data passed through a host file system, in accordance with an embodiment.
  • FIG. 10 shows exemplary steps for decrypting data and passing status through a host file system, in accordance with an embodiment.
  • DETAILED DESCRIPTION OF THE PRESENTLY PREFERRED EMBODIMENTS
  • Applications in an exemplary system may need to write data to a storage system, and read data from a storage system. Some of these write and read requests may involve writing and reading data according to Digital Rights Management (DRM) rules established by the application, the storage system, or both. These rules may require that some data stored in a storage system, such as a non-volatile memory card, must be in an encrypted format. The DRM rules may also require that the data transmitted between the exemplary system and the storage system is in an encrypted format. These rules may also specify regions of the storage system where data stored must be in an encrypted format. In one example, the regions may be defined by address ranges within a non-volatile memory. In order to adhere to these DRM rules, an exemplary system may support additional functionality, such as encryption of data before storage and decryption of data after retrieval from the storage system.
  • A system for encrypting data written to and decrypting data read from a storage system may appear in a variety of hosts, including personal computers, notebook computers, personal digital assistants (PDAs), various data communication devices, digital cameras, cellular telephones, portable audio players, automobile sound systems, and similar types of equipment.
  • There are several architectures that may be utilized to implement a system for encrypting data written to, and decrypting data read from, a storage system such as a non-volatile memory. FIG. 1 is a diagram illustrating a system for encrypting and decrypting data using commands and data passed through a file system. A system 100 for encrypting and decrypting data written to and read from a storage system may be implemented in hardware, software, or firmware, or any combination of hardware, software or firmware. The exemplary system 100 may communicate with application processes that send requests to encrypt and store data, or send requests to retrieve and decrypt data. The application process may be within the same host as the system 100, or may be remote processes that send requests over a network or other suitable communication links. The system 100 may communicate with a storage system, such as a non-volatile memory, non-volatile memory card, volatile memory, disk drive, or any other local or remote storage device capable of storing data. If the storage system is remote, data to be stored and retrieved may be transmitted and received over a network or other suitable communication links.
  • The system 100 includes a memory file manager 102, file system 104, and a memory device interface 110. Each component of the system 100 may be implemented in hardware, software, or firmware, or any combination of hardware, software or firmware. For example, the file system 104 may be implemented as a combination of hardware, software, or firmware, or any combination of hardware, software or firmware. Thus, the file system 104 may also be referred to as a file system process. The memory device interface 110 includes a memory control interface 112, an encryption/decryption engine 114, and a memory interface driver 116. The memory file manager may receive requests from application processes to write data to and read data from a storage system such as a non-volatile memory in communication with a memory interface driver 116. Some of the requests from application processes may require that the encryption/decryption engine 114 encrypt data before it is written to a storage system by the memory interface driver 116, or decrypt data after it is read from a storage system by the memory interface driver 116.
  • The Digital Rights Management (DRM) rules may be different for each write and read request, so the memory file manager 102 may be required to dynamically configure the encryption/decryption engine 114 for each write and read request or may be required to receive status results from the encryption/decryption engine 114. The configuration of encryption/decryption engine 114 may require instructions and control parameters such as keys or key index values. One such configuration may also include not encrypting a file before storage, or not decrypting that was stored in an unencrypted format. Further, some write and read requests to a storage system may be for the purpose of configuring or reading status from the storage system itself. For example, a system may need to write to a storage system to update the File Allocation Table (FAT), or read the file allocation table from memory. In these instances, the data written to the storage system may not be encrypted before storage. Therefore, there is a need to be able to control the encryption/decryption engine 114 for each access to the storage system.
  • In the exemplary system 100, the file system 104 provides a communication link between the memory file manager 102 and the memory device interface 110. However, the communication link provided by a file system 104 may not be capable of passing commands suitable for configuring the encryption/decryption engine 114.
  • One way of evaluating the capabilities of the communication link of a file system 104 is to evaluate the Application Programming Interface (API) provided by the file system. A file system may provide an API that programs may use to access a storage system such as a non-volatile memory, volatile memory, disk drive, or any other local or remote storage device capable of storing data. Specifically, the API of a file system is evaluated in order to determine if encryption/decryption instructions and status can be passed as separate parameters within one or more functions of the file system API.
  • One example of a file system API is the Win32 File I/O API, provided by Microsoft Corporation. The Win32 API supports read and write functions for reading and writing a file on a storage system, with the following function prototypes:
  • BOOL ReadFile(HANDLE hFile, LPVOID IpBuffer, DWORD nNumberOfBytesToRead, LPDWORD IpNumberOfBytesRead, LPOVERLAPPED IpOverlapped);
  • BOOL WriteFile(HANDLE hFile, LPCVOID IpBuffer, DWORD nNumberOfBytesToWrite, LPDWORD IpNumberOfBytesWritten, LPOVERLAPPED IpOverlapped);
  • The ReadFile function parameters hFile, IpBuffer, nNumberOfBytesToRead, and IpOverlapped specify the file to read, the buffer to copy the file data to, the number of bytes to read, and the I/O mode to use, respectively. The ReadFile function may return a boolean success flag, and parameter IpNumberOfBytesRead that indicates the number of bytes actually read. Similarly, the WriteFile function parameters hFile, IpBuffer, nNumberOfBytesToWrite, and IpOverlapped specify the file to write, the buffer to copy the file data from, the number of bytes to write, and the I/O mode to use, respectively. The WriteFile function may return a boolean success flag, and parameter IpNumberOfBytesWritten that indicates the number of bytes actually written.
  • When the WriteFile or ReadFile function is called, the Windows file system may translate the function call into low-level read and write function calls, such as read and write accesses to a logical block address or address range of a storage device. The file system may then make calls to functions in the memory control software of a storage system device driver in order to complete the request.
  • However, inspection of the Win32 API WriteFile and ReadFile function prototypes shows that the functions do not support the passing of encryption/decryption instructions and status as separate parameters to the function. In systems 100 where the file system 104 provides a means of passing encryption/decryption instructions and status between the memory file manager 102 and the memory device interface 110, there may be a method of utilizing a file system with an API capable of passing encryption/decryption instructions as separate function parameters, and returning encryption/decryption results or status as separate function parameters. This file system may be operated in parallel with other host file systems, such as the Win32 File I/O file system, that may service storage requests or other storage systems that do not require encryption or decryption.
  • Using the foregoing method for passing encryption/decryption instructions and status between the memory file manager 102 and the memory device interface 110, a system 100 may process application requests to encrypt and write data to a storage system, and read and decrypt data from a storage system.
  • In one example, the memory file manager 102 may receive an application request to store a file on a storage system in communication with the memory interface driver 116. The application request may also contain an instruction to encrypt the file before storage, or the memory file manager 102 may determine that the file should be encrypted. The memory file manager may call a function supported by the API of the file system 104 to encrypt and store the file. The parameters passed to the function of file system 104 may include the file to encrypt and store, and an encryption instruction. The file system 104 may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses in the non-volatile memory, and may, in response to receiving a command from the memory file manager 102, generate a plurality of logical block address commands to transmit to the memory control interface 112. The commands may include encryption instructions. The commands may be passed as function calls to the API of the memory control interface 112, where an encryption instruction may be passed as a separate parameter of the function. The LBA-level commands, encryption instructions, and associated data are received by the memory control interface 112. If the command is an encrypted write command, the memory control interface 112 may pass the data and an encryption instruction to the encryption/decryption engine 114 for encryption. The encrypted data is then written to the storage system by the memory interface driver 116.
  • In another example, the memory file manager 102 may receive an application request to read a file on a storage system in communication with the memory interface driver 116. The application request may also contain an instruction to decrypt the file after reading it from the storage system, or the memory file manager 102 may determine that the file should be decrypted before it is returned to the application. The memory file manager may call a function supported by the API of the file system 104 to decrypt and store the file. The parameters passed to the function of file system 104 may include the file to read and decrypt, and a decryption instruction. The file system 104 may perform file-level to logical block address (LBA) conversion, where the stored location of a file is expressed as a plurality of logical block addresses or address ranges. The commands may include decryption instructions. The commands may be passed as function calls to the API of the memory control interface 112, where a decryption instruction may be passed as a separate parameter of the function. The LBA-level commands, decryption instructions, and associated data are received by the memory control interface 112. If the command is a decrypted read command, the memory control interface 112 may command the memory interface driver 116 to read data from the non-volatile memory, and the memory control interface 112 may direct the encryption/decryption engine 114 to decrypt the data returned from the non-volatile memory to the memory interface driver 116. The memory control interface 112 may receive the decrypted data from the encryption/decryption engine 114, and may pass the decrypted data to the file system 104, which then passes the data (such as complete files read from a non-volatile memory) to the memory file manager 102. Status reported from the encryption/decryption engine 114 may be returned to the memory file manager 102 in the same way, as a separate parameter that is passed through the file system 104.
  • Therefore, in order to pass information necessary to complete the encryption/decryption operation, such as keys, key indexes, or other configuration parameters, from the memory file manager 102 to the memory control interface 112, the aforementioned method may utilize a file system, or modify or create a file system, with an API capable of passing this information as separate parameters. Using the method, a file system with an API that does not support passing encryption/decryption instructions and status as separate parameters, such as the Win32 File I/O system, may be unsuitable for implementing a file system 104 in the system 100.
  • FIG. 2 shows exemplary steps 200 for encrypting data using commands and data passed through a file system as separate parameters. The exemplary steps may be utilized by a system 100 in FIG. 1, if the file system 104 utilizes the method of passing an encryption instruction as a separate parameter from the memory file manager 102 to the memory control interface 112. At step 202, an encryption instruction is generated. Referring briefly back to FIG. 1, the memory file manager 102 may receive a request from an application to encrypt and write a file to non-volatile memory. The request may include other parameters, such as digital rights management (DRM) information specified by the application, which may, for example, define the encryption key and encryption algorithm that the encryption/decryption engine 114 will use. In another example, the memory file manager may also receive a request from an application to write a file to non-volatile memory without any encryption, in which case the encryption instruction formed will be a no-operation (NOOP), and the encryption/decryption engine 114 will simply pass through the data from the memory control interface 112 to the memory interface driver 116.
  • Returning back to FIG. 2, at step 204, the memory file manager passes an instruction such as an “encrypted write” instruction, which may include encryption parameters, and the file to be encrypted and stored, to the file system. The file system supports encryption and decryption instructions not usually supported by an exemplary host file system. The file system may receive an instruction and associated file in step 204, and may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses. In response to receiving the exemplary “encrypted write” command, the file system may also generate a plurality of logical block address encrypted write instructions, where an instruction is associated with a data payload that is at least a portion of the file data to be written. Control passes to step 208, where the plurality of logical block address encrypted write instruction and data payload pairs are received. In step 210, for each received pair, the data payload is encrypted (or passed through) according to the received logical block address encrypted write instruction. Control then passes to step 212, where the processed data payload is written to the non-volatile memory according to the logical block address encrypted write instruction.
  • FIG. 3 is a diagram illustrating a system for passing data payload, data tags, and encryption instruction through a file system as separate parameters. A system 310 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1. Specifically, the file system 314 of the system 310 may be utilized as the file system 104 of system 100 in FIG. 1, where the file system 104 utilizes the method of passing encryption/decryption instructions and status as separate parameters from the memory file manager 102 to the memory control interface 112.
  • The system 310 utilizing a file system 314 may support an encrypted file write function 312 to encrypt and write a file to a storage system. The function prototype of the encrypted file write function 312 includes separate fbuf and instruction parameters, to accommodate passing a data payload and encryption instruction to the memory control software of a storage system device driver. The size of the data payload may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes. The filehandle parameter indicates the file to which data is being written to. Typically, the fbuf parameter accepts the file data to write, or a pointer to the file data to write. An application may call the encrypted file write function 312 of the file system 314 to encrypt and write a file to a storage system. The file system 314 will process the request, and may translate the file-level write request into a plurality of function calls to an encrypted sector write function 316 supported by the memory control software of a storage system device driver. The function prototype of the encrypted sector write function 316 includes separate instruction and sbuf parameters, to accommodate passing the encryption instruction and at least a portion of the data payload to the memory control software of a storage system device driver. The num parameter may indicate the number of bytes to write, and the lbaddr parameter indicates the logical block address where the first byte may be written to. Typically, the sbuf parameter accepts the sector data to write, or a pointer to the sector data to write. In system 310, in order to pass an encryption instruction through the file system, the API of the file system 314 accepts the encryption instruction as a parameter of one or more functions.
  • FIG. 4 shows exemplary steps 400 for decrypting data using commands and data passed through a file system as separate parameters. The exemplary steps may be utilized by a system 100 in FIG. 1, if the file system 104 utilizes the method of passing a decryption instruction as a separate parameter from the memory file manager 102 to the memory control interface 112. At step 402, a packet may be received from the non-volatile memory, such as a removable memory card, through the memory interface driver 116 of FIG. 1. The packet may be received in response to a file level decrypted read command transmitted from the memory file manager 102 to the file system 104, and received as a logical block address decrypted read command from the file system 104. At step 404, a decryption instruction is generated. Referring back to FIG. 1, the instruction may be based on a command received through the file system 104, or other configuration parameters passed to encryption/decryption engine 114. The decryption instruction may be to pass through the received packet (a no-operation (NOOP)), without decrypting it. Control passes to step 406, where at least a portion of the received packet is decrypted (or passed through) according to the decryption instruction. In step 408, at least a portion of the processed packet may be combined with other data such as status information or result flags to form a second packet. In step 410, the second packet is passed to the file system as the data argument of the response to a logical block address decrypted read command from the file system 104. The file system performs logical block address (LBA) to file-level conversion, where logical block address decrypted read results are associated with a result of a file-level decrypted read command. At step 412, the memory file manager receives the result of the file-level decrypted read command from the file system 104, and may extract the decrypted file data payload from the data argument of the returned result.
  • FIG. 5 is a diagram illustrating a system for passing data payload, data tags, decryption status, and decryption instruction through a file system as separate parameters. A system 550 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1. Specifically, the file system 314 of the system 550 may be utilized as the file system 104 of system 100 in FIG. 1, where the file system 104 utilizes the method of passing encryption/decryption instructions and status as separate parameters from the memory file manager 102 to the memory control interface 112.
  • The system 550 utilizing a file system 314 may support a decrypted file read function 552 to read data from an encrypted file from a storage system, and decrypt the file data. The function prototype of the decrypted file read function 552 includes separate buf, status, and instruction parameters, to accommodate receiving a data payload and decryption status from, and passing an instruction to, the memory control software of a storage system device driver. The amount of data to read may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes. The filehandle parameter indicates the file to which data is being read from. An application may call the decrypted file read function 552 of the file system 314 to read a file to a storage system and decrypt the file. The file system 314 will process the request, and may translate the file-level read request into a plurality of function calls to a decrypted sector read function 556 supported by the memory control software of a storage system device driver. The function prototype of the decrypted sector read function 556 includes separate instruction, sbuf, and status parameters, to accommodate passing the decryption instruction to the memory control software of a storage system device driver, and receiving at least a portion of the data payload and decryption status as a returned result. The num parameter may indicate the number of bytes to read, and the lbaddr parameter indicates the logical block address where the first byte may be read from. In system 550, in order to pass a decryption instruction and a decryption status through the file system, the API of the file system 314 accommodates the decryption instruction and decryption status as separate parameters of one or more functions.
  • FIGS. 2-5 illustrate a method for passing encryption/decryption instructions and status through a file system 104 between the memory file manager 102 and the memory device interface 110. By passing the instructions and status as separate parameters through a file system 104, a communication link is established that allows an encryption/decryption engine to be configured and monitored by a memory file manager 102. However, in order to change the control instructions or the status to be monitored, the API of the file system 104 and the underlying software or hardware combination utilized to implement the file system 104 may need to be modified. If the host utilizes a separate, additional file system in order to service storage requests or other storage systems that do not require encryption or decryption, additional hardware, memory, or firmware storage may be required, and coordination issues between the two file systems may need to be addressed. Further, not all file systems are capable of passing encryption/decryption instructions and status as separate parameters. It may be desirable to utilize file systems that are incapable of passing encryption/decryption instructions and status parameters, because of other capabilities these file systems may offer, such as multi-thread support.
  • According to one embodiment, a file system 104 incapable of passing encryption commands and decryption status as separate parameters, may still provide a communication link of encryption commands and decryption status between the memory file manager 102 and the memory device interface 110 in an architecture shown in the system 100. In this embodiment, data to be encrypted may be combined with encryption commands, and passed in the data parameters of the functions supported by the file system API. Additionally, data read from a storage system and decrypted may be combined with decryption status, and passed in the data parameters of the read functions supported by the file system API. Because the API of many file systems support the passing of data as parameters through the file system, this approach may be utilized with file systems incapable of passing encryption/decryption instructions and status as separate parameters, such as some host file systems. The combination of read or write data, sometimes referred to as data payloads, with commands or status information, may be referred to as packetization.
  • FIG. 6 is a diagram illustrating packetization of a data payload, data tags, and an instruction in accordance with an embodiment. A host file system command/data set 610 includes a command 612 and the data 614. The command/data set 610 may be suitable for passing through a host file system utilizing a function in the API of the host file system, such as a write file command which accepts a data argument. The data argument 614 includes a plurality of packets 600. Whereas a plurality of data payloads 606 might typically be passed as the data argument 614, here, a data payload 606, a plurality of instructions 604, and a plurality of data tags 602, 608 may be combined, in a processes sometimes referred to as packetization, to create a packet 600. The instruction may be an encryption instruction or a decryption instruction, or an instruction to otherwise set up, control, or receive status information from an encryption or decryption engine. The data payload 606 may be the data to encrypt, or may be other data associated with instruction 604. The packet 600 may be associated with a host file system command 612 as part of a command/data set 610, and the command/data set 610 may be passed to the host file system as command and data arguments of a supported function of the host file system. In this way, a host file system may treat packet 600 as if it contained at least a portion of the data associated with command 612. Stated another way, the instruction 604 may be passed through the host file system as part of the data argument 612 of a host file system command/data set 610.
  • A host file system may extract the command 612 from command/data set 610, and associate new commands with one or more packets 600 of the data 614. When the new command and associated packets 600 are received from the host file system, the receiver, such as the memory control interface 112 of the memory device interface 110 of FIG. 1, may be adapted to process packets 600 with an embedded instruction 604, or packets 600 without an embedded instruction 604. In other words, the host file system may still pass data 614 without embedded instructions, and therefore, a receiver may need to be able to determine if the received data is in the format of a packet 600 with embedded instructions 604. In one embodiment, data tags 602 and 608 may be used to identify or verify a packet 600 as containing an instruction 604 and a data payload 606. In one embodiment, a first data tag 602 within a packet 600 points to the location of a second data tag 608 within the packet 600, and the second data tag 608 points to the location of the first data tag 602. If the data tags 602, 608 do not point to the expected locations within the packet 600, then the packet 600 may not contain the instruction 604 and the data payload 606, and may be processed accordingly.
  • Other indicators within the packet 600 may be used to distinguish between received packets 600 that contain an instruction 604 and a data payload 606 from packets that contain only data. For example, instead of data tags 602, 608, a checksum or cyclic redundancy check (CRC) value could be computed using the instruction 604 and the data payload 606, and stored along with the instruction 604 and data payload 606 within the packet 600. The checksum or CRC value could be extracted from its expected location in the packet 600, and compared with the calculated checksum or CRC using instruction 604 and payload data 606 extracted from the packet 600. If the calculated CRC or checksum value matches the extracted CRC checksum value, then the packet 600 contains an instruction and payload data. If not, packet 600 may be processed as the data associated with a received command.
  • While FIG. 6 demonstrates how packetization may combine an instruction 604, with a data payload 606 and data tags 602, 608, in a packet 600, other combinations are possible. The data payload 606 typically associated with a command 612 may be combined with status, results, or other data to be passed through a host file system. For example, encryption or decryption status may be combined with a data payload to form a packet, and this packet could be passed through the parameters of a function supported by the API of a file system.
  • FIG. 7 is a diagram illustrating a system for passing a packetized data payload, data tags, and encryption instruction through a host file system in accordance with an embodiment. A system 730 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1. Specifically, the file system 734 of the system 730 may be utilized as the file system 104 of system 100 in FIG. 1, where the file system 104 utilizes the embodiment of packetizing the encryption/decryption instructions and status with the data payloads, and passing the packets as the data parameters of the file system API functions, between the memory file manager 102 to the memory control interface 112.
  • The system 730 utilizing a host file system 734 may support passing encryption instructions from an application to the memory control software of a storage system device driver. The host file system 734 may also be referred to as the host file system process. The host file system 734 may support a file write function 732 that includes an fbuf parameter in the function prototype. Typically, the fbuf parameter accepts the file data to write, or a pointer to the file data to write. A process calling the file write function 732 may packetize the data payload, encryption instruction, and data tags as shown in the packet 600 of FIG. 6, and may pass a plurality of packets 614 or a pointer to the plurality of packets 614 as the fbuf argument in a function call to the file write function 732. The total amount of data payload bytes passed in the fbuf argument may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes. The filehandle parameter indicates the file to which data is being written to.
  • The host file system 734 will process the request, and may translate the file-level write request into a plurality of function calls to a sector write function 736 supported by the memory control software of a storage system device driver. The function prototype of the sector write function 736 includes an sbuf parameter, to accommodate passing the data to write to a storage system. The num parameter may indicate the number of bytes to write, and the lbaddr parameter indicates the logical block address where the first byte may be written to. Typically, the sbuf parameter accepts the sector data to write, or a pointer to the sector data to write. The sector write function 736 of the memory control software of a storage system device driver may be adapted to extract the instruction and data payload from the sbuf argument passed as part of the function call to the sector write function 736. Therefore, the system 730 may not require a file system with an API capable of accepting the encryption instruction as a parameter of one or more functions.
  • Returning to FIG. 1, the host file system 734 may be utilized as the file system 104 in the system 100, because the host file system 734 may pass encryption instructions suitable to allow memory file manager 102 to configure the encryption/decryption engine 114. When host file system 734 is utilized in the system 100, the memory file manager 102 may be adapted to packetize data payloads and encryption instructions into packets, and pass packets as data arguments to the write functions 732 supported by the API of the host file system 734. Additionally, the memory control interface 112 may be adapted to extract data payloads and encryption instructions from the data arguments of received function calls from the host file system 734. In another embodiment, the system 730 may also pass data tags through the host file system 734, which may allow the sbuf argument of a call to the sector write function 736 to be identified as containing part or all of an encryption instruction and data payload.
  • Returning to the Win32 API example, utilizing the packetization of data payload, data tags, and encryption instruction, the IpBuffer parameter of the WriteFile function may be used to pass encryption instructions and data payloads through a Windows host file system. Therefore, a host file system such as the Win32 file system may be utilized as the file system 104 in the system 100 that supports file encrypt and write operations. Further, any host file system capable of passing a data structure between a function in its API, and the memory control software of a storage system device driver, may be utilized as the file system 104 in accordance with an embodiment.
  • FIG. 8 is a diagram illustrating a system for passing a packetized data payload, data tags, and decryption status through a host file system, and determining a decryption instruction, in accordance with an embodiment. A system 870 is a portion of a system for encrypting and decrypting data written to and read from a storage system, such as the system 100 of FIG. 1. Specifically, the file system 734 of the system 870 may be utilized as the file system 104 of system 100 in FIG. 1, where the file system 104 utilizes one embodiment of packetizing the encryption/decryption instructions and status with the data payloads, and passing the packets as the data parameters of the file system API functions, between the memory file manager 102 to the memory control interface 112.
  • The system 870 utilizing a host file system 734 may support passing decryption status to an application from the memory control software of a storage system device driver. As explained further below, the system 870 may not have to support passing the decryption instruction through a host file system 734. The host file system may support a file read function 872 that includes a buf parameter in the function prototype. Typically, the buf parameter may be a storage array or a pointer to a storage array for the file read result.
  • The file read function 872 may be called in order to read file data from a storage system. The file data may be encrypted. The total amount of data bytes to read may be indicated by the product of the items parameter, which may indicate the number of items to transfer, and the size parameter, which may indicate the size of an item in bytes. The filehandle parameter indicates the file to which data is being read from. The host file system 734 will process the request, and may translate the file-level read request into a function call to a sector read function 876 supported by the memory control software of a storage system device driver. The data payload to be returned in response to the call of the sector read function 876 contains at least a portion of the file data read from the storage system and decrypted as necessary. The function prototype of the sector read function 876 includes an sbuf parameter, to accommodate returning the data read from a storage system. The num parameter may indicate the number of bytes to read, and the lbaddr parameter indicates the logical block address where the first byte may be read from. The sbuf parameter may be a pointer to the storage pointed to by the buf parameter of file read instruction 872. The data payload may be packetized with other data tags, result, or status information, and returned in the storage pointed to by the sbuf parameter. The host file system 734 will return this data in the array pointed to by the buf parameter of the file read function 872, where the data payload, data tags, and result or status information may be extracted.
  • The decryption instruction may be determined by the memory control software of a storage system device driver without passing the instruction through the host file system 734. In one embodiment, the file header or a portion of the encrypted file read from the storage system may be unencrypted, and may contain a command or a partial command describing how to decrypt the remainder or other portions of the file, which may be encrypted. The command 882 may include a variety of keys, key indexes, or other configuration parameters suitable for at least partially configuring a decryption engine, such as encryption/decryption engine 114 of FIG. 1. The command 882 may also be based on one or more global configuration registers located within the memory device interface 110 of FIG. 1. Because the sector read function 876 operates on sectors, and may not have knowledge of which sectors are associated with a file to be decrypted, a file to logical block address translation engine 880 may determine the particular logical block address ranges associated with a file to be decrypted. In one embodiment, the file to logical block address translation engine 880 uses a file allocation table (FAT), and may be located within the memory file manager 102 of FIG. 1, with a direct communication interface with the memory control interface 112 of FIG. 1 that bypasses the host file system 734, which may be utilized as the file system 104 in FIG. 1. The command 882 and the output of the file to logical block address translation engine 880 may be used to generate a decryption instruction for data read from memory in response to a call to a sector read function 876. Therefore, the file system 734 of system 870 may not require an API capable of accepting the decryption instruction or result/status information as separate parameters of one or more functions.
  • Returning to FIG. 1, the host file system 734 may be utilized as the file system 104 in the system 100, because the host file system 734 may pass results/status information suitable to allow memory file manager 102 to monitor the encryption/decryption engine 114, and because the decryption instructions may be determined by the memory device interface 110 without passing the decryption instructions through the host file system 734. When the host file system 734 is utilized in the system 100, the memory file manager 102 may be adapted to extract data payloads, decryption data tags, and results or status from the packets returned in response to calls to a host file system read file function call 872. Further, the memory file manager 102 may be adapted to provide a file to logical block address translation engine 880 to allow the memory control interface 112 to determine the sectors or logical block addresses associated with a file to be decrypted. Additionally, the memory control interface 112 may be adapted to packetize data payloads, decryption data tags, and results or status and return the packetized data to the host file system 734 as return values of a sector level read command 876.
  • The memory control interface 112 is also adapted to receive a decryption command associated with a file. For example, the memory control interface may receive a file decryption command by reading an unencrypted file header from a file that is otherwise encrypted. The memory control interface 112 may be further adapted to send a request directly to memory file manager 102 to retrieve a set of logical block address ranges corresponding to the file to be decrypted. The set of logical block address ranges, combined with the file decryption command, may be utilized to operate the encryption/decryption engine 114 in order to decrypt portions of a file read out from a storage system in response to a call to a sector read function 876.
  • Returning to the Win32 API example, utilizing the packetization of data payload, data tags and status, and the generation of a decryption instruction that may not require passing the decryption instruction through a host file system, the IpBuffer parameter of the ReadFile function may be used to data payloads and status through a Win32 host file system. Therefore, a host file system such as the Win32 file system may be utilized as the file system 104 in the system 100 that supports file read and decrypt operations. Further, any host file system capable of passing a data structure between a function in its API, and the memory control software of a storage system device driver, may be utilized as the file system 104 in accordance with an embodiment.
  • In the exemplary systems 730 and 870 in FIGS. 7 and 8, the parameters to control encryption operations and report the status of a decryption operation are passed within the data arguments of write/read commands supported by the API of the host file system 734. The host file system 734 treats the encryption/decryption parameters identically to any other file data passed through the host file system 734. Therefore, the encryption/decryption parameters and status do not modify the operation of the host file system 734. Conversely, the host file system 734 utilized as the file system 104 of FIG. 1 does not control or modify the operation of the encryption/decryption engine 114, and the encryption and decryption of data in the memory device interface 110 of FIG. 1 is independent of any processing that the file system 104 performs in handling read and write commands. By passing the encryption instructions and decryption status through the file system 104 as data arguments, the quantity or type of encryption and decryption parameters to control memory device interface 110 the may be modified without changing the API of the host file system 104.
  • While the examples in FIGS. 7 and 8 show the use of file write and read functions, other host file system API functions capable of passing data structures through the file system in accordance with the foregoing description may be used as well. These include, for example, data structures that are not files or portions of files. Further, while the exemplary systems 730 and 870 demonstrate an instruction and status results being passed through the host file system, any variety of keys, key indexes, or other configuration parameters, or status and result information, may be passed within the data arguments of commands supported by the host file system.
  • While the examples in FIGS. 7 and 8 show the use of file write and read functions to encrypt and write to memory, and decrypt and read from memory, the write and read functions may still be used for operations that do not require encryption or decryption. For example, the file write function may also still be utilized to write an unencrypted file from a storage system. Similarly, a file read function may also be used to read an unencrypted file from a storage system. As explained above in the description of FIG. 6, data structures such as data tags may be used to identify the data that contains packetized instructions, status, and data payload.
  • FIG. 9 shows exemplary steps 900 for encrypting data using commands and data passed through a host file system, in accordance with an embodiment. The exemplary steps may be utilized by a system 100 in FIG. 1, if the file system 104 utilizes the disclosed embodiment of passing a packetized encryption instruction and data payload through the data parameter of a host file system function, from the memory file manager 102 to the memory control interface 112. At step 902, an encryption instruction is generated. Referring briefly back to FIG. 1, the memory file manager 102 may receive a request from an application to encrypt and write a file to non-volatile memory. The request may include other parameters, such as digital rights management (DRM) information specified by the application, which may, for example, define the encryption key and encryption algorithm that the encryption/decryption engine 114 will use. In another example, the memory file manager may also receive a request from an application to write a file to non-volatile memory without any encryption, in which case the encryption instruction formed will be a no-operation (NOOP), and the encryption/decryption engine 114 will simply pass through the data from the memory control interface 112 to the memory interface driver 116.
  • Returning back to FIG. 9, at step 904, the memory file manager may combine the encryption instruction with the data payload to be encrypted to form a packet. The data payload to be encrypted may be a portion or all of a data file to be written. The packet may optionally include data tags, checksums, CRC values, or other flags to identify it as comprising an encryption instruction and payload. At step 906, the packet is associated with a command supported by the host file system, such as a “write file” command, and transmitted to the host file system as at least a portion of the data argument of a command supported by the host file system. The host file system may receive a command and associated packet in step 906, and may perform file-level to logical block address (LBA) conversion, where a file is assigned to a plurality of available logical block addresses. In response to receiving the exemplary “write file” command, the host file system may also generate a logical block address write instruction, where a logical block address write instruction is associated with a packet. In another embodiment, the host file system may divide the packet into two or more fragments, and associate each fragment with a logical block address write instruction.
  • Control passes to step 908, where a logical block address write instruction and packet is received. In another embodiment, two or more logical block write instruction and packet fragment pairs are received, where each packet fragment is a portion of a packet. In this embodiment, the received packet fragments are cached until a complete packet can be reassembled from the packet fragments. The complete packet corresponds to the original packet received by the host file system and fragmented by the host file system. In step 910, the encryption instruction and data payload are extracted from the packet. If data tags, checksums, CRC values, or other flags were used to identify the packet as containing a data payload or instruction, then step 910 may extract these fields from the packet and evaluate the contents to determine or verify whether the received packet contains an encryption instruction and data payload, or is just a standard logical block write instruction without an encryption instruction embedded in the associated data argument.
  • Depending on the embodiment, all or a portion of the packet may be encrypted according to the encryption instruction. Similarly, only the encrypted results may be stored in a non-volatile memory, or the encrypted results may be stored with other information in the non-volatile memory.
  • In a first embodiment, only the data payload is encrypted and stored. Control passes to step 912, where the data payload is encrypted (or passed through) according to the extracted encryption instruction to form a processed data payload. Control then passes to step 914, where the processed data payload is written to the non-volatile memory, such as a removable memory card, according to the received logical block address write instruction.
  • In a second embodiment, only the data payload is encrypted, and the encrypted data payload is combined with some or all of the remaining unencrypted portions of the received packet and stored in the non-volatile memory. Control passes to step 912, where the data payload is encrypted (or passed through) according to the extracted encryption instruction to form a processed data payload. Control then passes to step 914, where the processed data payload is combined with some or all of the remaining packet contents such as the encryption instruction and data tags, checksums, flags, or CRC values. The combination is then written to the non-volatile memory according to the received logical block address write instruction.
  • In a third embodiment, the entire received packet, including the data payload, is encrypted and stored. Control passes to step 912, where the entire packet may be encrypted, including the data payload within the packet. Control then passes to step 914, where the encrypted packet, containing the encrypted data payload, is stored in the non-volatile memory according to the received logical block address write instruction.
  • Writing the entire packet to memory instead of just the encrypted data payload may allow the host file system's calculation of the amount of data written to memory to be consistent with the amount of data actually written to memory. Where the size of the data payload is significantly larger than the size of the encryption instruction and remaining packet contents, the storage overhead associated with storing the entire packet contents may be relatively insignificant. For purposes of illustrating the relative storage overhead associated with storing the entire packet contents, assume that a data payload is 64 kilobytes, and the data tags and encryption instruction is 16 bytes. The extra storage space to store the data tags and encryption instruction is minimal, relative to the storage space needed to store the data payload.
  • FIG. 10 shows exemplary steps 1000 for decrypting data and passing status through a host file system, in accordance with an embodiment. The exemplary steps may be utilized by a system 100 in FIG. 1, if the file system 104 utilizes the disclosed embodiment of passing a packetized data payload through the data parameter of a host file system function, from the memory control interface 112 to the memory file manager 102. At step 1002, a packet may be received from a non-volatile memory, such as a removable memory card, through the memory interface driver 116 of FIG. 1. Referring briefly back to FIG. 1, the packet may be received in response to a logical block address read command issued by the file system 104 to the memory device interface 110. The logical block address read command may be issued in response to a file level read command transmitted from the memory file manager 102 to the host file system 104. The memory file manager 102 generated the file level read command in response to a read request from an application process.
  • At step 1004, a decryption instruction is generated. Referring back to FIG. 8, the decryption instruction may be based on other configuration parameters passed to encryption/decryption engine 114, such as decryption instructions associated with a range of logical block addresses associated with a non-volatile memory device. The instruction may be based on unencrypted header information read from a file to be decrypted, and may be based on a determination that the logical block addresses being read out are associated with a file to be decrypted. In this embodiment, a decryption instruction is selected based on the logical block address associated with the received packet. In another embodiment, the packet contains additional unencrypted information used to form a decryption instruction, such as an index to a decryption key, or the information used to encrypt the data payload, such as the encryption instruction, if stored along with the data payload as described in an embodiment of step 914 of FIG. 9. The decryption instruction may also be based on one or more global configuration registers located within the memory device interface 110 of FIG. 1. The decryption instruction may be to pass through the received packet without decrypting it, also referred to as a no-operation or NOOP. Control passes to step 1006, where at least a portion of the received packet is decrypted (or passed through) according to the decryption instruction. In one embodiment, the data payload portion of the packet is decrypted. In another embodiment, the entire packet is decrypted.
  • In step 1008, at least a portion of the processed packet may be combined with other data such as status information or result flags to form a second packet. In step 1010, the second packet is passed to the host file system as the data argument of the response to a logical block address read command issued by the file system 104 of FIG. 1. The file system performs logical block address (LBA) to file-level conversion, where logical block address read results are associated with a file-level read command result. At step 1012, the memory file manager receives the result of the file-level read command from the file system 104 of FIG. 1. Control passes to step 1014, where the memory file manager 102 of FIG. 1 may extract the decrypted file data payload from the data argument of the returned result of the host file system read command, and may return the extracted decrypted data payload to an application process that requested the file-level read of encrypted data from the non-volatile memory. The memory file manager 102 may also extract status information or result flags from the received data as necessary to monitor the encryption/decryption engine 114 of FIG. 1.
  • The system and method described herein may be implemented within a variety of secure storage architectures. For example, a host file system may be utilized when performing encrypted/decrypted write and read operations to a TrustedFlash™ memory device from SanDisk Corporation of Milpitas, Calif., in accordance with TrustedFlash™ protocols. TrustedFlash™ refers in part to the creation, organization, and management of secure storage within a memory device. Another aspect of implementing a secure system in accordance with TrustedFlash™ protocols, where a system comprises a host and a memory device with the TrustedFlash™ architecture, is the transmission of data between the host and the memory device. In accordance with TrustedFlash™ protocols, some data transmitted between the host and the memory device must be encrypted, to prevent the data from being intercepted and read by an unauthorized party. The encrypted data may include digital content to be securely stored to or read from the TrustedFlash™ memory device, such as MP3 format audio files, picture files, and video files. When such data is being stored within a secure partition of a TrustedFlash™ memory device, or stored in a protected format within a public partition, the host may encrypt the data before transmission to the device, and the memory device may decrypt the data and perform other operations before storage. When reading such data stored in a secure partition of the TrustedFlash™ memory device, or stored in a protected format in a public partition of the TrustedFlash™ memory device, the memory device may encrypt the data before transmission to the host, and the host may decrypt the received data. The encryption and decryption key utilized to perform the encryption and decryption operations may be referred to as a session key, and may be generated and utilized by both the host and non-volatile memory device for one or more read and write accesses.
  • Some writes to a TrustedFlash™ memory device do not require encryption before transmission from the host to the memory device, and some of the data received from the memory device during a read operation is not encrypted. Examples of unencrypted data include File Allocation Table (FAT) data, directories, and data stored in an unprotected format within the non-secure areas of the memory device, such as the public storage partition of a TrustedFlash™ memory device. In contrast, other accesses to secure partitions of a TrustedFlash™ memory device, and accesses to write and read data in a protected format, may require encryption of data being written to the memory device, and decryption of the data read from the memory device. Returning to FIG. 1, a host file system may be utilized as file system 104. A memory file manager 102 may receive application requests to write to or read from the non-secure areas or the secure areas of a TrustedFlash™ memory. By implementing a method and system as suggested above, the memory file manager may form encryption instructions and data tags that may be transmitted through the file system 104 along with the data payload to be encrypted and stored, so that the memory device interface 110 may encrypt and write data to the TrustedFlash™ memory. Similarly, the memory file manager 102 may also receive requests to read secure areas of a TrustedFlash™ memory device, and receive status of the decryption occurring in memory device interface 110 through decryption parameters passed through the file system 104. The memory file manager 102 may also recover the data payload, data tags, and decryption status from the decrypted results returned from the memory device interface 110 through the file system 104. The memory file manager 102 may also provide a file to logical block address translation engine and direct interface to memory device interface 110, so that memory control interface 112 may associate file decryption commands with logical block addresses of sectors read out from a storage system.
  • The API of many host file systems supports passing of data, such as file data, as parameters through the host file system. Therefore, various suggested systems and methods capable of performing encrypted write and decrypted read operations with a storage system facilitate the use of a host file system. There are several advantages associated with utilizing a host file system within a system capable of performing encrypted/decrypted write and read operations to a non-volatile memory such as a removable memory card. A host file system may be optimized for the resource limitations or features of the host, and may include enhanced features such as multi-thread support, where multiple applications may access the file system in parallel through resource sharing and scheduling algorithms.
  • There is overhead such as executable code and memory space associated with implementing a file system. Thus, because the a system and method implemented as suggested above may eliminate the need for a specialized, additional file system in order to perform encrypted/decrypted write and read operations to a storage system, this overhead expense may be avoided. Finally, implementing a host file system and specialized file system in parallel may cause coordination issues, such as cached contents of one file system not being reflected in the other file system, and synchronization of the contents of both file systems. Thus, using a single host file system may eliminate the issues associated with utilizing two file systems in parallel.
  • Although the invention has been described with respect to various system and method embodiments, it will be understood that the invention is entitled to protection within the full scope of the appended claims.

Claims (68)

1. A method of encrypting data, the method comprising:
combining an encryption instruction with a payload of data to form a packet;
associating said packet with a command to form a command set;
passing said command set to a host file system process;
receiving a second command set from said host file system process, wherein said second command set comprises said packet associated with a second command;
extracting said encryption instruction and said payload of data from said packet in said second command set; and
encrypting at least said payload of data based on said encryption instruction, wherein said encrypting of at least said payload of data is independent of said host file system process.
2. The method of claim 1, wherein said host file system process comprises:
extracting said packet from said command set; and
associating a second command with at least said packet to form a second command set.
3. The method of claim 1, wherein said command is a host file system write instruction.
4. The method of claim 2, wherein said second command is a logical block address write instruction.
5. The method of claim 1, wherein said encryption instruction is an instruction not to encrypt.
6. A method of decrypting data, the method comprising:
receiving a first packet;
decrypting at least a portion of said first packet using at least a decryption instruction to form a decrypted packet;
forming a second packet comprising said decrypted packet;
passing said second packet to a host file system process;
receiving said third packet from said host file system process, wherein said third packet comprises said decrypted packet;
extracting a payload of data from said decrypted packet in said third packet.
7. The method of claim 6, wherein said first packet is received in response to a read command.
8. The method of claim 6, wherein said first packet is received from a memory card.
9. The method of claim 6, wherein said decryption instruction is determined utilizing a comparison of an address of said read command with an address range.
10. The method of claim 6, wherein said decryption instruction is determined utilizing a data field extracted from said first packet.
11. The method of claim 6, wherein said decryption instruction is an instruction not to decrypt.
12. The method of claim 6, wherein said second packet further comprises a plurality of status bits, and said third packet further comprises said plurality of status bits.
13. The method of claim 12, further comprising extracting said plurality of status bits from said third packet.
14. The method of claim 6, wherein said second packet is a response to a logical block address read command.
15. The method of claim 6, wherein said third packet is a response to a host file system read command.
16. A method of transferring data and encryption instructions through a host file system, the method comprising:
receiving a write command and payload of data from a host program;
determining a data verification field using at least said payload of data;
combining an encryption instruction, said data verification field, and said payload of data to form a packet;
generating a file system level write command based on said write command;
associating said packet with said file system level write command to form a file system level write command set;
passing a file system level write command set to a host file system process;
receiving an address-level write command set from said host file system process, wherein said address-level write command set is derived from said file system level write command set and comprises said packet associated with an address level command;
extracting said packet from said address-level write command set;
extracting said encryption instruction, said data verification field, and said payload of data from said packet;
verifying said payload of data using at least said data verification field;
encrypting at least said payload of data based on said encryption instruction, wherein said encrypting of at least said payload of data is independent of said host file system process;
generating a device level write command based on said address level command; and
associating at least said encrypted payload of data with a device level write command to form a device level write command set.
17. The method of claim 16, wherein said device level write command set is communicated to said memory card.
18. The method of claim 16, wherein said encryption instruction is encrypted based on said encryption instruction.
19. The method of claim 16, wherein said data verification field is encrypted using said encryption instruction.
20. The method of claim 16, wherein said device level write command set further comprises said device level write command associated with said encrypted instruction and said encrypted data verification field.
21. The method of claim 16, wherein said data verification field comprises a start address pointer and an end address pointer, wherein said start address pointer comprises the beginning address of said payload of data, and said end address pointer comprises the end address of said payload of data.
22. The method of claim 16, wherein said encryption instruction is an instruction not to encrypt.
23. The method of claim 16, wherein said data verification field further comprises a first data field containing a signature, and a second data field containing the address of the first data field.
24. The method of claim 23, wherein said signature comprises the address of said second data field.
25. The method of claim 16, wherein said data verification field further comprises checksum calculated using at least said payload.
26. A method of transferring data through a host file system, the method comprising:
receiving a packet;
decrypting at least a portion of said packet using an decryption instruction, to form a decrypted packet;
forming an address-level read result comprising at least a portion of said decrypted packet;
passing an address-level read result to a host file system process;
receiving a file system level read result from said host file system process, wherein said file system level read result is derived from said address-level read result; and
extracting a payload of data from said file system level read result.
27. The method of claim 26, wherein said packet is received from a memory card in response to a read command from the host.
28. The method of claim 26, wherein said determination comprises comparing the address of said read command with an address range.
29. The method of claim 26, wherein said determination comprises extracting a field from said packet and forming a decryption instruction derived from at least said field.
30. The method of claim 26, wherein said decryption instruction is an instruction not to decrypt.
31. The method of claim 26, wherein said address-level read result further comprises a plurality of status bits, and said file system level read result further comprises said plurality of status bits.
32. The method of claim 31, further comprising extracting said plurality of status bits from said file system level read result.
33. The method of claim 26, wherein said decryption instruction is determined utilizing a comparison of an address associated with said packet with an address range.
34. The method of claim 26, wherein said decryption instruction is determined utilizing a data field extracted from said packet.
35. A computer readable medium having stored thereon computer-executable instructions for performing the following steps:
combining an encryption instruction with a payload of data to form a packet;
associating said packet with a command to form a command set;
passing said command set to a host file system process;
receiving a second command set from said host file system process, wherein said second command set comprises said packet associated with a second command;
extracting said encryption instruction and said payload of data from said packet in said second command set; and
encrypting at least said payload of data based on said encryption instruction, wherein said encrypting of at least said payload of data is independent of said host file system process.
36. The computer readable medium of claim 35, wherein said host file system process comprises:
extracting said packet from said command set; and
associating a second command with at least said packet to form a second command set.
37. The computer readable medium of claim 35, wherein said command is a host file system write instruction.
38. The computer readable medium of claim 36, wherein said second command is a logical block address write instruction.
39. The computer readable medium of claim 35, wherein said encryption instruction is an instruction not to encrypt.
40. A computer readable medium having stored thereon computer-executable instructions for performing the following steps:
receiving a first packet;
decrypting at least a portion of said first packet using at least a decryption instruction to form a decrypted packet;
forming a second packet comprising said decrypted packet;
passing said second packet to a host file system process;
receiving said third packet from said host file system process, wherein said third packet comprises said decrypted packet;
extracting a payload of data from said decrypted packet in said third packet.
41. The computer readable medium of claim 41, wherein said first packet is received in response to a read command.
42. The computer readable medium of claim 41, wherein said first packet is received from a memory card.
43. The computer readable medium of claim 41, wherein said decryption instruction is determined utilizing a comparison of an address of said read command with an address range.
44. The computer readable medium of claim 41, wherein said decryption instruction is determined utilizing a data field extracted from said first packet.
45. The computer readable medium of claim 41, wherein said decryption instruction is an instruction not to decrypt.
46. The computer readable medium of claim 41, wherein said second packet further comprises a plurality of status bits, and said third packet further comprises said plurality of status bits.
47. The computer readable medium of claim 46, further comprising extracting said plurality of status bits from said third packet.
48. The computer readable medium of claim 41, wherein said second packet is a response to a logical block address read command.
49. The computer readable medium of claim 41, wherein said third packet is a response to a host file system read command.
50. A computer readable medium having stored thereon computer-executable instructions for performing the following steps:
receiving a write command and payload of data from a host program;
determining a data verification field using at least said payload of data;
combining an encryption instruction, said data verification field, and said payload of data to form a packet;
generating a file system level write command based on said write command;
associating said packet with said file system level write command to form a file system level write command set;
passing a file system level write command set to a host file system process;
receiving an address-level write command set from said host file system process, wherein said address-level write command set is derived from said file system level write command set and comprises said packet associated with an address level command;
extracting said packet from said address-level write command set;
extracting said encryption instruction, said data verification field, and said payload of data from said packet;
verifying said payload of data using at least said data verification field;
encrypting at least said payload of data based on said encryption instruction, wherein said encrypting of at least said payload of data is independent of said host file system process;
generating a device level write command based on said address level command; and
associating at least said encrypted payload of data with a device level write command to form a device level write command set.
51. The computer readable medium of claim 50, wherein said device level write command set is communicated to said memory card.
52. The computer readable medium of claim 50, wherein said encryption instruction is encrypted based on said encryption instruction.
53. The computer readable medium of claim 50, wherein said data verification field is encrypted using said encryption instruction.
54. The computer readable medium of claim 50, wherein said device level write command set further comprises said device level write command associated with said encrypted instruction and said encrypted data verification field.
55. The computer readable medium of claim 50, wherein said data verification field comprises a start address pointer and an end address pointer, wherein said start address pointer comprises the beginning address of said payload of data, and said end address pointer comprises the end address of said payload of data.
56. The computer readable medium of claim 50, wherein said encryption instruction is an instruction not to encrypt.
57. The computer readable medium of claim 50, wherein said data verification field further comprises a first data field containing a signature, and a second data field containing the address of the first data field.
58. The computer readable medium of claim 57, wherein said signature comprises the address of said second data field.
59. The computer readable medium of claim 50, wherein said data verification field further comprises checksum calculated using at least said payload.
60. A computer readable medium having stored thereon computer-executable instructions for performing the following steps:
receiving a packet;
decrypting at least a portion of said packet using an decryption instruction, to form a decrypted packet;
forming an address-level read result comprising at least a portion of said decrypted packet;
passing an address-level read result to a host file system process;
receiving a file system level read result from said host file system process, wherein said file system level read result is derived from said address-level read result; and
extracting a payload of data from said file system level read result.
61. The computer readable medium of claim 60, wherein said packet is received from a memory card in response to a read command from the host.
62. The computer readable medium of claim 60, wherein said determination comprises comparing the address of said read command with an address range.
63. The computer readable medium of claim 60, wherein said determination comprises extracting a field from said packet and forming a decryption instruction derived from at least said field.
64. The computer readable medium of claim 60, wherein said decryption instruction is an instruction not to decrypt.
65. The computer readable medium of claim 60, wherein said address-level read result further comprises a plurality of status bits, and said file system level read result further comprises said plurality of status bits.
66. The computer readable medium of claim 65, further comprising extracting said plurality of status bits from said file system level read result.
67. The computer readable medium of claim 60, wherein said decryption instruction is determined utilizing a comparison of an address associated with said packet with an address range.
68. The computer readable medium of claim 60, wherein said decryption instruction is determined utilizing a data field extracted from said packet.
US11/967,622 2007-12-31 2007-12-31 Method And System For Transferring Data And Instructions Through A Host File System Abandoned US20090172393A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US11/967,622 US20090172393A1 (en) 2007-12-31 2007-12-31 Method And System For Transferring Data And Instructions Through A Host File System
US14/459,964 US9811678B2 (en) 2007-12-31 2014-08-14 Method and system for transferring data and instructions through a host file system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/967,622 US20090172393A1 (en) 2007-12-31 2007-12-31 Method And System For Transferring Data And Instructions Through A Host File System

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/459,964 Division US9811678B2 (en) 2007-12-31 2014-08-14 Method and system for transferring data and instructions through a host file system

Publications (1)

Publication Number Publication Date
US20090172393A1 true US20090172393A1 (en) 2009-07-02

Family

ID=40800090

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/967,622 Abandoned US20090172393A1 (en) 2007-12-31 2007-12-31 Method And System For Transferring Data And Instructions Through A Host File System
US14/459,964 Active 2028-09-10 US9811678B2 (en) 2007-12-31 2014-08-14 Method and system for transferring data and instructions through a host file system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/459,964 Active 2028-09-10 US9811678B2 (en) 2007-12-31 2014-08-14 Method and system for transferring data and instructions through a host file system

Country Status (1)

Country Link
US (2) US20090172393A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090292903A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor providing isolated timers and counters for execution of secure code
US20090293130A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
US20100241816A1 (en) * 2009-03-19 2010-09-23 Qualcolmm Incorporated Optimized transfer of packets in a resource constrained operating environment
US20110051787A1 (en) * 2009-08-28 2011-03-03 Apple Inc. Electronic device instructions provided using radio signals
US20110145563A1 (en) * 2009-12-14 2011-06-16 Michael Thomas Kain Secured file-based application programming interface
US20120159185A1 (en) * 2010-12-21 2012-06-21 Ncr Corporation Secure Digital Download Storage Device
EP2512096A1 (en) * 2011-04-14 2012-10-17 Unisys Corporation File-based application programming interface providing selectable security features
US20130124851A1 (en) * 2009-12-14 2013-05-16 Michael T. Kain File-based application programming interface providing selectable security features
US20130124852A1 (en) * 2011-11-11 2013-05-16 Michael T. Kain File-based application programming interface providing ssh-secured communication
WO2013090331A1 (en) * 2011-12-13 2013-06-20 Unisys Corporation Interfaces for combining calls in an emulated environment
US20130238844A1 (en) * 2008-04-11 2013-09-12 Junzhi Wang Method and system for accessing a storage system with multiple file systems
WO2013143911A3 (en) * 2012-03-30 2013-11-21 Giesecke & Devrient Gmbh Method for encrypting data on a storage medium
CN105430108A (en) * 2014-08-25 2016-03-23 腾讯科技(深圳)有限公司 Test environment accessing method and proxy server
US9811678B2 (en) 2007-12-31 2017-11-07 Sandisk Technologies Llc Method and system for transferring data and instructions through a host file system
US9846784B1 (en) * 2013-02-26 2017-12-19 Rockwell Collins, Inc. Multi-level storage system and method
US9934244B2 (en) 2010-08-13 2018-04-03 At&T Intellectual Property I, L.P. System and method for file format management
CN109800209A (en) * 2019-02-18 2019-05-24 重庆邮电大学 A kind of parallel analytic method of intelligent substation SCD file
US20220123932A1 (en) * 2020-10-19 2022-04-21 Western Digital Technologies, Inc. Data storage device encryption
US11416624B2 (en) * 2019-06-29 2022-08-16 Intel Corporation Cryptographic computing using encrypted base addresses and used in multi-tenant environments
US11575504B2 (en) 2019-06-29 2023-02-07 Intel Corporation Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
US11580035B2 (en) 2020-12-26 2023-02-14 Intel Corporation Fine-grained stack protection using cryptographic computing
US11669625B2 (en) 2020-12-26 2023-06-06 Intel Corporation Data type based cryptographic computing

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9742738B2 (en) * 2014-06-17 2017-08-22 Cisco Technology, Inc. Method and apparatus for enforcing storage encryption for data stored in a cloud
US10834081B2 (en) 2017-10-19 2020-11-10 International Business Machines Corporation Secure access management for tools within a secure environment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141681A (en) * 1997-03-07 2000-10-31 Advanced Micro Devices, Inc. Method of and apparatus for transferring and interpreting a data package
US6418486B1 (en) * 1999-07-28 2002-07-09 Intel Corporation Device handling system and method
US6434535B1 (en) * 1998-11-13 2002-08-13 Iomega Corporation System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same
US6581094B1 (en) * 1999-11-02 2003-06-17 Sun Microsystems, Inc. Apparatus and method for identifying a digital device based on the device's uniform device descriptor file that specifies the attributes of the device in a XML document in a networked environment
US20030115147A1 (en) * 2001-08-27 2003-06-19 Feldman Timothy R. Secure access method and system
US20040015574A1 (en) * 2001-09-24 2004-01-22 Teleware, Inc. Multimedia communication management system with external system management
US20040172538A1 (en) * 2002-12-18 2004-09-02 International Business Machines Corporation Information processing with data storage
US7036020B2 (en) * 2001-07-25 2006-04-25 Antique Books, Inc Methods and systems for promoting security in a computer system employing attached storage devices
US20060242068A1 (en) * 2004-12-21 2006-10-26 Fabrice Jogand-Coulomb Method forversatile content control
US20070043667A1 (en) * 2005-09-08 2007-02-22 Bahman Qawami Method for secure storage and delivery of media content
US7215771B1 (en) * 2000-06-30 2007-05-08 Western Digital Ventures, Inc. Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network
US20070136509A1 (en) * 2005-12-09 2007-06-14 Msystems Ltd. Method For Flash-Memory Management
US20070218945A1 (en) * 2006-03-20 2007-09-20 Msystems Ltd. Device and method for controlling usage of a memory card
US20070259691A1 (en) * 2006-05-04 2007-11-08 Msystems Ltd. High-capacity SIM storage control
US7493656B2 (en) * 2005-06-02 2009-02-17 Seagate Technology Llc Drive security session manager
US7661000B2 (en) * 2004-12-07 2010-02-09 Sony Corporation Information processing device, information recording medium and information processing method, and computer program

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004070499A (en) * 2002-08-02 2004-03-04 Fujitsu Ltd Memory device, and enciphering/decoding method
WO2009070430A2 (en) 2007-11-08 2009-06-04 Suridx, Inc. Apparatus and methods for providing scalable, dynamic, individualized credential services using mobile telephones
US20090172393A1 (en) 2007-12-31 2009-07-02 Haluk Kent Tanik Method And System For Transferring Data And Instructions Through A Host File System

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141681A (en) * 1997-03-07 2000-10-31 Advanced Micro Devices, Inc. Method of and apparatus for transferring and interpreting a data package
US6434535B1 (en) * 1998-11-13 2002-08-13 Iomega Corporation System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same
US6418486B1 (en) * 1999-07-28 2002-07-09 Intel Corporation Device handling system and method
US6581094B1 (en) * 1999-11-02 2003-06-17 Sun Microsystems, Inc. Apparatus and method for identifying a digital device based on the device's uniform device descriptor file that specifies the attributes of the device in a XML document in a networked environment
US7215771B1 (en) * 2000-06-30 2007-05-08 Western Digital Ventures, Inc. Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network
US7036020B2 (en) * 2001-07-25 2006-04-25 Antique Books, Inc Methods and systems for promoting security in a computer system employing attached storage devices
US7426747B2 (en) * 2001-07-25 2008-09-16 Antique Books, Inc. Methods and systems for promoting security in a computer system employing attached storage devices
US7110982B2 (en) * 2001-08-27 2006-09-19 Dphi Acquisitions, Inc. Secure access method and system
US20030115147A1 (en) * 2001-08-27 2003-06-19 Feldman Timothy R. Secure access method and system
US20040015574A1 (en) * 2001-09-24 2004-01-22 Teleware, Inc. Multimedia communication management system with external system management
US20040172538A1 (en) * 2002-12-18 2004-09-02 International Business Machines Corporation Information processing with data storage
US7661000B2 (en) * 2004-12-07 2010-02-09 Sony Corporation Information processing device, information recording medium and information processing method, and computer program
US20060242068A1 (en) * 2004-12-21 2006-10-26 Fabrice Jogand-Coulomb Method forversatile content control
US7493656B2 (en) * 2005-06-02 2009-02-17 Seagate Technology Llc Drive security session manager
US20070043667A1 (en) * 2005-09-08 2007-02-22 Bahman Qawami Method for secure storage and delivery of media content
US20070136509A1 (en) * 2005-12-09 2007-06-14 Msystems Ltd. Method For Flash-Memory Management
US20070218945A1 (en) * 2006-03-20 2007-09-20 Msystems Ltd. Device and method for controlling usage of a memory card
US20070259691A1 (en) * 2006-05-04 2007-11-08 Msystems Ltd. High-capacity SIM storage control

Cited By (56)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9811678B2 (en) 2007-12-31 2017-11-07 Sandisk Technologies Llc Method and system for transferring data and instructions through a host file system
US10402313B2 (en) * 2008-04-11 2019-09-03 Sandisk Technologies Llc Method and system for accessing a storage system with multiple file systems
US20130238844A1 (en) * 2008-04-11 2013-09-12 Junzhi Wang Method and system for accessing a storage system with multiple file systems
US20090292903A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor providing isolated timers and counters for execution of secure code
US20090292904A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US20090292902A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Apparatus and method for managing a microprocessor providing for a secure execution mode
US20090290712A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc On-die cryptographic apparatus in a secure microprocessor
US20090292931A1 (en) * 2008-05-24 2009-11-26 Via Technology, Inc Apparatus and method for isolating a secure execution mode in a microprocessor
US20090293130A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
US20090292853A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor
US20090292894A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor having internal secure memory
US20090293129A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Termination of secure execution mode in a microprocessor providing for execution of secure code
US20090292929A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Initialization of a microprocessor providing for execution of secure code
US8762687B2 (en) 2008-05-24 2014-06-24 Via Technologies, Inc. Microprocessor providing isolated timers and counters for execution of secure code
US8793803B2 (en) 2008-05-24 2014-07-29 Via Technologies, Inc. Termination of secure execution mode in a microprocessor providing for execution of secure code
US20090293132A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor apparatus for secure on-die real-time clock
US20090292901A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor apparatus and method for persistent enablement of a secure execution mode
US8209763B2 (en) 2008-05-24 2012-06-26 Via Technologies, Inc. Processor with non-volatile mode enable register entering secure execution mode and encrypting secure program for storage in secure memory via private bus
US9002014B2 (en) 2008-05-24 2015-04-07 Via Technologies, Inc. On-die cryptographic apparatus in a secure microprocessor
US8370641B2 (en) 2008-05-24 2013-02-05 Via Technologies, Inc. Initialization of a microprocessor providing for execution of secure code
US8978132B2 (en) 2008-05-24 2015-03-10 Via Technologies, Inc. Apparatus and method for managing a microprocessor providing for a secure execution mode
US8910276B2 (en) 2008-05-24 2014-12-09 Via Technologies, Inc. Apparatus and method for precluding execution of certain instructions in a secure execution mode microprocessor
US8838924B2 (en) 2008-05-24 2014-09-16 Via Technologies, Inc. Microprocessor having internal secure memory
US8522354B2 (en) 2008-05-24 2013-08-27 Via Technologies, Inc. Microprocessor apparatus for secure on-die real-time clock
US20090292893A1 (en) * 2008-05-24 2009-11-26 Via Technologies, Inc Microprocessor having secure non-volatile storage access
US8819839B2 (en) 2008-05-24 2014-08-26 Via Technologies, Inc. Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
US8607034B2 (en) 2008-05-24 2013-12-10 Via Technologies, Inc. Apparatus and method for disabling a microprocessor that provides for a secure execution mode
US8615799B2 (en) 2008-05-24 2013-12-24 Via Technologies, Inc. Microprocessor having secure non-volatile storage access
US8612693B2 (en) * 2009-03-19 2013-12-17 Qualcomm Incorporated Optimized transfer of packets in a resource constrained operating environment
US20100241816A1 (en) * 2009-03-19 2010-09-23 Qualcolmm Incorporated Optimized transfer of packets in a resource constrained operating environment
US20110051787A1 (en) * 2009-08-28 2011-03-03 Apple Inc. Electronic device instructions provided using radio signals
US8761683B2 (en) * 2009-08-28 2014-06-24 Apple Inc. Electronic device instructions provided using radio signals
US20110145563A1 (en) * 2009-12-14 2011-06-16 Michael Thomas Kain Secured file-based application programming interface
US20130124851A1 (en) * 2009-12-14 2013-05-16 Michael T. Kain File-based application programming interface providing selectable security features
AU2010337204B2 (en) * 2009-12-14 2016-06-09 Unisys Corporation Secured file-based application programming interface
US10713222B2 (en) 2010-08-13 2020-07-14 At&T Intellectual Property I, L.P. Conversion of data for operating systems
US11436199B2 (en) 2010-08-13 2022-09-06 At&T Intellectual Property I, L.P. Conversion of data for operating systems
US9934244B2 (en) 2010-08-13 2018-04-03 At&T Intellectual Property I, L.P. System and method for file format management
US20120159185A1 (en) * 2010-12-21 2012-06-21 Ncr Corporation Secure Digital Download Storage Device
US8826409B2 (en) * 2010-12-21 2014-09-02 Ncr Corporation Secure digital download storage device
EP2512096A1 (en) * 2011-04-14 2012-10-17 Unisys Corporation File-based application programming interface providing selectable security features
US20130124852A1 (en) * 2011-11-11 2013-05-16 Michael T. Kain File-based application programming interface providing ssh-secured communication
WO2013090331A1 (en) * 2011-12-13 2013-06-20 Unisys Corporation Interfaces for combining calls in an emulated environment
WO2013143911A3 (en) * 2012-03-30 2013-11-21 Giesecke & Devrient Gmbh Method for encrypting data on a storage medium
US9846784B1 (en) * 2013-02-26 2017-12-19 Rockwell Collins, Inc. Multi-level storage system and method
CN105430108A (en) * 2014-08-25 2016-03-23 腾讯科技(深圳)有限公司 Test environment accessing method and proxy server
CN109800209A (en) * 2019-02-18 2019-05-24 重庆邮电大学 A kind of parallel analytic method of intelligent substation SCD file
US11416624B2 (en) * 2019-06-29 2022-08-16 Intel Corporation Cryptographic computing using encrypted base addresses and used in multi-tenant environments
US11575504B2 (en) 2019-06-29 2023-02-07 Intel Corporation Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
US11580234B2 (en) 2019-06-29 2023-02-14 Intel Corporation Implicit integrity for cryptographic computing
US11620391B2 (en) 2019-06-29 2023-04-04 Intel Corporation Data encryption based on immutable pointers
US11768946B2 (en) 2019-06-29 2023-09-26 Intel Corporation Low memory overhead heap management for memory tagging
US11829488B2 (en) 2019-06-29 2023-11-28 Intel Corporation Pointer based data encryption
US20220123932A1 (en) * 2020-10-19 2022-04-21 Western Digital Technologies, Inc. Data storage device encryption
US11580035B2 (en) 2020-12-26 2023-02-14 Intel Corporation Fine-grained stack protection using cryptographic computing
US11669625B2 (en) 2020-12-26 2023-06-06 Intel Corporation Data type based cryptographic computing

Also Published As

Publication number Publication date
US9811678B2 (en) 2017-11-07
US20140359285A1 (en) 2014-12-04

Similar Documents

Publication Publication Date Title
US9811678B2 (en) Method and system for transferring data and instructions through a host file system
KR102254256B1 (en) Anti-rollback version upgrade in secured memory chip
US8832456B1 (en) Data leakage prevention system, method, and computer program product for preventing a predefined type of operation on predetermined data
US8423592B2 (en) Method and system for accessing a storage system with multiple file systems
US8417866B2 (en) Media card command pass through methods
KR101457451B1 (en) Encrypted transport solid­state disk controller
US8054972B2 (en) Encryption processor of memory card and method for writing and reading data using the same
CN111930676B (en) Method, device, system and storage medium for communication among multiple processors
US20120005557A1 (en) Virtual copy and virtual write of data in a storage device
US8601358B2 (en) Buffer transfer check on variable length data
EP2350908A1 (en) Method and apparatus for implementing secure and selectively deniable file storage
US9298593B2 (en) Testing a software interface for a streaming hardware device
EP3248135B1 (en) File encryption support for fat file systems
CN105468543B (en) Method and device for protecting sensitive information
US10091213B2 (en) Systems and methods to provide secure storage
TW201227297A (en) Method and system for hijacking writes to a non-volatile memory
US8898807B2 (en) Data protecting method, mobile communication device, and memory storage device
WO2019168878A1 (en) Method and apparatus for data encryption using standardized data storage and retrieval protocol
US20070011096A1 (en) Method and apparatus for managing DRM rights object in low-performance storage device
US11210406B2 (en) Encrypting system level data structures
Benadjila et al. Secure storage—Confidentiality and authentication
US20060288019A1 (en) Flexible data file format
US8140792B2 (en) Indirectly-accessed, hardware-affine channel storage in transaction-oriented DMA-intensive environments
CN114116710A (en) Data processing method, device and equipment based on block chain and storage medium
CN116932422A (en) Data processing method and device

Legal Events

Date Code Title Description
AS Assignment

Owner name: SANDISK CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TANIK, HALUK KENT;CHANG, ROBERT CHIN-TSE;YUAN, PO;AND OTHERS;REEL/FRAME:020640/0261

Effective date: 20080222

AS Assignment

Owner name: SANDISK TECHNOLOGIES INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SANDISK CORPORATION;REEL/FRAME:026278/0412

Effective date: 20110404

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: SANDISK TECHNOLOGIES LLC, TEXAS

Free format text: CHANGE OF NAME;ASSIGNOR:SANDISK TECHNOLOGIES INC;REEL/FRAME:038809/0672

Effective date: 20160516