TW200641696A - Secure memory card with life cycle phases - Google Patents

Secure memory card with life cycle phases

Info

Publication number
TW200641696A
TW200641696A TW095104117A TW95104117A TW200641696A TW 200641696 A TW200641696 A TW 200641696A TW 095104117 A TW095104117 A TW 095104117A TW 95104117 A TW95104117 A TW 95104117A TW 200641696 A TW200641696 A TW 200641696A
Authority
TW
Taiwan
Prior art keywords
life cycle
memory card
states
secure memory
data
Prior art date
Application number
TW095104117A
Other languages
Chinese (zh)
Other versions
TWI402755B (en
Inventor
Michael Holtzman
Baruch Boris Cohen
Ron Barzilai
Hagai Bar-El
David Deitcher
Original Assignee
Sandisk Corp
Discretix Technologies Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/317,862 external-priority patent/US8321686B2/en
Priority claimed from US11/317,390 external-priority patent/US8108691B2/en
Application filed by Sandisk Corp, Discretix Technologies Ltd filed Critical Sandisk Corp
Publication of TW200641696A publication Critical patent/TW200641696A/en
Application granted granted Critical
Publication of TWI402755B publication Critical patent/TWI402755B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Storage Device Security (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

A secure memory card with encryption capabilities comprises various life cycle states that allow for testing of the hardware and software of the card in certain of the states. The testing mechanisms are disabled in certain other of the states thus closing potential back doors to secure data and cryptographic keys. Controlled availability and generation of the keys required for encryption and decryption of data is such that even if back doors are accessed that previously encrypted data is impossible to decrypt and thus worthless even if a back door is found and maliciously pried open.
TW095104117A 2005-02-07 2006-02-07 Secure memory card with life cycle phases TWI402755B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US65112805P 2005-02-07 2005-02-07
US11/317,862 US8321686B2 (en) 2005-02-07 2005-12-22 Secure memory card with life cycle phases
US11/317,390 US8108691B2 (en) 2005-02-07 2005-12-22 Methods used in a secure memory card with life cycle phases

Publications (2)

Publication Number Publication Date
TW200641696A true TW200641696A (en) 2006-12-01
TWI402755B TWI402755B (en) 2013-07-21

Family

ID=36644859

Family Applications (1)

Application Number Title Priority Date Filing Date
TW095104117A TWI402755B (en) 2005-02-07 2006-02-07 Secure memory card with life cycle phases

Country Status (7)

Country Link
EP (1) EP1846826A2 (en)
JP (1) JP4787273B2 (en)
KR (1) KR100972540B1 (en)
CN (1) CN101164048B (en)
IL (1) IL184793A0 (en)
TW (1) TWI402755B (en)
WO (1) WO2006086232A2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7748031B2 (en) 2005-07-08 2010-06-29 Sandisk Corporation Mass storage device with automated credentials loading
US8966284B2 (en) 2005-09-14 2015-02-24 Sandisk Technologies Inc. Hardware driver integrity check of memory card controller firmware
US8915447B2 (en) 2007-09-12 2014-12-23 Devicefidelity, Inc. Amplifying radio frequency signals
US8070057B2 (en) 2007-09-12 2011-12-06 Devicefidelity, Inc. Switching between internal and external antennas
US9304555B2 (en) 2007-09-12 2016-04-05 Devicefidelity, Inc. Magnetically coupling radio frequency antennas
US20090069049A1 (en) 2007-09-12 2009-03-12 Devicefidelity, Inc. Interfacing transaction cards with host devices
US9311766B2 (en) 2007-09-12 2016-04-12 Devicefidelity, Inc. Wireless communicating radio frequency signals
US9553721B2 (en) * 2015-01-30 2017-01-24 Qualcomm Incorporated Secure execution environment communication

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE4243888A1 (en) * 1992-12-23 1994-06-30 Gao Ges Automation Org Data carrier and method for checking the authenticity of a data carrier
FR2716989B1 (en) * 1994-03-04 1996-04-05 Gemplus Card Int Method of operation of a smart card.
JP3461234B2 (en) * 1996-01-22 2003-10-27 株式会社東芝 Data protection circuit
EP1004992A3 (en) * 1997-03-24 2001-12-05 Visa International Service Association A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
JPH11161549A (en) * 1997-11-28 1999-06-18 Toshiba Corp Secret information management method and system in portable information equipment
EP1082710A1 (en) * 1998-06-05 2001-03-14 Landis & Gyr Communications S.A. Preloaded ic-card and method for authenticating the same
EP0992809A1 (en) * 1998-09-28 2000-04-12 Siemens Aktiengesellschaft Circuit with deactivatable scan path
JP2000172821A (en) * 1998-12-10 2000-06-23 Toshiba Corp Semiconductor device, data storage medium, data recorder, data reading-out device, and manufacture of semiconductor device
US7023996B2 (en) * 2001-05-04 2006-04-04 The Boeing Company Encryption for asymmetric data links
DE10162306A1 (en) * 2001-12-19 2003-07-03 Philips Intellectual Property Method and arrangement for verifying NV fuses as well as a corresponding computer program product and a corresponding computer-readable storage medium
JP4350962B2 (en) * 2002-03-13 2009-10-28 パナソニック株式会社 Secure device
US6912633B2 (en) * 2002-03-18 2005-06-28 Sun Microsystems, Inc. Enhanced memory management for portable devices
US6843423B2 (en) * 2003-03-13 2005-01-18 Stmicroelectronics, Inc. Smart card that can be configured for debugging and software development using secondary communication port
US6783078B1 (en) * 2003-05-09 2004-08-31 Stmicroelectronics, Inc. Universal serial bus (USB) smart card having read back testing features and related system, integrated circuit, and methods
TW200501281A (en) * 2003-06-27 2005-01-01 Kingpak Tech Inc Manufacturing method of small memory card having display
KR101199600B1 (en) * 2003-07-17 2012-11-12 샌디스크 테크놀로지스, 인코포레이티드 Memory card with raised portion
TWI223974B (en) * 2003-11-20 2004-11-11 Advanced Semiconductor Eng Tiny memory card and method for manufacturing the same

Also Published As

Publication number Publication date
IL184793A0 (en) 2008-01-20
JP2008530659A (en) 2008-08-07
KR20070121642A (en) 2007-12-27
JP4787273B2 (en) 2011-10-05
CN101164048B (en) 2010-06-16
EP1846826A2 (en) 2007-10-24
CN101164048A (en) 2008-04-16
KR100972540B1 (en) 2010-07-28
WO2006086232A3 (en) 2007-10-11
WO2006086232A2 (en) 2006-08-17
TWI402755B (en) 2013-07-21

Similar Documents

Publication Publication Date Title
TW200641696A (en) Secure memory card with life cycle phases
GB0506117D0 (en) Programmable logic device
PH12018501745A1 (en) Personal device security using elliptic curve cryptography for secret sharing
WO2007125486A3 (en) Improved access to authorized domains
WO2006126191A3 (en) Method, device, and system of encrypting/decrypting data
JP6345237B2 (en) Method and apparatus for encrypting plaintext data
WO2006003529A3 (en) Transparent encryption and access controll for mass-storage devices
BR112018004741A2 (en) method and access device
ATE209373T1 (en) ELECTRONIC DATA PROCESSING DEVICE AND SYSTEM
WO2006009616A3 (en) Memory encryption architecture
WO2005052841A3 (en) Tamper-resistant trusted virtual machine
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
EP1463322A3 (en) Renewable conditional access system
AU2002212345A1 (en) Method and system for web-based cross-domain single-sign-on authentication
GB0401123D0 (en) Privacy management of personal data
SG143962A1 (en) Validating an authentication chip using a secret key
MXPA04000193A (en) Content reading apparatus.
WO2014099028A1 (en) Platform-hardened digital rights management key provisioning
WO2007089266A3 (en) Administration of data encryption in enterprise computer systems
BRPI0700267A (en) method of communication between a router and a host, router for communicating with a host, and host for communicating with a router
NO20074585L (en) Rights management system for streaming multimedia content
TW200627152A (en) Data security
NL1021434A1 (en) Method for distributing data between a local server and local peripherals.
WO2008110786A3 (en) Verification of movement of items
TW200502758A (en) Portable secure information accessing system and method thereof

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees