US20100088527A1 - Memory protection system and method - Google Patents

Memory protection system and method Download PDF

Info

Publication number
US20100088527A1
US20100088527A1 US12/516,352 US51635207A US2010088527A1 US 20100088527 A1 US20100088527 A1 US 20100088527A1 US 51635207 A US51635207 A US 51635207A US 2010088527 A1 US2010088527 A1 US 2010088527A1
Authority
US
United States
Prior art keywords
private key
internal private
solid
user input
state memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/516,352
Inventor
Simon B. Johnson
Lev M. Bolotin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Clevx LLC
Original Assignee
Clevx LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Clevx LLC filed Critical Clevx LLC
Priority to US12/516,352 priority Critical patent/US20100088527A1/en
Publication of US20100088527A1 publication Critical patent/US20100088527A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • A63F13/02
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/90Constructional details or arrangements of video game devices not provided for in groups A63F13/20 or A63F13/25, e.g. housing, wiring, connections or cabinets
    • A63F13/98Accessories, i.e. detachable arrangements optional for the use of the video game device, e.g. grip supports of game controllers
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/20Input arrangements for video game devices

Definitions

  • the present invention relates generally to integrated circuits devices, and more particularly to memory devices.
  • a critical issue with almost all aspects of computer use and mobile electronic device use, including portable memory storage devices is security. This also applies to security in any electronic products, such as portable memory devices (e.g., Universal Serial Bus memory drives), camcorders, digital cameras, iPODs, MP3 players, smart phones, palm computers, gaming devices, etc., having important information in memory. Whether it is logging into an email account, protecting personal medical or financial info, family pictures, etc. or accessing bank information, information must be supplied to gain access to view personal data. Much money and effort has been applied to guarding personal, corporate, and government information from hackers and others.
  • portable memory devices e.g., Universal Serial Bus memory drives
  • camcorders digital cameras
  • iPODs digital cameras
  • MP3 players digital cameras
  • smart phones palm computers
  • gaming devices etc.
  • Encryption is used to hide sensitive information. It is a complex process used to hide information stored on various types of storage media such as solid-state non-volatile memory devices (e.g. Flash drives), hard drives, and other media.
  • solid-state non-volatile memory devices e.g. Flash drives
  • hard drives e.g., hard drives, and other media.
  • Software encryption is typically performed on a host computer prior to saving data to a mass storage device.
  • Software encryption consumes system resources and, thus, requires high performance hardware to reduce system computing burden. Since the data is always accessible (although encrypted), it can eventually be hacked.
  • Encryption can also be performed on the storage media itself. This reduces the impact on computer resources and the possibility of a successful hacking attempt.
  • the downside is that it adds expense to the mass storage module.
  • the present invention provides a memory protection method including: providing a user input key; and comparing the user input key with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.
  • the present invention provides a memory protection system including a user input key storage; an internal private key storage; a comparator having integral connections with the user input key storage and the internal private key storage; and a solid-state memory having an integral connection with the comparator for allowing access to data therein when the contents of the internal private key storage and the user input key storage match.
  • FIG. 1 is a view of a memory protection system (MPS) in accordance with an embodiment of the present invention
  • FIG. 2 is a view of a MPS in accordance with a further embodiment of the present invention.
  • FIG. 3 is a view of a challenge-response security system incorporating a MPS in accordance with a further embodiment of the present invention
  • FIG. 4 is a flow-chart showing initial operations of a MPS upon arrival from a factory
  • FIG. 5 is a flow chart depicting how a MPS may be programmed to require that the user input key be provided within a certain number of attempts;
  • FIG. 6 is a flow chart showing the steps to change an internal private key of a MPS
  • FIG. 7 is a view of an embodiment of the present invention incorporated in a universal serial bus (USB) Flash drive;
  • FIG. 8 is a flow chart of a memory protection method in accordance with an embodiment of the present invention.
  • system is defined to mean a device or method for practicing embodiments of the present invention and includes both device circuits and method steps.
  • Solid-state memory any type of memory implemented in a semiconductor material including, without limitation, NAND Flash, NOR Flash, EPROM, NVRAM, RAM, etc.
  • Memory security circuit an integrated circuit for protecting a solid-state memory in accordance with an embodiment of the present invention.
  • Protected memory chip a solid-state memory and a memory security circuit on the same integrated circuit die.
  • Protected memory package a solid-state memory chip and a memory security circuit chip in a single integrated circuit package.
  • MPS a Memory Protection System, which can be a protected memory chip, protected memory package, or other protected memory configuration.
  • Key a binary code of arbitrary length.
  • User Input Key a key that originates from a user, which may be a direct translation of what was input or may be a derivation thereof.
  • Internal private key a key kept internally in the memory security circuit and not accessible from outside the integrated circuit except under specified conditions.
  • Integral Connection an electrical connection to a solid-state memory that cannot be broken without impacting the functionality of a
  • the MPS 100 includes a user input key input 102 with an integral connection to a user input key storage 104 for storing a user input key.
  • the MPS 100 also includes an internal private key storage 106 for storing an internal private key.
  • the user input key storage 104 and the internal private key storage 106 have integral connections to a compare circuit 108 for comparing the contents of the user input key storage 104 and the internal private key storage 106 .
  • the compare circuit 108 has an integral connection to a solid-state memory 112 .
  • the compare circuit 108 When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112 .
  • the solid-state memory 112 When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112 .
  • the solid-state memory 112 When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112 .
  • the solid-state memory 112 When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112 .
  • the solid-state memory 112 When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112
  • the user input key storage 104 , the internal private key storage 106 , and the compare circuit 108 form a memory security circuit 116 .
  • the solid-state memory 112 and the memory security circuit 116 are manufactured on the same integrated circuit chip and cannot be physically separated without destroying the functionality of the solid-state memory 112 .
  • the memory security circuit 116 provides a “security gate” that seals access to the internal contents of the solid-state memory 112 .
  • the contents of the solid-state memory 112 are not accessible or “visible” so the contents of the solid-state memory 112 do not need to be encrypted (the contents are invisible by “design”).
  • the solid-state memory 112 hides data from view. If one is unable to view data, hacking is not possible.
  • the MPS 100 restricts access to its contents until the memory security circuit 116 unlocks access with the correct interaction. If the memory security circuit 116 is unable to supply the memory enable output 110 because the correct interaction or user input key is not provided, the contents of the solid-state memory 112 remains locked and hidden from view.
  • the compare circuit 108 makes comparisons using the internal private key in the internal private key storage 106 , if the internal private key storage 106 is blank, the solid-state memory 112 is accessible without a need to supply a user input key at the input 102 .
  • erasing the MPS 100 will also erase its internal private key in the internal private key storage 106 . Then, when the MPS 100 powers up, the user input key storage 104 is initialized to an equivalent erased state. At this point, the MPS 100 behaves as any other unprotected memory device that can be freely written and read to as long as there's no internal private key stored in the internal private key storage 106 .
  • an internal private key to the internal private key storage 106 is possible only under the special situation when the MPS 100 is unlocked or is blank.
  • the MPS 100 will lock and restrict further access to the solid-state memory 112 until a user input key is provided to the user input key storage 104 that matches the internal private key storage 106 .
  • the solid-state memory 112 is encapsulated and made tamper proof from the outside world.
  • the input 102 and the output 114 provide for simple access to the MPS 100 , such that it can be used in other devices.
  • a secure solid-state memory can be easily added to a cell phone without the added burden of implementing complex encryption algorithms by simply replacing the cell phone memory with the MPS 100 .
  • the MPS 100 and not the system of the cell phone, imposes security.
  • the MPS 200 has input/output ( 110 ) ports 202 with an integral connection to an I/O control circuit 204 .
  • the I/O control circuit 204 has an integral connection to a user input key register 206 for storing a user input key ( 206 ) and an internal private key register 208 for storing an internal private key ( 208 ).
  • the user input key register 206 and the internal private key register 208 have an integral connection to a logic circuit, such as an XOR gate 210 .
  • the XOR gate 210 has an integral connection to a control circuit 212 .
  • the I/O ports 202 , the user input key register 206 , the internal private key register 208 , the logic circuit 210 , and the control circuit 212 are integral components in a memory security circuit 213 having integral connections to a solid-state memory 216 .
  • the control circuit 212 provides an enable/disable signal 214 to the solid-state memory 216 having an integral connection to the 1 / 0 control circuit 204 .
  • the solid-state memory 216 only provides data along a data path 218 to the I/O control circuit 204 when enabled.
  • the MPS 200 may be integrated using an existing NAND Flash memory.
  • the XOR gate 210 compares the user input key and the internal private key in which the result is zero. Other compare operations can also be used to determine a match.
  • Both the user input key and the internal private key can be input over the I/O ports 202 using the same mechanism.
  • a command e.g., write-sector
  • a command is then followed with the appropriate data.
  • the commands “write-user-key” and “write-private-key” are created to perform the operations through the I/O ports 202 .
  • the “write-user-key” will operate at any time, but the “write-private-key” will work only when the MPS 200 is unlocked.
  • User input and internal private keys can be set through separate I/O ports 202 with their own unique timing requirements.
  • the MPS 200 is locked by removing power or by clearing the user input key register 206 .
  • a user cannot read the internal private key register 208 , and the internal private key in the internal private key register 208 is saved across power cycles. The user cannot set a new internal private key until the MPS 200 is unlocked.
  • the user input key and the internal private key can be of any length and structure, but longer keys are more secure.
  • Erasing the MPS 200 will also erase the internal private key register 208 . This is especially true where the solid-state memory 216 has private and public zones and may be set up to have multiple private zones with multiple corresponding internal private keys to allow access to those multiple private zones.
  • a “challenge-response” is an authentication technique in which an individual is prompted (the “challenge”) to provide some private information (the “response”).
  • Most security systems that rely on smart cards are based on challenge-response.
  • a user is given a code (the “challenge”), which the user enters into the smart card.
  • the smart card displays a new code (the “response”) that the user can present to gain access to the security system.
  • the challenge-response security system 300 includes a memory controller 304 , such as a universal serial bus (USB) controller.
  • the memory controller 304 issues a challenge 306 and the user provides a response 308 to the memory controller 304 .
  • the challenge-response may be conducted directly with the user (supplied with an input mechanism or biometric input) or indirectly through a computer.
  • a computer may request a pass-code that is then passed to the memory controller 304 .
  • the memory controller 304 processes the pass-code sent from the computer to create a user input key 310 that is then sent on to the MPS 302 .
  • a correct user input key 310 will unlock the MPS 302 and allow free access to its internal solid-state memory.
  • a challenge-response may also take the form of a fingerprint or other biometric information or an electromechanical input mechanism (e.g., PIN input).
  • FIG. 4 therein is shown a flow chart 400 showing initial operations of the MPS upon arrival from a factory.
  • the flow chart 400 starts at the factory with an internal private key being erased in a block 402 .
  • the user On delivery to a user, the user applies power in a block 404 . After power is applied in the block 404 , a user input key is erased in a block 406 . This causes the MPS 200 to be unlocked in a block 408 .
  • the MPS With the new private key being accepted in the block 410 , the MPS is now locked in a block 414 , and it is necessary to perform an unlock sequence in a block 416 to perform further operations on the MPS.
  • the MPS is shipped from a factory in the erased (unlocked) state with a blank internal private key. Since the user input key gets erased on power up, full access is granted for the first power up. In other words, since both the user input key and the internal private key have been erased and match, full access is given to the erased solid-state memory:
  • This feature is also useful in being able to recover the use of the solid-state memory if a PIN password is forgotten. By erasing the solid-state memory, all stored information is secure in being erased along with the previously set private key being erased.
  • the solid-state memory is fully functional to be able to accept a new private key and new information.
  • FIG. 5 therein is shown a flow chart 500 showing how a MPS may be programmed to require the user input key being provided within a certain number of attempts.
  • Power is applied in a block 502 , which causes the user input key to be erased in a block 504 .
  • the user input key is then compared with the internal private key in a decision block 508 . If the user input key matches the internal private key, the solid-state memory is enabled in a block 510 , the number of failed attempts is cleared in a block 512 , and full access is permitted to the solid-state memory in a block 514 .
  • the solid-state memory is not enabled in a block 516 and the number of failed attempts is incremented in a block 518 . A check is then made to see if the number of failed attempts has been exceeded in a decision block 520 .
  • the user is allowed to supply another user input key in a block 522 for another comparison of the new user input key with the internal private key in the decision block 508 .
  • the solid-state memory is erased in a block 524 . Once the solid-state memory is erased in the block 524 , full access to the erased solid-state memory is permitted in the block 514 .
  • the user may decide to input a user key in the block 522 that does not match the private key.
  • a user is temporarily not using the device in which the MPS is incorporated or attached, an unauthorized user is prevented from accessing the solid-state memory.
  • FIG. 6 therein is shown a flow chart 600 which shows the steps in changing an internal private key of a MPS.
  • Power is applied in a block 602 and the user input key is erased in a block 604 .
  • the new user input key is written to the MPS in a block 606 .
  • the MPS remains locked in a block 610 and the new private key is rejected in a block 612 .
  • the MPS is unlocked in a block 616 .
  • a new private key may be written to the MPS in a block 618 .
  • the MPS remains locked in the block 610 , the new private key is rejected in the block 612 .
  • the MPS is unlocked in the block 616 , the new private key is accepted in a block 620 .
  • the MPS then is locked in a block 622 and the unlock sequence must be performed in a block 624 to access the solid-state memory.
  • USB Flash drive 700 therein is shown an embodiment of the present invention incorporated in a USB Flash drive 700 .
  • the USB Flash drive 700 would be used with a laptop or other computer.
  • the USB Flash drive 700 includes a USB connector 706 , which would be plugged into a USB port in the computer 702 .
  • a pass-code 708 would be sent from the computer 702 or a pass-code 726 from the input mechanism 724 to a memory controller 712 in the USB Flash drive 700 .
  • the pass-code 708 or the pass-code 726 is translated in a key translator 714 to provide a user input key 716 to a MPS 718 .
  • the MPS 718 enabled data would pass bi-directionally across a data link 720 to the memory controller 712 and bi-directionally on the USB connector 706 across a data link 722 .
  • An input mechanism 724 can be incorporated in the USB Flash drive 700 for authenticating the user.
  • the input mechanism 724 can include an electro-mechanical combination input, biometric input (fingerprint or iris scan), or any other input.
  • the method 800 includes providing a user input key in a block 802 ; and comparing the user input key with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom in a block 804 .

Abstract

A memory protection method is provided with a user input key: The user input key is compared with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.

Description

    TECHNICAL FIELD
  • The present invention relates generally to integrated circuits devices, and more particularly to memory devices.
  • BACKGROUND ART
  • A critical issue with almost all aspects of computer use and mobile electronic device use, including portable memory storage devices is security. This also applies to security in any electronic products, such as portable memory devices (e.g., Universal Serial Bus memory drives), camcorders, digital cameras, iPODs, MP3 players, smart phones, palm computers, gaming devices, etc., having important information in memory. Whether it is logging into an email account, protecting personal medical or financial info, family pictures, etc. or accessing bank information, information must be supplied to gain access to view personal data. Much money and effort has been applied to guarding personal, corporate, and government information from hackers and others.
  • Encryption is used to hide sensitive information. It is a complex process used to hide information stored on various types of storage media such as solid-state non-volatile memory devices (e.g. Flash drives), hard drives, and other media.
  • Software encryption is typically performed on a host computer prior to saving data to a mass storage device. Software encryption consumes system resources and, thus, requires high performance hardware to reduce system computing burden. Since the data is always accessible (although encrypted), it can eventually be hacked.
  • Encryption can also be performed on the storage media itself. This reduces the impact on computer resources and the possibility of a successful hacking attempt. The downside is that it adds expense to the mass storage module.
  • However, all of these systems have problems in being inconvenient to use.
  • Solutions to these problems have been long sought but prior developments have not taught or suggested any solutions and, thus, solutions to these problems have long eluded those skilled in the art.
  • DISCLOSURE OF THE INVENTION
  • The present invention provides a memory protection method including: providing a user input key; and comparing the user input key with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.
  • The present invention provides a memory protection system including a user input key storage; an internal private key storage; a comparator having integral connections with the user input key storage and the internal private key storage; and a solid-state memory having an integral connection with the comparator for allowing access to data therein when the contents of the internal private key storage and the user input key storage match.
  • Certain embodiments of the invention have other aspects in addition to or in place of those mentioned above. The aspects will become apparent to those skilled in the art from a reading of the following detailed description when taken with reference to the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a view of a memory protection system (MPS) in accordance with an embodiment of the present invention;
  • FIG. 2 is a view of a MPS in accordance with a further embodiment of the present invention;
  • FIG. 3 is a view of a challenge-response security system incorporating a MPS in accordance with a further embodiment of the present invention;
  • FIG. 4 is a flow-chart showing initial operations of a MPS upon arrival from a factory;
  • FIG. 5 is a flow chart depicting how a MPS may be programmed to require that the user input key be provided within a certain number of attempts;
  • FIG. 6 is a flow chart showing the steps to change an internal private key of a MPS; FIG. 7 is a view of an embodiment of the present invention incorporated in a universal serial bus (USB) Flash drive; and
  • FIG. 8 is a flow chart of a memory protection method in accordance with an embodiment of the present invention.
  • BEST MODE FOR CARRYING OUT THE INVENTION
  • The following embodiments are described in sufficient detail to enable those skilled in the art to make and use the invention. It is to be understood that other embodiments would be evident based on the present disclosure, and that system, process, or mechanical changes may be made without departing from the scope of the present invention.
  • In the following description, numerous specific details are given to provide a thorough understanding of the invention. However, it will be apparent that the invention may be practiced without these specific details. In order to avoid obscuring the present invention, some well-known circuits, system configurations, and process steps are not disclosed in detail.
  • Likewise, the drawings showing embodiments of the system are semi-diagrammatic and not to scale and, particularly, some of the dimensions are for the clarity of presentation and are shown exaggerated in the drawing FIGs.
  • The term “system” is defined to mean a device or method for practicing embodiments of the present invention and includes both device circuits and method steps.
  • In the present disclosure, the following definitions are used:
  • Solid-state memory—any type of memory implemented in a semiconductor material including, without limitation, NAND Flash, NOR Flash, EPROM, NVRAM, RAM, etc.
    Memory security circuit—an integrated circuit for protecting a solid-state memory in accordance with an embodiment of the present invention.
    Protected memory chip—a solid-state memory and a memory security circuit on the same integrated circuit die.
    Protected memory package—a solid-state memory chip and a memory security circuit chip in a single integrated circuit package.
    MPS—a Memory Protection System, which can be a protected memory chip, protected memory package, or other protected memory configuration.
    Key—a binary code of arbitrary length.
    User Input Key—a key that originates from a user, which may be a direct translation of what was input or may be a derivation thereof.
    Internal private key—a key kept internally in the memory security circuit and not accessible from outside the integrated circuit except under specified conditions.
    Integral Connection—an electrical connection to a solid-state memory that cannot be broken without impacting the functionality of a solid-state memory.
  • Referring now to FIG. 1, therein is shown a memory protection system (MPS) 100 in accordance with an embodiment of the present invention. The MPS 100 includes a user input key input 102 with an integral connection to a user input key storage 104 for storing a user input key. The MPS 100 also includes an internal private key storage 106 for storing an internal private key. The user input key storage 104 and the internal private key storage 106 have integral connections to a compare circuit 108 for comparing the contents of the user input key storage 104 and the internal private key storage 106. The compare circuit 108 has an integral connection to a solid-state memory 112.
  • When the contents of the user input key storage 104 and the internal private key storage 106 match, the compare circuit 108 provides a memory enable output 110 to the solid-state memory 112. When the memory enable output 110 is received by the solid-state memory 112, the solid-state memory 112 will provide its contents to an integrally connected memory output 114. When the contents do not match, the memory enable output 110 is not provided and the solid-state memory 112 is not accessible or locked.
  • The user input key storage 104, the internal private key storage 106, and the compare circuit 108 form a memory security circuit 116.
  • The solid-state memory 112 and the memory security circuit 116 are manufactured on the same integrated circuit chip and cannot be physically separated without destroying the functionality of the solid-state memory 112. Thus, the memory security circuit 116 provides a “security gate” that seals access to the internal contents of the solid-state memory 112. The contents of the solid-state memory 112 are not accessible or “visible” so the contents of the solid-state memory 112 do not need to be encrypted (the contents are invisible by “design”).
  • The solid-state memory 112 hides data from view. If one is unable to view data, hacking is not possible. The MPS 100 restricts access to its contents until the memory security circuit 116 unlocks access with the correct interaction. If the memory security circuit 116 is unable to supply the memory enable output 110 because the correct interaction or user input key is not provided, the contents of the solid-state memory 112 remains locked and hidden from view.
  • Since the compare circuit 108 makes comparisons using the internal private key in the internal private key storage 106, if the internal private key storage 106 is blank, the solid-state memory 112 is accessible without a need to supply a user input key at the input 102.
  • Thus, erasing the MPS 100 will also erase its internal private key in the internal private key storage 106. Then, when the MPS 100 powers up, the user input key storage 104 is initialized to an equivalent erased state. At this point, the MPS 100 behaves as any other unprotected memory device that can be freely written and read to as long as there's no internal private key stored in the internal private key storage 106.
  • Writing an internal private key to the internal private key storage 106 is possible only under the special situation when the MPS 100 is unlocked or is blank. When an internal private key is entered, the MPS 100 will lock and restrict further access to the solid-state memory 112 until a user input key is provided to the user input key storage 104 that matches the internal private key storage 106. With a protected memory chip or protected memory package in the MPS 100, the solid-state memory 112 is encapsulated and made tamper proof from the outside world.
  • The input 102 and the output 114 provide for simple access to the MPS 100, such that it can be used in other devices. For example, a secure solid-state memory can be easily added to a cell phone without the added burden of implementing complex encryption algorithms by simply replacing the cell phone memory with the MPS 100. The MPS 100, and not the system of the cell phone, imposes security.
  • Referring now to FIG. 2, therein is shown a MPS 200 in accordance with a further embodiment of the present invention. The MPS 200 has input/output (110) ports 202 with an integral connection to an I/O control circuit 204. The I/O control circuit 204 has an integral connection to a user input key register 206 for storing a user input key (206) and an internal private key register 208 for storing an internal private key (208). The user input key register 206 and the internal private key register 208 have an integral connection to a logic circuit, such as an XOR gate 210. The XOR gate 210 has an integral connection to a control circuit 212.
  • The I/O ports 202, the user input key register 206, the internal private key register 208, the logic circuit 210, and the control circuit 212 are integral components in a memory security circuit 213 having integral connections to a solid-state memory 216.
  • The control circuit 212 provides an enable/disable signal 214 to the solid-state memory 216 having an integral connection to the 1/0 control circuit 204. The solid-state memory 216 only provides data along a data path 218 to the I/O control circuit 204 when enabled.
  • The MPS 200 may be integrated using an existing NAND Flash memory. The XOR gate 210 compares the user input key and the internal private key in which the result is zero. Other compare operations can also be used to determine a match.
  • Both the user input key and the internal private key can be input over the I/O ports 202 using the same mechanism. For example, for a NAND Flash memory, an operation is preceded with a command (e.g., write-sector). A command is then followed with the appropriate data. In this case, the commands “write-user-key” and “write-private-key” are created to perform the operations through the I/O ports 202. The “write-user-key” will operate at any time, but the “write-private-key” will work only when the MPS 200 is unlocked.
  • The above mechanism does not have to be followed in the strictest sense. User input and internal private keys can be set through separate I/O ports 202 with their own unique timing requirements. There are many ways to write data to internal registers, which may exist in the peripheral circuitry of solid-state memories. In the MPS 200, the MPS 200 is locked by removing power or by clearing the user input key register 206. A user cannot read the internal private key register 208, and the internal private key in the internal private key register 208 is saved across power cycles. The user cannot set a new internal private key until the MPS 200 is unlocked.
  • The user input key and the internal private key can be of any length and structure, but longer keys are more secure.
  • Erasing the MPS 200 will also erase the internal private key register 208. This is especially true where the solid-state memory 216 has private and public zones and may be set up to have multiple private zones with multiple corresponding internal private keys to allow access to those multiple private zones.
  • Referring now to FIG. 3, therein is shown a challenge-response security system 300 incorporating a MPS 302 in accordance with a further embodiment of the present invention. A “challenge-response” is an authentication technique in which an individual is prompted (the “challenge”) to provide some private information (the “response”). Most security systems that rely on smart cards are based on challenge-response. A user is given a code (the “challenge”), which the user enters into the smart card. The smart card then displays a new code (the “response”) that the user can present to gain access to the security system.
  • The challenge-response security system 300 includes a memory controller 304, such as a universal serial bus (USB) controller. The memory controller 304 issues a challenge 306 and the user provides a response 308 to the memory controller 304. The challenge-response may be conducted directly with the user (supplied with an input mechanism or biometric input) or indirectly through a computer. For example, a computer may request a pass-code that is then passed to the memory controller 304. The memory controller 304 processes the pass-code sent from the computer to create a user input key 310 that is then sent on to the MPS 302. A correct user input key 310 will unlock the MPS 302 and allow free access to its internal solid-state memory. A challenge-response may also take the form of a fingerprint or other biometric information or an electromechanical input mechanism (e.g., PIN input).
  • Referring now to FIG. 4, therein is shown a flow chart 400 showing initial operations of the MPS upon arrival from a factory. The flow chart 400 starts at the factory with an internal private key being erased in a block 402.
  • On delivery to a user, the user applies power in a block 404. After power is applied in the block 404, a user input key is erased in a block 406. This causes the MPS 200 to be unlocked in a block 408.
  • The user then writes a private key to the MPS in a block 412 and the new private key is accepted in a block 410. With the new private key being accepted in the block 410, the MPS is now locked in a block 414, and it is necessary to perform an unlock sequence in a block 416 to perform further operations on the MPS.
  • If the user writes a blank private key, e.g., no new private key, to the MPS in the block 412, this erases the internal private key and the MPS is not locked in the block 414. This means that the solid-state memory is unlocked across power cycles and the unlock sequence does not have to be performed in the block 416.
  • The MPS is shipped from a factory in the erased (unlocked) state with a blank internal private key. Since the user input key gets erased on power up, full access is granted for the first power up. In other words, since both the user input key and the internal private key have been erased and match, full access is given to the erased solid-state memory:
  • This feature is also useful in being able to recover the use of the solid-state memory if a PIN password is forgotten. By erasing the solid-state memory, all stored information is secure in being erased along with the previously set private key being erased. The solid-state memory is fully functional to be able to accept a new private key and new information.
  • Referring now to FIG. 5, therein is shown a flow chart 500 showing how a MPS may be programmed to require the user input key being provided within a certain number of attempts.
  • Power is applied in a block 502, which causes the user input key to be erased in a block 504. The user input key is then compared with the internal private key in a decision block 508. If the user input key matches the internal private key, the solid-state memory is enabled in a block 510, the number of failed attempts is cleared in a block 512, and full access is permitted to the solid-state memory in a block 514.
  • However, if the user input key does not match the internal private key in the decision block 508, the solid-state memory is not enabled in a block 516 and the number of failed attempts is incremented in a block 518. A check is then made to see if the number of failed attempts has been exceeded in a decision block 520.
  • If the failed attempts have not exceeded a preset limit, the user is allowed to supply another user input key in a block 522 for another comparison of the new user input key with the internal private key in the decision block 508.
  • If the failed attempts exceed the limit in the decision block 520, the solid-state memory is erased in a block 524. Once the solid-state memory is erased in the block 524, full access to the erased solid-state memory is permitted in the block 514.
  • If a 64-bit key (4,294,967,294 values) is used to lock the MPS and three unsuccessful attempts are permitted prior to erasure, a hacker has a 6.9×10−8% chance of accessing the memory by trial and error.
  • If the user decides to keep the solid-state memory locked after power is applied in the block 502, the user may decide to input a user key in the block 522 that does not match the private key. Thus, when a user is temporarily not using the device in which the MPS is incorporated or attached, an unauthorized user is prevented from accessing the solid-state memory.
  • Referring now to FIG. 6, therein is shown a flow chart 600 which shows the steps in changing an internal private key of a MPS.
  • Power is applied in a block 602 and the user input key is erased in a block 604. The new user input key is written to the MPS in a block 606.
  • If the user input key is different from the internal private key in a decision block 608, the MPS remains locked in a block 610 and the new private key is rejected in a block 612.
  • If the user input key is the same as the internal private key in the decision block 608, the MPS is unlocked in a block 616. At this time, a new private key may be written to the MPS in a block 618. If the MPS remains locked in the block 610, the new private key is rejected in the block 612. However, if the MPS is unlocked in the block 616, the new private key is accepted in a block 620. The MPS then is locked in a block 622 and the unlock sequence must be performed in a block 624 to access the solid-state memory.
  • Referring now to FIG. 7, therein is shown an embodiment of the present invention incorporated in a USB Flash drive 700. The USB Flash drive 700 would be used with a laptop or other computer. The USB Flash drive 700 includes a USB connector 706, which would be plugged into a USB port in the computer 702.
  • A pass-code 708 would be sent from the computer 702 or a pass-code 726 from the input mechanism 724 to a memory controller 712 in the USB Flash drive 700. The pass-code 708 or the pass-code 726 is translated in a key translator 714 to provide a user input key 716 to a MPS 718. The MPS 718 enabled data would pass bi-directionally across a data link 720 to the memory controller 712 and bi-directionally on the USB connector 706 across a data link 722.
  • An input mechanism 724 can be incorporated in the USB Flash drive 700 for authenticating the user. The input mechanism 724 can include an electro-mechanical combination input, biometric input (fingerprint or iris scan), or any other input.
  • Referring now to FIG. 8, therein is shown a flow chart of a memory protection method 800 in accordance with an embodiment of the present invention. The method 800 includes providing a user input key in a block 802; and comparing the user input key with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom in a block 804.
  • While the invention has been described in conjunction with a specific best mode, it is to be understood that many alternatives, modifications, and variations will be apparent to those skilled in the art in light of the aforegoing description. Accordingly, it is intended to embrace all such alternatives, modifications, and variations that fall within the scope of the included claims. All matters hithertofore set forth herein or shown in the accompanying drawings are to be interpreted in an illustrative and non-limiting sense.

Claims (20)

1. A memory protection method comprising:
providing a user input key; and
comparing the user input key with an internal private key in a memory security circuit having an integral connection with a solid-state memory for controlling data flow therefrom.
2. The method as claimed in claim 1 further comprising:
erasing the internal private key to keep the solid-state memory unlocked.
3. The method as claimed in claim 1 further comprising:
providing a new user input key different from the internal private key to keep the solid-state memory locked.
4. The method as claimed in claim 1 further comprising:
erasing the internal private key;
writing a new internal private key; and
accessing the solid-state memory with the new internal private key.
5. The method as claimed in claim 1 further comprising:
inputting an incorrect user input key a predetermined number of times; and
erasing the solid-state memory when the predetermined number of times is exceeded.
6. A memory protection method comprising:
inputting and outputting a plurality of input and output signals through an input/output control circuit to provide a user input key, an internal private key, and data;
storing the user input key and the internal private key in storage having an integral connection to the input/output control circuit;
comparing the user input key and the internal private key in a logic circuit having an integral connection to the storage;
controlling a control circuit when the user input key and the internal private key match to output an enable signal to a solid-state memory having an integral connection to the control circuit; and
outputting the data to the input/output control circuit from the solid-state memory in response to the enable signal.
7. The method as claimed in claim 6 further comprising:
erasing the internal private key to keep the solid-state memory unlocked when power is turned off and on.
8. The method as claimed in claim 6 further comprising:
writing a new user input key different from the internal private key to keep the solid-state memory locked while power is on.
9. The method as claimed in claim 6 further comprising:
erasing the internal private key;
erasing the solid-state memory and the user input key when the internal private key is erased;
writing a new internal private key; and
accessing the solid-state memory with the new internal private key.
10. The method as claimed in claim 6 further comprising:
inputting an incorrect user input key a predetermined number of times;
erasing the solid-state memory when the predetermined number of times is exceeded;
writing a new internal private key; and
accessing the solid-state memory with the new internal private key.
11. A memory protection system comprising:
a user input key storage;
an internal private key storage;
a comparator having integral connections with the user input key storage and the internal private key storage; and
a solid-state memory having an integral connection with the comparator for allowing access to data therein when the contents of the internal private key storage and the user input key storage match.
12. The system as claimed in claim 11 further comprising:
circuitry for erasing the internal private key to keep the solid-state memory unlocked.
13. The system as claimed in claim 11 further comprising:
circuitry for providing a new user input key different from the internal private key to keep the solid-state memory locked.
14. The system as claimed in claim 11 further comprising:
circuitry for erasing the internal private key;
circuitry for writing a new internal private key; and
circuitry for accessing the solid-state memory with the new internal private key.
15. The system as claimed in claim 11 further comprising:
circuitry for inputting an incorrect user input key a predetermined number of times; and
circuitry for erasing the solid-state memory when the predetermined number of times is exceeded.
16. A memory protection system comprising:
an input/output control circuit for inputting and outputting a plurality of input and output signals to provide a user input key, an internal private key, and data;
registers for storing the user input key and the internal private key, the registers having an integral connection to the input/output control circuit;
a logic circuit for comparing the user input key and the internal private key, the logic circuit having an integral connection to the registers;
a control circuit for outputting an enable signal when the user input key and the internal private key match, the control circuit having an integral connection to the logic circuit; and
a solid-state memory for outputting the data to the input/output control circuit in response to the enable signal, the solid-state memory having an integral connection to the control circuit.
17. The system as claimed in claim 16 further comprising:
circuitry for erasing the internal private key to keep the solid-state memory) unlocked when power is turned off and on.
18. The system as claimed in claim 16 further comprising:
circuitry for writing a new user input key different from the internal private key to keep the solid-state memory locked while power is on.
19. The system as claimed in claim 16 further comprising:
circuitry for erasing the internal private key;
circuitry for erasing the solid-state memory and the user input key when the internal private key is erased;
circuitry for writing a new internal private key; and
circuitry for accessing the solid-state memory with the new internal private key.
20. The system as claimed in claim 16 further comprising:
circuitry for inputting an incorrect user input key a predetermined number of times;
circuitry for erasing the solid-state memory when the predetermined number of times is exceeded;
circuitry for writing a new internal private key; and
accessing the solid-state memory with the new internal private key.
US12/516,352 2006-11-25 2007-11-26 Memory protection system and method Abandoned US20100088527A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/516,352 US20100088527A1 (en) 2006-11-25 2007-11-26 Memory protection system and method

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US86718606P 2006-11-25 2006-11-25
US12/516,352 US20100088527A1 (en) 2006-11-25 2007-11-26 Memory protection system and method
PCT/US2007/085526 WO2008127433A2 (en) 2006-11-25 2007-11-26 Memory protection system

Publications (1)

Publication Number Publication Date
US20100088527A1 true US20100088527A1 (en) 2010-04-08

Family

ID=39864551

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/891,827 Expired - Fee Related US7762553B2 (en) 2006-11-25 2007-08-13 Form-fitting electronic game controller cover
US12/516,352 Abandoned US20100088527A1 (en) 2006-11-25 2007-11-26 Memory protection system and method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/891,827 Expired - Fee Related US7762553B2 (en) 2006-11-25 2007-08-13 Form-fitting electronic game controller cover

Country Status (3)

Country Link
US (2) US7762553B2 (en)
TW (1) TW200837771A (en)
WO (1) WO2008127433A2 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140286491A1 (en) * 2011-08-08 2014-09-25 Mikoh Corporation Radio frequency identification technology incorporating cryptographics
US20160203325A1 (en) * 2013-08-22 2016-07-14 Siemens Ag Osterreich Method for protecting an integrated circuit against unauthorized access
US20160323114A1 (en) * 2015-05-03 2016-11-03 Ronald Francis Sulpizio, JR. Temporal key generation and pki gateway
US9612977B2 (en) * 2011-07-15 2017-04-04 Standard Microsystems Corporation Method and system for controlling access to embedded nonvolatile memories
US9875194B2 (en) 2006-10-10 2018-01-23 Datalocker Inc. Security system for external data storage apparatus and control method thereof
US20180039437A1 (en) * 2016-08-02 2018-02-08 Samsung Electronics Co., Ltd. Method of executing data scrubbing inside a smart storage device
US20190080099A1 (en) * 2015-03-30 2019-03-14 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US11088832B2 (en) 2020-01-09 2021-08-10 Western Digital Technologies, Inc. Secure logging of data storage device events
US11163442B2 (en) 2019-12-08 2021-11-02 Western Digital Technologies, Inc. Self-formatting data storage device
US11265152B2 (en) 2020-01-09 2022-03-01 Western Digital Technologies, Inc. Enrolment of pre-authorized device
US11281576B2 (en) * 2019-06-13 2022-03-22 Melexis Technologies Nv Memory device
US11334677B2 (en) * 2020-01-09 2022-05-17 Western Digital Technologies, Inc. Multi-role unlocking of a data storage device
US11366933B2 (en) 2019-12-08 2022-06-21 Western Digital Technologies, Inc. Multi-device unlocking of a data storage device
US11469885B2 (en) 2020-01-09 2022-10-11 Western Digital Technologies, Inc. Remote grant of access to locked data storage device
US11556665B2 (en) 2019-12-08 2023-01-17 Western Digital Technologies, Inc. Unlocking a data storage device
US11582607B2 (en) 2020-07-10 2023-02-14 Western Digital Technologies, Inc. Wireless security protocol
US11606206B2 (en) 2020-01-09 2023-03-14 Western Digital Technologies, Inc. Recovery key for unlocking a data storage device
US11831752B2 (en) 2020-01-09 2023-11-28 Western Digital Technologies, Inc. Initializing a data storage device with a manager device
US11882434B2 (en) 2020-07-09 2024-01-23 Western Digital Technologies, Inc. Method and device for covertly communicating state changes

Families Citing this family (115)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE602005013392D1 (en) * 2004-08-20 2009-04-30 Aaron B Sternberg CONTROL DEVICES FROM SHOCK ABSORBENT MATERIAL
AU2007215294B2 (en) * 2006-02-10 2012-03-15 Lego A/S Configurable manual controller
US7762553B2 (en) * 2006-11-25 2010-07-27 Harris Curtis J Form-fitting electronic game controller cover
US20090137315A1 (en) * 2007-11-28 2009-05-28 Shing-Wai David Wu Game console remote controller integration
USD787606S1 (en) * 2008-02-15 2017-05-23 Evil Controllers LLC Game controller
USD786870S1 (en) * 2008-02-15 2017-05-16 Adam Wesley Coe Game controller
US8568233B2 (en) * 2009-04-23 2013-10-29 Performance Designed Products Llc Video game controller attachment apparatus
WO2010135287A2 (en) * 2009-05-19 2010-11-25 Icontrol Enterprises, Llc Device for enhancing operation of a game controller and method of using the same
US8964364B2 (en) 2012-11-23 2015-02-24 Blackberry Limited Carrying case for controlling a mobile device
US20140374457A1 (en) * 2012-12-19 2014-12-25 Brian Piccolo Adjustable game controller neck supporter
USD723625S1 (en) * 2013-08-27 2015-03-03 Steelseries Aps Gaming device
US9421472B2 (en) * 2014-01-03 2016-08-23 Jonathan Blake Buller Holder for game controller
USD733802S1 (en) * 2014-01-24 2015-07-07 Ironburg Inventions Ltd. Controller back panel
USD748734S1 (en) * 2014-01-27 2016-02-02 Chatham Capital Management Iv, Llc Controller hatch cover
USD736322S1 (en) * 2014-04-24 2015-08-11 Nyko Technologies, Inc. Game controller power source
USD740825S1 (en) * 2014-07-29 2015-10-13 Valve Corporation Controller
USD736860S1 (en) * 2014-08-25 2015-08-18 Steven Paul Lovoi Game controller grip
USD736762S1 (en) * 2014-08-25 2015-08-18 Steven Paul Lovoi Game controller grip
USD744045S1 (en) * 2014-10-13 2015-11-24 Jonathan Blake Buller Skin cover for a game controller
USD767682S1 (en) * 2015-01-19 2016-09-27 Valve Corporation Controller
USD754128S1 (en) * 2015-01-19 2016-04-19 Valve Corporation Controller
USD760840S1 (en) * 2015-04-22 2016-07-05 Microsoft Corporation Game controller grip
USD767037S1 (en) * 2015-04-22 2016-09-20 Microsoft Corporation Game controller grip
US10463979B2 (en) 2015-06-09 2019-11-05 Collective Minds Gaming Co. Ltd. Adapter for attachment to a game controller
USD766376S1 (en) 2015-06-12 2016-09-13 Microsoft Corporation Controller with removable directional pad
USD767684S1 (en) 2015-06-12 2016-09-27 Microsoft Corporation Controller with a removable directional pad
USD773561S1 (en) * 2015-06-12 2016-12-06 Microsoft Corporation Controller with removable thumbstick attachment
USD768784S1 (en) * 2015-06-12 2016-10-11 Microsoft Corporation Controller with removable thumbstick attachment
USD772987S1 (en) 2015-06-12 2016-11-29 Microsoft Corporation Controller
USD767038S1 (en) * 2015-06-12 2016-09-20 Microsoft Corporation Controller with removable thumbstick attachment
USD772988S1 (en) 2015-06-12 2016-11-29 Microsoft Corporation Controller
USD774143S1 (en) 2015-06-12 2016-12-13 Microsoft Corporation Thumbstick attachment for a controller
USD774596S1 (en) 2015-06-15 2016-12-20 Microsoft Corporation Controller
USD762781S1 (en) * 2015-06-30 2016-08-02 KontrolFreek, LLC Game controller thumbstick cover
USD762780S1 (en) * 2015-06-30 2016-08-02 KontrolFreek, LLC Game controller thumbstick cover
USD765789S1 (en) * 2015-07-14 2016-09-06 Jonathan Blake Buller Skin cover for a game controller
USD769982S1 (en) * 2015-07-20 2016-10-25 Yoshinori Konishi Remote control for gaming
USD765793S1 (en) * 2015-08-04 2016-09-06 Microsoft Corporation Controller
USD765791S1 (en) * 2015-08-04 2016-09-06 Microsoft Corporation Controller
USD765792S1 (en) * 2015-08-04 2016-09-06 Microsoft Corporation Controller
USD765790S1 (en) * 2015-08-04 2016-09-06 Microsoft Corporation Controller
USD768786S1 (en) * 2015-08-27 2016-10-11 Amazon Technologies, Inc. Game controller
DE102015115235B3 (en) * 2015-09-10 2016-07-21 K. Deniz Wannenmacher Removable cover for a control unit
USD786979S1 (en) * 2015-10-22 2017-05-16 Jonathan Blake Buller Skin cover for an electronic device
USD797196S1 (en) * 2015-10-22 2017-09-12 Jonathan Blake Buller Skin cover for an electronic device
USD777842S1 (en) * 2015-10-22 2017-01-31 Jonathan Blake Buller Skin cover for an Xbox one console
USD762782S1 (en) * 2015-10-28 2016-08-02 KontrolFreek, LLC Ergonomic controller thumbstick
USD784988S1 (en) 2015-10-29 2017-04-25 Microsoft Corporation Controller with removeable thumbstick attachment
USD785624S1 (en) 2015-10-29 2017-05-02 Microsoft Corporation Battery compartment for a controller
USD784335S1 (en) 2015-10-29 2017-04-18 Microsoft Corporation Controller with removeable paddles
USD794026S1 (en) 2015-10-29 2017-08-08 Microsoft Corporation Set of paddles for a controller
USD784989S1 (en) 2015-10-29 2017-04-25 Microsoft Corporation Controller
USD784986S1 (en) 2015-10-29 2017-04-25 Microsoft Corporation Thumbstick for a controller
USD794024S1 (en) 2015-10-29 2017-08-08 Microsoft Corporation Directional pad for a controller
USD777168S1 (en) 2016-01-20 2017-01-24 Sammy Hill Video game controller analog stick cap
USD791880S1 (en) 2016-02-26 2017-07-11 Microsoft Corporation Controller
USD810831S1 (en) * 2016-03-02 2018-02-20 Collective Minds Gaming Co. Ltd Adapter for a video game controller
USD786251S1 (en) * 2016-03-10 2017-05-09 Microsoft Corporation Controller
USD788853S1 (en) * 2016-03-10 2017-06-06 Microsoft Corporation Controller
USD803837S1 (en) * 2016-03-31 2017-11-28 Wipro Limited Handheld device
USD786980S1 (en) * 2016-04-25 2017-05-16 Performance Designed Products Llc Faceplate for a videogame controller
USD786981S1 (en) * 2016-04-25 2017-05-16 Performance Designed Products Llc Faceplate for a videogame controller
USD799599S1 (en) 2016-05-13 2017-10-10 Microsoft Corporation Controller
USD794717S1 (en) 2016-05-13 2017-08-15 Microsoft Corporation Controller
USD794129S1 (en) 2016-05-13 2017-08-08 Microsoft Corporation Controller
USD795350S1 (en) 2016-06-09 2017-08-22 Microsoft Corporation Controller
USD795351S1 (en) 2016-06-09 2017-08-22 Microsoft Corporation Controller
USD795960S1 (en) 2016-07-14 2017-08-29 Microsoft Corporation Controller
USD797197S1 (en) 2016-08-11 2017-09-12 Jonathan Blake Buller Skin cover for a game controller
USD819641S1 (en) * 2016-08-30 2018-06-05 Nintendo Co., Ltd. Controller for computer
JP1581313S (en) * 2016-11-08 2017-07-18
USD800223S1 (en) * 2016-11-17 2017-10-17 Dreamgear, Llc Controller trigger grip
USD805518S1 (en) * 2016-12-01 2017-12-19 Gameco, Inc. Gaming system controller with mount
USD806078S1 (en) * 2016-12-01 2017-12-26 Gameco, Inc. Gaming system controller
US10201747B2 (en) 2016-12-06 2019-02-12 KontrolFreek, LLC Multilayered ergonomic grip for handheld controllers
USD808466S1 (en) * 2017-01-12 2018-01-23 Performance Designed Products Llc Grip set for a video game controller
USD810202S1 (en) * 2017-01-12 2018-02-13 Performance Designed Products Llc Grip set for a video game controller
USD816773S1 (en) 2017-04-06 2018-05-01 Microsoft Corporation Controller
USD816170S1 (en) 2017-04-06 2018-04-24 Microsoft Corporation Controller
USD825005S1 (en) 2017-04-06 2018-08-07 Microsoft Corporation Controller
USD815211S1 (en) 2017-04-12 2018-04-10 Jonathan Blake Buller Skin cover for a game controller
USD847902S1 (en) 2017-04-18 2019-05-07 Jonathan Blake Buller Remote control cover
USD847264S1 (en) 2017-04-18 2019-04-30 Jonathan Blake Buller Remote control cover
USD866664S1 (en) 2017-06-12 2019-11-12 Performance Designed Products Llc Face plate for a video game controller
USD867458S1 (en) 2017-06-12 2019-11-19 Performance Designed Products Llc Face plate for a video game controller
USD864302S1 (en) 2017-07-13 2019-10-22 Performance Designed Products Llc Face plate for a video game controller
USD845395S1 (en) 2017-07-13 2019-04-09 Performance Designed Products Llc Face plate for a video game controller
USD849147S1 (en) 2017-07-13 2019-05-21 Performance Designed Products LL Face plate for a video game controller
JP6503536B1 (en) * 2017-07-19 2019-04-17 康二 釜 Operation support tool for game controller and operation support method
USD810203S1 (en) 2017-08-04 2018-02-13 Jonathan Blake Buller Skin cover for a gaming console
USD837891S1 (en) 2017-08-04 2019-01-08 Jonathan Blake Buller Skin cover set for a gaming console and console docking station
US10974156B2 (en) * 2018-05-17 2021-04-13 Cherri Ann Fletcher Frictional and sweat absorbing video game controller sleeve
USD830365S1 (en) 2018-06-05 2018-10-09 Jonathan Blake Buller Skin cover for an electronic device
USD872183S1 (en) 2018-06-08 2020-01-07 Microsoft Corporation Controller
USD872184S1 (en) * 2018-07-31 2020-01-07 Microsoft Corporation Controller
USD934343S1 (en) 2019-01-15 2021-10-26 Collective Minds Gaming Co. Ltd. Video game controller accessory
US11200778B1 (en) 2019-01-26 2021-12-14 Gameco Llc Gaming system having an interactive attract mode for promoting game use
USD936146S1 (en) 2019-04-04 2021-11-16 Microsoft Corporation Game controller
USD934344S1 (en) * 2019-04-04 2021-10-26 Microsoft Corporation Controller
USD884799S1 (en) 2019-07-20 2020-05-19 Marketing Instincts Skin cover set for a gaming console
USD905168S1 (en) * 2019-08-30 2020-12-15 Microsoft Corporation Game controller
USD905169S1 (en) * 2019-08-30 2020-12-15 Microsoft Corporation Game controller
USD963660S1 (en) 2019-11-21 2022-09-13 Razer (Asia Pacific) Pte., Ltd Skin cover set for a game controller
USD920341S1 (en) 2019-11-21 2021-05-25 Marketing Instincts Inc. Skin cover set for a game controller
USD919009S1 (en) 2019-11-21 2021-05-11 Jonathan Blake Buller Skin cover for a game controller
USD902938S1 (en) 2019-11-21 2020-11-24 Marketing Instincts Inc. Skin cover for a game controller
USD930083S1 (en) 2020-10-28 2021-09-07 Marketing Instincts Skin cover set for a gaming console
USD930749S1 (en) 2020-10-28 2021-09-14 Marketing Instincts Skin cover set for a gaming console
USD938524S1 (en) 2020-10-28 2021-12-14 Razer (Asia Pacific) Pte., Ltd Skin cover set for a gaming console
USD930082S1 (en) 2020-10-28 2021-09-07 Marketing Instincts Skin cover set for a gaming console
USD958893S1 (en) * 2020-10-30 2022-07-26 Jiarui Zhu Game controller grip
USD983200S1 (en) 2021-02-08 2023-04-11 Collective Minds Gaming Co. Ltd. Stop for a trigger button of a video game controller
CA201150S (en) 2021-02-08 2022-10-19 Collective Minds Gaming Co Ltd Adapter for a video game controller
US11752440B2 (en) * 2021-03-05 2023-09-12 Robert D. Braiman Grip for video game controller
US20230330546A1 (en) * 2022-04-13 2023-10-19 Davis Allen Jolly Game Controller Handles

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5014191A (en) * 1988-05-02 1991-05-07 Padgaonkar Ajay J Security for digital signal processor program memory
US5402492A (en) * 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US6360322B1 (en) * 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
US20020169978A1 (en) * 2001-05-14 2002-11-14 Chong-In Kim Computer and driving method therefor
US20030005323A1 (en) * 2001-06-29 2003-01-02 Hanley David C. Management of sensitive data
US20030182571A1 (en) * 2002-03-20 2003-09-25 Kabushiki Kaisha Toshiba Internal memory type tamper resistant microprocessor with secret protection function
US20040117575A1 (en) * 2001-04-03 2004-06-17 Jean-Francios Link System and method for controlling access to protected data stored in a storage unit
US20040162932A1 (en) * 2003-02-06 2004-08-19 Renesas Technology Corp. Memory device
US20050005131A1 (en) * 2003-06-20 2005-01-06 Renesas Technology Corp. Memory card
US20060176146A1 (en) * 2005-02-09 2006-08-10 Baldev Krishan Wireless universal serial bus memory key with fingerprint authentication
US20060200679A1 (en) * 2005-03-02 2006-09-07 John Hawk System and method for access to a password protected information handling system
US20060277564A1 (en) * 2003-10-22 2006-12-07 Jarman Matthew T Apparatus and method for blocking audio/visual programming and for muting audio
US20080072064A1 (en) * 2006-09-18 2008-03-20 John Franco Franchi Secure Universal Transaction System
US20100230487A1 (en) * 2007-09-26 2010-09-16 Clevx, Llc Self-authenticating credit card system

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5365570A (en) * 1992-06-02 1994-11-15 Boubelik Mark J Emergency cellular telephone apparatus
GB2315206A (en) * 1996-05-10 1998-01-28 Bayode Oduwole Case for mobile telephone
JPH10149339A (en) * 1996-11-19 1998-06-02 Mitsubishi Electric Corp Information processing system and its method
USD396495S (en) * 1997-11-20 1998-07-28 Eric Hirokane Game controller cover
US6120025A (en) * 1998-04-14 2000-09-19 Hughes, Iv; Richard James-Patrick Controller grip for a video game machine
KR100296371B1 (en) * 1998-12-31 2001-08-07 최기주 Computer having security device
USD515807S1 (en) * 2005-01-21 2006-02-28 Gabriel Faillace Cellular case
USD534962S1 (en) * 2005-02-14 2007-01-09 Svendsen Chris J Cover for a game controller
USD521567S1 (en) * 2005-02-14 2006-05-23 Svendsen Chris J Cover for a game controller
USD570854S1 (en) * 2006-11-20 2008-06-10 Harris Curtis J Game controller cover
US7762553B2 (en) * 2006-11-25 2010-07-27 Harris Curtis J Form-fitting electronic game controller cover
USD578167S1 (en) * 2006-12-01 2008-10-07 Harris Curtis J Game controller cover

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5014191A (en) * 1988-05-02 1991-05-07 Padgaonkar Ajay J Security for digital signal processor program memory
US5402492A (en) * 1993-06-18 1995-03-28 Ast Research, Inc. Security system for a stand-alone computer
US6360322B1 (en) * 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
US20040117575A1 (en) * 2001-04-03 2004-06-17 Jean-Francios Link System and method for controlling access to protected data stored in a storage unit
US7133990B2 (en) * 2001-04-03 2006-11-07 Stmicroelectronics Sa System and method for controlling access to protected data stored in a storage unit
US20020169978A1 (en) * 2001-05-14 2002-11-14 Chong-In Kim Computer and driving method therefor
US20030005323A1 (en) * 2001-06-29 2003-01-02 Hanley David C. Management of sensitive data
US20030182571A1 (en) * 2002-03-20 2003-09-25 Kabushiki Kaisha Toshiba Internal memory type tamper resistant microprocessor with secret protection function
US20040162932A1 (en) * 2003-02-06 2004-08-19 Renesas Technology Corp. Memory device
US20050005131A1 (en) * 2003-06-20 2005-01-06 Renesas Technology Corp. Memory card
US20060277564A1 (en) * 2003-10-22 2006-12-07 Jarman Matthew T Apparatus and method for blocking audio/visual programming and for muting audio
US20060176146A1 (en) * 2005-02-09 2006-08-10 Baldev Krishan Wireless universal serial bus memory key with fingerprint authentication
US20060200679A1 (en) * 2005-03-02 2006-09-07 John Hawk System and method for access to a password protected information handling system
US20080072064A1 (en) * 2006-09-18 2008-03-20 John Franco Franchi Secure Universal Transaction System
US20100230487A1 (en) * 2007-09-26 2010-09-16 Clevx, Llc Self-authenticating credit card system

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9875194B2 (en) 2006-10-10 2018-01-23 Datalocker Inc. Security system for external data storage apparatus and control method thereof
US10776284B2 (en) 2006-10-10 2020-09-15 Datalocker Inc. Security system for external data storage apparatus and control method thereof
US9612977B2 (en) * 2011-07-15 2017-04-04 Standard Microsystems Corporation Method and system for controlling access to embedded nonvolatile memories
US20140286491A1 (en) * 2011-08-08 2014-09-25 Mikoh Corporation Radio frequency identification technology incorporating cryptographics
US9867042B2 (en) * 2011-08-08 2018-01-09 Mikoh Corporation Radio frequency identification technology incorporating cryptographics
US20160203325A1 (en) * 2013-08-22 2016-07-14 Siemens Ag Osterreich Method for protecting an integrated circuit against unauthorized access
US10311253B2 (en) * 2013-08-22 2019-06-04 Siemens Ag Österreich Method for protecting an integrated circuit against unauthorized access
US20190080099A1 (en) * 2015-03-30 2019-03-14 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US10503917B2 (en) * 2015-03-30 2019-12-10 Amazon Technologies, Inc. Performing operations on intelligent storage with hardened interfaces
US20160323114A1 (en) * 2015-05-03 2016-11-03 Ronald Francis Sulpizio, JR. Temporal key generation and pki gateway
US11831787B2 (en) 2015-05-03 2023-11-28 Ronald Francis Sulpizio, JR. Temporal key generation and PKI gateway
US10205598B2 (en) * 2015-05-03 2019-02-12 Ronald Francis Sulpizio, JR. Temporal key generation and PKI gateway
US10824348B2 (en) * 2016-08-02 2020-11-03 Samsung Electronics Co., Ltd. Method of executing conditional data scrubbing inside a smart storage device
US20180039437A1 (en) * 2016-08-02 2018-02-08 Samsung Electronics Co., Ltd. Method of executing data scrubbing inside a smart storage device
US11281576B2 (en) * 2019-06-13 2022-03-22 Melexis Technologies Nv Memory device
US11366933B2 (en) 2019-12-08 2022-06-21 Western Digital Technologies, Inc. Multi-device unlocking of a data storage device
US11163442B2 (en) 2019-12-08 2021-11-02 Western Digital Technologies, Inc. Self-formatting data storage device
US11556665B2 (en) 2019-12-08 2023-01-17 Western Digital Technologies, Inc. Unlocking a data storage device
US11469885B2 (en) 2020-01-09 2022-10-11 Western Digital Technologies, Inc. Remote grant of access to locked data storage device
US11088832B2 (en) 2020-01-09 2021-08-10 Western Digital Technologies, Inc. Secure logging of data storage device events
US11334677B2 (en) * 2020-01-09 2022-05-17 Western Digital Technologies, Inc. Multi-role unlocking of a data storage device
US11606206B2 (en) 2020-01-09 2023-03-14 Western Digital Technologies, Inc. Recovery key for unlocking a data storage device
US11831752B2 (en) 2020-01-09 2023-11-28 Western Digital Technologies, Inc. Initializing a data storage device with a manager device
US11265152B2 (en) 2020-01-09 2022-03-01 Western Digital Technologies, Inc. Enrolment of pre-authorized device
US11882434B2 (en) 2020-07-09 2024-01-23 Western Digital Technologies, Inc. Method and device for covertly communicating state changes
US11582607B2 (en) 2020-07-10 2023-02-14 Western Digital Technologies, Inc. Wireless security protocol

Also Published As

Publication number Publication date
WO2008127433A2 (en) 2008-10-23
US7762553B2 (en) 2010-07-27
WO2008127433A3 (en) 2009-03-19
TW200837771A (en) 2008-09-16
US20080122173A1 (en) 2008-05-29

Similar Documents

Publication Publication Date Title
US20100088527A1 (en) Memory protection system and method
US11809335B2 (en) Apparatuses and methods for securing an access protection scheme
EP0596276B1 (en) Secure memory card
TWI426389B (en) System and method for updating read-only memory in smart card memory modules
US7979658B2 (en) Secure management of memory regions in a memory
US9262611B2 (en) Data security system with encryption
US20070297606A1 (en) Multiple key security and method for electronic devices
US20070083939A1 (en) Secure universal serial bus (USB) storage device and method
US20130019305A1 (en) Method and system for controlling access to embedded nonvolatile memories
JP6518798B2 (en) Device and method for managing secure integrated circuit conditions
US9727490B2 (en) Self-locking mass storage system and method of operation thereof
KR100841982B1 (en) Memory card storing host identification information and access method thereof
US20090055660A1 (en) Security flash memory, data encryption device and method for accessing security flash memory
WO1995024698A1 (en) A secure memory card
JP3810378B2 (en) Nonvolatile semiconductor memory device and security method thereof
WO2000016179A1 (en) Method and device of disabling the unauthorised use of a computer
US20060282683A1 (en) Flash array read, erase, and program security
JP2006054554A (en) Authentication apparatus

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION