Check patentability & draft patents in minutes with Patsnap Eureka AI!

Hardware driver integrity check of memory card controller firmware

A memory controller and memory technology, applied in the field of memory cards, can solve problems such as illegal copying

Inactive Publication Date: 2013-11-06
SANDISK TECH LLC
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

One way a hacker might try to do this is to alter or even replace the firmware that runs the memory card in order to be able to illegally copy the contents of the card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware driver integrity check of memory card controller firmware
  • Hardware driver integrity check of memory card controller firmware
  • Hardware driver integrity check of memory card controller firmware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A Message Authentication Code ("MAC") is a number calculated from some content (or message) to verify the integrity of the content. Its purpose is to detect whether the content has been changed. A message authentication code is a hash calculated from a message and some secret data. It is difficult to forge without knowing the confidential data. The MAC is calculated using an algorithm based on DES or AES encryption (which uses a key). The MAC is then stored or sent with the message. The receiver recomputes the MAC using the same algorithm and key and compares it to the one stored or sent. If they are the same, it is assumed that the content or message has not been tampered with.

[0019] DES (Data Encryption Standard) is a NIST standard cryptographic encryption method using a 56-bit key. Adopted by NIST in 1977, it was replaced by AES as the official standard in 2001. DES is a symmetric block cipher that processes 64-bit blocks in four different modes of operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A memory system comprises an encryption engine implemented in the hardware of a controller. In starting up the memory system, a boot strapping mechanism is implemented wherein a first portion of firmware when executed pulls in another portion of firmware to be executed. The hardware of the encryption engine is used to verify the integrity of at least the first portion of the firmware. Therefore, only the firmware that is intended to run the system will be executed.

Description

[0001] Information about divisional applications [0002] This case is a divisional application. The parent case of this case is that the international application number is PCT / US2006 / 035840, the application date is September 13, 2006, the application number is 200680033798.3 after the PCT application entered the Chinese national phase, and the invention name is "hardware driver of memory card controller firmware complete Invention patent application for sex inspection. technical field [0003] The present invention relates generally to memory cards with secure content and encryption of said content, and in particular to verification of the integrity of firmware running secure memory cards. Background technique [0004] It is critical to be able to verify the functionality of commercially available memory cards before they leave the factory, and to ensure that the cards are not at risk of hacking once they leave the factory. With the advent of digital rights management a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
CPCG06F21/57G06F12/00G06F21/00
Inventor 迈克尔·霍尔茨曼罗恩·巴尔齐莱鲁文·埃尔哈米亚斯尼夫·科亨
Owner SANDISK TECH LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More