Secure memory card with life cycle phases
    1.
    发明授权
    Secure memory card with life cycle phases 有权
    具有生命周期阶段的安全存储卡

    公开(公告)号:US08321686B2

    公开(公告)日:2012-11-27

    申请号:US11317862

    申请日:2005-12-22

    IPC分类号: G06F11/30 H04L9/00

    摘要: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.

    摘要翻译: 具有加密功能的安全存储卡包括允许在某些状态下测试卡的硬件和软件的各种生命周期状态。 在某些其他状态下,测试机制被禁用,从而关闭潜在的后门以保护数据和加密密钥。 受控的可用性和数据加密和解密所需的密钥的生成使得即使后门被访问,即使发现后门被恶意撬开,以前加密的数据也不可能解密,因此也是无价值的。

    Methods used in a secure memory card with life cycle phases
    2.
    发明授权
    Methods used in a secure memory card with life cycle phases 有权
    用于具有生命周期阶段的安全存储卡中的方法

    公开(公告)号:US08108691B2

    公开(公告)日:2012-01-31

    申请号:US11317390

    申请日:2005-12-22

    IPC分类号: G06F21/00

    摘要: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.

    摘要翻译: 具有加密功能的安全存储卡包括允许在某些状态下测试卡的硬件和软件的各种生命周期状态。 在某些其他状态下,测试机制被禁用,从而关闭潜在的后门以保护数据和加密密钥。 受控的可用性和数据加密和解密所需的密钥的生成使得即使后门被访问,即使发现后门被恶意撬开,以前加密的数据也不可能解密,因此也是无价值的。

    Methods used in a secure memory card with life cycle phases
    3.
    发明申请
    Methods used in a secure memory card with life cycle phases 有权
    用于具有生命周期阶段的安全存储卡中的方法

    公开(公告)号:US20060176068A1

    公开(公告)日:2006-08-10

    申请号:US11317390

    申请日:2005-12-22

    IPC分类号: G01R31/26

    摘要: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.

    摘要翻译: 具有加密功能的安全存储卡包括允许在某些状态下测试卡的硬件和软件的各种生命周期状态。 在某些其他状态下,测试机制被禁用,从而关闭潜在的后门以保护数据和加密密钥。 受控的可用性和数据加密和解密所需的密钥的生成使得即使后门被访问,即使发现后门被恶意撬开,以前加密的数据也不可能解密,因此也是无价值的。

    Secure memory card with life cycle phases
    4.
    发明申请
    Secure memory card with life cycle phases 有权
    具有生命周期阶段的安全存储卡

    公开(公告)号:US20070188183A1

    公开(公告)日:2007-08-16

    申请号:US11317862

    申请日:2005-12-22

    IPC分类号: G01R31/02

    摘要: A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.

    摘要翻译: 具有加密功能的安全存储卡包括允许在某些状态下测试卡的硬件和软件的各种生命周期状态。 在某些其他状态下,测试机制被禁用,从而关闭潜在的后门以保护数据和加密密钥。 受控的可用性和数据加密和解密所需的密钥的生成使得即使后门被访问,即使发现后门被恶意撬开,以前加密的数据也不可能解密,因此也是无价值的。

    System, device, and method of selectively allowing a host processor to access host-executable code
    5.
    发明授权
    System, device, and method of selectively allowing a host processor to access host-executable code 有权
    选择性地允许主处理器访问主机可执行代码的系统,设备和方法

    公开(公告)号:US07467304B2

    公开(公告)日:2008-12-16

    申请号:US11472539

    申请日:2006-06-22

    IPC分类号: G06F11/30 G06F12/14 H04L9/32

    CPC分类号: G06F21/575 G06F21/572

    摘要: Some demonstrative embodiments of the invention include a method, device and/or system of selectively allowing a host processor to access a host-executable code. A host apparatus may include, for example, a host processor; and a protected memory module comprising: a memory to maintain a host-executable code to be executed by the host processor; and a memory controller to authenticate the host-executable code, and to selectively allow the host processor to access the host-executable code based on an authenticity of the host-executable code. Other embodiments are described and claimed.

    摘要翻译: 本发明的一些演示实施例包括选择性地允许主处理器访问主机可执行代码的方法,设备和/或系统。 主机设备可以包括例如主机处理器; 以及受保护的存储器模块,包括:存储器,用于维持要由所述主机处理器执行的主机可执行代码; 以及存储器控制器,用于认证主机可执行代码,并且选择性地允许主处理器基于主机可执行代码的真实性访问主机可执行代码。 描述和要求保护其他实施例。

    System, device, and method of selectively allowing a host processor to access host-executable code
    6.
    发明申请
    System, device, and method of selectively allowing a host processor to access host-executable code 有权
    选择性地允许主处理器访问主机可执行代码的系统,设备和方法

    公开(公告)号:US20060294513A1

    公开(公告)日:2006-12-28

    申请号:US11472539

    申请日:2006-06-22

    IPC分类号: G06F9/44

    CPC分类号: G06F21/575 G06F21/572

    摘要: Some demonstrative embodiments of the invention include a method, device and/or system of selectively allowing a host processor to access a host-executable code. A host apparatus may include, for example, a host processor; and a protected memory module comprising: a memory to maintain a host-executable code to be executed by the host processor; and a memory controller to authenticate the host-executable code, and to selectively allow the host processor to access the host-executable code based on an authenticity of the host-executable code. Other embodiments are described and claimed.

    摘要翻译: 本发明的一些演示实施例包括选择性地允许主处理器访问主机可执行代码的方法,设备和/或系统。 主机设备可以包括例如主机处理器; 以及受保护的存储器模块,包括:存储器,用于维持要由所述主机处理器执行的主机可执行代码; 以及存储器控制器,用于认证主机可执行代码,并且选择性地允许主机处理器基于主机可执行代码的真实性访问主机可执行代码。 描述和要求保护其他实施例。

    Method, device, and system of encrypting/decrypting data
    7.
    发明申请
    Method, device, and system of encrypting/decrypting data 审中-公开
    加密/解密数据的方法,设备和系统

    公开(公告)号:US20060262928A1

    公开(公告)日:2006-11-23

    申请号:US11437728

    申请日:2006-05-22

    IPC分类号: H04N7/167

    摘要: Some demonstrative embodiments of the invention include a method, device and/or system to encrypt and/or decrypt data. In one demonstrative embodiment, the device may include, for example, a storage; and an encryption/decryption module to: receive externally-encrypted data to be stored in the storage, wherein the externally-encrypted data is encrypted using an external key; decrypt the externally-encrypted data using the external key to generate decrypted data; and encrypt the decrypted data using a securely maintained internal key to generate internally-encrypted data. Other embodiments are described and claimed.

    摘要翻译: 本发明的一些演示实施例包括用于加密和/或解密数据的方法,设备和/或系统。 在一个示范性实施例中,设备可以包括例如存储器; 以及加密/解密模块,用于:接收要存储在所述存储器中的外部加密的数据,其中所述外部加密的数据使用外部密钥进行加密; 使用外部密钥对外部加密的数据进行解密,生成解密数据; 并使用安全维护的内部密钥加密解密的数据,以生成内部加密的数据。 描述和要求保护其他实施例。

    Memory system with in stream data encryption / decryption
    8.
    发明申请
    Memory system with in stream data encryption / decryption 审中-公开
    具有流数据加密/解密的内存系统

    公开(公告)号:US20070180539A1

    公开(公告)日:2007-08-02

    申请号:US11314032

    申请日:2005-12-20

    IPC分类号: G06F11/00

    摘要: The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination among a plurality of destinations, all without involving the controller. The cryptographic circuit may preferably be configured to enable the processing of multiple pages, selection of one or more cryptographic algorithms among a plurality of algorithms to encryption and/or decryption without involving a controller, and to process data cryptographically in multiple successive stages without involvement of the controller. For a memory system cryptographically processing data from multiple data streams in an interleaved manner, when a session is interrupted, security configuration information may be lost so that it may become impossible to continue the process when the session is resumed. To retain the security configuration information, the controller preferably causes the security configuration information for the session to be stored before the interruption so that it is retrievable after the interruption.

    摘要翻译: 在数据流中的数据由电路进行密码处理而不涉及任何控制器的情况下,存储器系统的吞吐量得到改善。 优选地控制数据流,使得其具有多个源中的选择的数据源和多个目的地中的所选择的目的地,全部不涉及控制器。 优选地,加密电路可被配置为能够处理多个页面,在多个算法之间选择一个或多个加密算法以加密和/或解密而不涉及控制器,并且在多个连续阶段以密码方式处理数据,而不涉及 控制器。 对于以交织方式从多个数据流加密处理数据的存储器系统,当会话被中断时,可能丢失安全配置信息,从而当会话被恢复时可能变得不可能继续该过程。 为了保持安全配置信息,控制器优选地在中断之前存储会话的安全配置信息,以便在中断之后可以检索会话的安全配置信息。

    In stream data encryption / decryption method
    9.
    发明申请
    In stream data encryption / decryption method 审中-公开
    流数据加密/解密方法

    公开(公告)号:US20060242429A1

    公开(公告)日:2006-10-26

    申请号:US11314030

    申请日:2005-12-20

    摘要: The throughput of the memory system is improved where data in a data stream is cryptographically processed by a circuit without involving intimately any controller. The data stream is preferably controlled so that it has a selected data source among a plurality of sources and a selected destination among a plurality of destinations, all without involving the controller. The cryptographic circuit may preferably be configured to enable the processing of multiple pages, selection of one or more cryptographic algorithms among a plurality of algorithms to encryption and/or decryption without involving a controller, and to process data cryptographically in multiple successive stages without involvement of the controller. For a memory system cryptographically processing data from multiple data streams in an interleaved manner, when a session is interrupted, security configuration information may be lost so that it may become impossible to continue the process when the session is resumed. To retain the security configuration information, the controller preferably causes the security configuration information for the session to be stored before the interruption so that it is retrievable after the interruption.

    摘要翻译: 在数据流中的数据由电路进行密码处理而不涉及任何控制器的情况下,存储器系统的吞吐量得到改善。 优选地控制数据流,使得其具有多个源中的选择的数据源和多个目的地中的所选择的目的地,全部不涉及控制器。 优选地,加密电路可被配置为能够处理多个页面,在多个算法之间选择一个或多个加密算法以加密和/或解密而不涉及控制器,并且在多个连续阶段以密码方式处理数据,而不涉及 控制器。 对于以交织方式从多个数据流加密处理数据的存储器系统,当会话被中断时,可能丢失安全配置信息,从而当会话被恢复时可能变得不可能继续该过程。 为了保持安全配置信息,控制器优选地在中断之前存储会话的安全配置信息,以便在中断之后可以检索会话的安全配置信息。