WO2004001610A1 - 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム - Google Patents
情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム Download PDFInfo
- Publication number
- WO2004001610A1 WO2004001610A1 PCT/JP2003/007782 JP0307782W WO2004001610A1 WO 2004001610 A1 WO2004001610 A1 WO 2004001610A1 JP 0307782 W JP0307782 W JP 0307782W WO 2004001610 A1 WO2004001610 A1 WO 2004001610A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- lock
- memory
- storage device
- information storage
- data
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
Definitions
- the present invention relates to an information storage device, a memory access control method, and a computer program. More specifically, an information storage device that implements access control for locking memory of an information storage device based on a data area of read data of data stored in the information storage device such as a memory card, and a memory access control device Methods and computer programs.
- an information storage device that implements access control for locking memory of an information storage device based on a data area of read data of data stored in the information storage device such as a memory card, and a memory access control device.
- PDA Personal Computer
- PDA Personal Digital Digit Assistants
- digital cameras have various storage devices such as hard disks, DVDs, CDs, and memory cards. Data recording and playback processing using the medium is executed.
- Reading or writing of data stored in a memory card or the like is possible by attaching the card to a device having a memory card interface and performing data transfer via the interface.
- Data recording and playback using a memory device can be configured so that anyone can freely execute it.However, for example, by setting a password or performing encryption processing, the memory can be stored only for a specific user or a specific device. ⁇ Allow access to unauthorized third parties Thus, a so-called habit limitation configuration that eliminates access by the user has been realized.
- a password is transferred from a content using device as an information reproducing device to a content storage device such as a memory card, and a control unit (CPU or the like) of the memory card is used. ), The password is verified, and the content is output from the content storage device, such as a memory card, to the content-using device as the information reproducing device, or the content reproducing device is used as the information reproducing device.
- a mutual authentication process is performed between the content use device and the content storage device such as a memory card, and the content use device as an information playback device is transferred from the content storage device such as a memory card to the condition that mutual authentication is established. For example, there is a configuration that outputs content to
- a data storage device such as a memory card can be attached to various devices such as a PC, a PDA, and a digital camera, and these devices often use one memory card for each other.
- a data usage mode if the above-described password verification processing, authentication processing, and the like are required each time the memory card is inserted into the device, it takes time to perform data reading or data writing. In other words, the processing efficiency decreases.
- the present invention has been made in view of the above-described problems, and has an access control that performs a lock process of a memory of an information storage device based on a data area of read data of data stored in an information storage device such as a memory card. It is an object to provide an information storage device, a memory access control method, and a computer program that realize the above. According to a first aspect of the present invention,
- An information storage device comprising: a data storage memory; and a control unit that performs access control on the memory.
- the control unit includes:
- a determination process is performed to determine whether or not the data area of the data read from the memory is a predetermined hook-up data area.
- the information storage device has a configuration for executing a lock process.
- control unit is configured to execute the data area determination process based on a logical number of a cluster as area information of data stored in a memory. Yes, the configuration is such that the logical number of the cluster corresponding to the predetermined lip-corresponding data area is compared with the logical number of the read cluster.
- control unit executes the data area determination process based on a logical number of a cluster as area information of data stored in a memory
- the memory is configured to execute the memory hacking process on condition that it is determined that the data area corresponding to the logical number of a plurality of clusters has been read.
- the information storage device has hook status information as hook status data of the information storage device, and the control unit performs the hook process as: It is characterized in that it is configured to execute the update processing of the hook status information.
- the lock status information is stored in a non-volatile memory (NVM) in which stored information is maintained even after power is turned off, and the control unit includes the information storage device.
- NVM non-volatile memory
- An access control process for the memory after the power of the apparatus is turned on again is executed based on the lock status information.
- the lock processing starts reading of the lock-compatible data area, ends reading of the lock-compatible data area, or the entire content having the lock-compatible data area. It is characterized in that it is configured to be executed on condition that any one of the processing detections of the end of reading is performed.
- a second aspect of the present invention provides:
- the determination processing step includes a step of executing the data area determination processing based on a logical number of a cluster as area information of data stored in a memory. And a step of executing a process of comparing a logical number of a cluster corresponding to a predetermined hook-up corresponding data area with a logical number of a read cluster.
- the determination processing step executes the determination processing of the data area based on a logical number of a cluster as area information of data stored in a memory
- the step of executing the hacking process is characterized in that the hacking process of the memory is executed on condition that it is determined that the reading process of the data area corresponding to the logical number of a plurality of continuous clusters has been performed. .
- the step of executing the lock processing includes a step of executing a lock status information update process as the lock state data of the information storage device.
- the memory access control method further comprises storing the wake-up status information in a non-volatile memory (NVM) whose stored information is maintained even after power is turned off.
- the step of executing the hack process includes the step of executing access control processing to the memory after the information storage device is powered on again based on the hack status information.
- the step of executing the lock processing includes starting reading of the lock corresponding data area, ending reading of the lock corresponding data area, or It is characterized in that it is executed on condition that any one of the processing detections of the end of reading of the entire content having the area is detected.
- a third aspect of the present invention is that
- a computer for executing a memory access control process in an information storage device having a data storage memory and a control unit for executing access control to the memory.
- a computer program characterized by having:
- an information storage device such as a memory card
- the data area of the read data is predetermined. It is configured to determine whether or not the data is in the specified lip-correspondence data area, and to execute the lip-hook processing in the memory on condition that it is determined that the lip-correspondence data area has been read.
- Data reading from an information storage device is prevented from being performed a plurality of times, and so-called Access control of one dounce becomes possible.
- the read data area determination processing is executed based on the logical number of the cluster as the area information of the data stored in the memory, and the single or continuous plurality of clusters are determined. Executing the memory lock process on condition that the read process of the data area corresponding to the logical number is determined enables read-only access control in which various data areas such as the intro part of music data are set arbitrarily. Becomes
- the lock status information is stored in the non-volatile memory (NVM) in which the storage information is maintained even after the power is turned off.
- NVM non-volatile memory
- the access control process for the memory can be executed based on the acknowledgment status information.
- the computer program of the present invention is, for example, a storage medium or a communication medium provided in a computer-readable format to a general-purpose computer system capable of executing various program codes, for example, a storage medium such as a CDFD and an MO. It is a computer program that can be provided via a medium or a communication medium such as a network. By providing such a program in a computer-readable format, processing corresponding to the program is realized on the computer 'system.
- a system is a logical set of a plurality of devices, and the devices of each configuration are not limited to those in the same housing.
- FIG. 1 is a diagram for explaining an outline of a use form of an information storage device of the present invention.
- FIG. 2 is a diagram showing a hardware configuration example of a host device using the information storage device.
- FIG. 3 is a diagram showing an example of a hardware configuration of an information storage device.
- FIG. 4 is a diagram for explaining data stored in the information storage device and the host device of the present invention.
- FIG. 5 is a diagram illustrating a communication processing sequence between the information storage device and the host device in the hacking process for the information storage device.
- FIG. 6 is a diagram showing a processing flow for explaining a hacking process for the information storage device.
- FIG. 7 is a diagram illustrating a communication processing sequence between the information storage device and the host device in the unlocking process on the information storage device.
- FIG. 8 is a diagram showing a processing flow for explaining an unlocking process for the information storage device.
- FIG. 9 is a diagram for explaining data stored in the information storage device and the host device of the present invention.
- FIG. 10 is a diagram for explaining a hook processing mode for the information storage device of the present invention.
- FIG. 11 is a diagram illustrating a communication processing sequence between the information storage device and the host device in the hacking process using the subkey set for the information storage device.
- FIG. 12 is a diagram showing a process flow for explaining a hack process using a subkey set for an information storage device.
- FIG. 13 is a diagram illustrating a communication processing sequence between the information storage device and the host device in the unpacking process using the imprint and the subkey set for the information storage device.
- FIG. 14 is a flowchart illustrating an imprint process and an unlock process using a subkey set for an information storage device.
- FIG. 15 is a flowchart illustrating an imprint process using an imprint and a subkey set for an information storage device.
- FIG. 16 is a diagram illustrating a communication processing sequence between the information storage device and the host device in the unpacking process using the imprint and the subkey set for the information storage device.
- FIG. 17 is a flowchart illustrating a lock status flag update process in an imprint process for an information storage device and an unlock process using a subkey set.
- FIG. 18 is a flowchart illustrating a process of referring to a hook status flag in an unlock process for an information storage device.
- FIG. 19 is a diagram illustrating a cluster configuration as a data storage mode for the information storage device.
- FIG. 20 is a flowchart illustrating a hacking process based on reading of a specific data area (cluster).
- FIG. 21 is a diagram for explaining a configuration of a device for executing a hack / unhack for an information storage device.
- FIG. 22 is a flowchart of a process of reading the wake-up state in the host device.
- FIG. 23 is a flowchart for explaining the process at the time of the hook process in the host device and the indicator display process.
- FIG. 24 is a flowchart for explaining the processing at the time of the unlock processing in the host device and the indicator display processing.
- the information processing device 20 is equipped with an information storage device 30 such as a PC (Personal Computer) 21, a PDA (Personal Digital Assistant) 22, a mobile communication terminal 23, a digital camera 24, and the like. It is a device that can output information from the storage device 30.
- an information storage device 30 such as a PC (Personal Computer) 21, a PDA (Personal Digital Assistant) 22, a mobile communication terminal 23, a digital camera 24, and the like. It is a device that can output information from the storage device 30.
- These information processing apparatuses 20 are equipped with a memory card 30 equipped with a non-volatile memory (NVM) such as a flash memory, for example. Data is stored in the memory card 30, or data stored in the memory card is read.
- NVM non-volatile memory
- Each of PCs (Personal Computers) 21 and 22, PDAs (Personal Digital Assistants) 23, portable communication terminals 24 and digital cameras 25 may use one memory card 30 mutually.
- image data captured by a digital camera 25 is stored in a memory card 30, and then the memory card 30 is inserted into a PC 21 to display stored image data and execute image processing, or 21 In 1, contents such as music data obtained via the Internet or the like or via CD, DVD, etc. are stored in the memory card 30, and then the memory card 30 storing the contents is stored in the PDA. 22 to be used to play contents on the go using the PDA 22.
- FIG. 2 shows a configuration example of an information processing apparatus to which an information storage device such as a memory card can be attached.
- the CPU (Central Processing Unit) 101 is a processor that executes various application programs and OS (Operating System). It performs lock processing as access restriction processing for the information storage device, which is described in detail later, various encryption processing including hash value calculation and random number generation in unlock processing, and control in command transmission and reception.
- OS Operating System
- a ROM (Read Only Memory) 102 stores a program executed by the CPU 101, fixed data of calculation parameters, and the like. It stores a hacking process, an hacking process program, and the like as access restriction processing for the information storage device, which will be described in detail later.
- a RAM (Random Access Memory) 103 stores information applied to an execution program of the CPU 101, parameters that change as appropriate in the execution, and the like.
- a DSP (Digital Signal Processor) 104 performs signal processing, equalizer adjustment (audio signal processing) at the time of playback processing of content input from the information storage device 200 such as a memory card via the storage device IZF 113, for example. Performs gain adjustment corresponding to the frequency band), and performs compression / decompression (encode / decode) processing.
- the decoded and decompressed content is converted into an analog audio signal by a digital-to-analog conversion circuit 105, amplified by an amplification circuit 106, and then output to an audio output unit 1. Output via 07.
- the output of the image data is executed by the display unit 109 such as an LCD via the display controller 108.
- Digital signals or analog signals are input from an external source from the input I ZF112, and AZD conversion is performed when analog signals are input.
- the AZD conversion converts an input signal into a digital signal.
- An input digital signal from an external source is converted into a digital signal having a predetermined sampling frequency and a predetermined number of quantization bits by a sampling rate converter (SRC) and input.
- SRC sampling rate converter
- the input / output IZF 115 is an interface for connecting an external device, and performs data transfer with the connected device by performing connection in a connection mode such as, for example, USB, IE 1394.
- Flash memory is a form of electrically erasable non-volatile memory called EPROM (Electrically Erasable Programmable ROM).
- EPROM Electrically Erasable Programmable ROM
- Conventional EEPROMs have a large area occupied by one bit because one bit is composed of two transistors, and there is a limit to increasing the degree of integration. This makes it possible to implement one bit with one transistor.
- the information storage device 200 having such a flash memory is mounted on an information processing device such as a PC, a PDA, or a digital camera, and stores data input from the information processing device in the memory unit 220. Then, the data stored in the memory unit 220 is output to the information processing device.
- an information processing device such as a PC, a PDA, or a digital camera
- the information storage device 200 further includes a control unit 210, and the control unit 210 includes a CPU (Central Processing Unit) 211 and a CPU 211 serving as a processor for executing various programs. Information to be applied to the execution program of the ROM (Read Only Memory) 221 and CPU 211, which stores fixed data among the program to be executed and the calculation parameters, and the parameters that change as needed during execution And a RAM (Random Access Memory) 2 13 for storing data.
- ROM Read Only Memory
- RAM Random Access Memory
- RAM (Random Access Memory) 2 13 is the information described in detail later. It is also used as a storage area for the state value data of the hacking state that changes due to the hacking process and the hacking process as the access restriction process for the information storage device.
- the control unit 210 further includes a device interface 214 as an interface for data input / output between the information processing devices, and a data input / output interface with the memory unit 220. It has a memory interface 2 16.
- the CPU 211 includes various types of processing including a hash value calculation in an hacking process as an access restriction process, an unhinging process, a random number generation, and the like, which are performed with an information processing device described in detail later. Controls encryption processing and command transmission / reception.
- a process for enabling access restriction to a memory section (memory section 220 in FIG. 3) constituted by a flash memory or the like, which is a data storage area for information storage device 320 such as a memory card, which is a data storage area, is performed.
- the process of releasing the access restriction is called the unlock process. It is the host device 310 that executes the hacking process and the hacking process.
- the host device 310 has an interface for executing data transfer with the information storage device 320 such as a memory device, and stores information. It includes an information processing device such as a PC, a PDA, a digital camera, and a DSC (Digital Still Camera) for performing data utilization by writing data to the device 320 or reading data from the information storage device 320. Furthermore, the host device 310 also includes a lock / unlock device 3 1 2 as a device dedicated to the execution of the lock process / unlock process for the information storage device 320 such as a memory card. .
- the lock / unlock device 3 1 2 has a CPU as a control means for executing the lock / unlock processing algorithm, a ROM and a RAM as data storage memories, and further stores information such as a memory card. It has an interface for mounting the device 320 and executing data transfer, and is configured as a device dedicated to lock processing and unlock processing for the information storage device 320.
- a device that performs a hacking process and an undocking process on the information storage device 320 that is, a PC, a PDA and other information processing devices, and a lock and unlock device
- the host device including 3 12 is called.
- an ID for example, 16-byte data
- a lock key as key data used for lock processing and unlock processing
- LK for example, 8-byte data
- the set (ID, LK) of the host device identifier (ID) unique to each host device and the lock key (LK) is called a key set.
- a lock master key is stored in a memory 325 such as a ROM in a control unit in an information storage device 320 such as a memory card.
- LTK lock master key
- the lock master key (LMK) stored in the information storage device 320, the ID stored in the host device, and the lock key (LK) have the following relationship.
- H (X, Y) indicates a hash value calculation process for message ⁇ ⁇ to which key X is applied. That is, a hash key (LK) corresponding to the ID is obtained by a hash value calculation process applying the lock master key (LMK) to the ID.
- LK hash key
- LLMK lock master key
- the hash function is a one-way function, and it is very difficult to find the input from the output.
- a one-way function is applied to the ID unique to each host device using the master key (LMK) as a key, and the output is output to the lock key (ID) corresponding to the ID unique to each host device.
- LK master key
- MD5, S ⁇ , etc. can be applied as a hash algorithm. is there.
- FIG. 5 shows a processing sequence diagram executed between the host device and the information storage device in the hacking process.
- the host device and the information storage device are connected to each other so that data can be transferred.
- the host device outputs a random number generation command to the information storage device.
- the information storage device that has received the random number generation command executes a process of generating a predetermined length, for example, a 16-byte random number (Rms), and transmits the generated random number (Rms) to the host device.
- the information storage device stores the generated random numbers (Rms) in a memory such as a RAM in the control unit.
- the host device that has received the random number (Rms) from the information storage device performs encryption processing of the received random number (Rms) using the encryption key (LK) stored in advance in the memory of the host device as an encryption key: E (LK) , Rm s).
- E (X, Y) indicates the encryption process of message [Y] to which key [X] is applied.
- Various algorithms can be applied to the ⁇ signal processing algorithm, for example, a DES encryption algorithm is applied.
- the host device performs symbol processing of the received random number (Rms) using the lock key (LK) as an encryption processing key: E (LK, Rms), and as a result, the data [E (LK, Rms)] and
- the host device transmits an identifier (ID) unique to the host device, which is stored in a memory in the host device in advance, together with the lock command to the information storage device.
- the lock key (LK) corresponding to the reception ID is calculated.
- the reception ID is stored and stored in its own memory.
- the reception ID is used for the unlock process described later. Use when
- the information storage device performs an encryption process: E (LK, Rms) on the random number Rms stored in its own memory by applying the hack key (LK) obtained by the above-described hash value calculation. Then, the encryption processing data received from the host device: A collation processing is performed to determine whether or not the data matches E (LK, Rms).
- E (LK, Rms) the encryption processing data received from the host device: A collation processing is performed to determine whether or not the data matches E (LK, Rms).
- Various algorithms can be applied to the signal processing algorithm as long as it is the same algorithm as the host device.
- E (LK, Rms) If the data received from the host device: E (LK, Rms) matches the encryption processing data calculated by itself: E (LK, Rms), the host device that has a valid ID and LK combination data It determines that the request is a hacking process request, executes hacking process, and sends a lock completion notification to the host device.
- the information storage device stores and holds the key set [ID, LK] of the host device that has executed the lock processing in the memory unit 220 composed of a non-volatile memory (NVM) such as a flash memory. .
- NVM non-volatile memory
- E (LK, Rms) If the data received from the host device: E (LK, Rms) does not match the encryption processing data calculated by itself: E (LK, Rms), the host that has a valid ID and LK pair data It determines that the device is not a device, determines that the request is for a hacking process from an unauthorized device, and sends an error notification to the host device without performing the hacking process.
- the lock processing executed by the information storage device is performed by accessing a memory unit (memory unit 220 in FIG. 3) constituted by a flash memory or the like which is a data storage area for contents and the like, and then This is a process in which execution of the unpacking process to be described is set to be permitted as a condition.
- step S101 the memory card as the information storage device generates a random number (R sm) based on the reception of the random number generation request command from the host device.
- the generated random number is read out by the host device in step S102, and in step S103, the ID of the host device and the random number (Rms) are sent to the lock key of the host device together with the lock command.
- (LK) encrypted data: E (LK, Rms) is sent to the memory card as an information storage device I do.
- step S104 the memory card writes the received ID and the encrypted data: E (LK, Rms) to the memory in the information storage device.
- step S105 the memory card calculates the hash value of the received ID by applying the master key (LMK) stored in its own memory, that is,
- the memory card executes the encryption processing of the random number (Rms) generated in step S101 based on the calculated lock key (LK), and obtains the encrypted data: E ( LK, Rms) are calculated as collation data.
- step S106 the memory card hosts the encryption key data E (LK, Rms) calculated in step S105 and the lock command in step SI03.
- the host device determines that the device is a legitimate device having a paired data of a valid correct ID and a lock key (LK), and in step S107, the host device determines that the device is valid.
- the acknowledgment process that is, the setting to enable access to the memory is performed on condition that the undocking process described later succeeds.
- the information storage device stores the key set [ID, LK] of the host device that has executed the lock processing in a memory section 220 constituted by a non-volatile memory (NVM) such as a flash memory.
- NVM non-volatile memory
- step S106 the host device that has transmitted the lock command transmits the correct ID and lock key (LK). Judgment is made that the unauthorized device does not have the set data, and the error notification is sent to the host device without performing the hack process. (Unlock processing)
- FIG. 7 shows a processing sequence diagram executed between the host device and the information storage device in the unlocking process.
- the host device and the information storage device are connected to each other so that data can be transferred.
- the host device outputs a random number generation command to the information storage device.
- the information storage device that has received the random number generation command executes a process of generating a predetermined length, for example, a 16-byte random number (Rms), and generates the generated random number (Rms) and the memory at the time of the previous ping process.
- the ID of the host device that has been stored in the device that is, the ID of the host device that performed the hack process, is sent to the host device.
- the information storage device stores the generated random numbers (Rms) in a memory such as a RAM in the control unit.
- the host device that has received the ID and the random number (Rms) from the information storage device first determines whether or not the received ID matches its own ID. If they do not match, it means that another host device is executing the hack, and the hack cannot be released.
- the host device executes the encryption process of the received random number (Rms) using the lock key (LK) stored in the memory of the host device in advance as the key for the key processing: E (LK, Rms). Then, the result data is transmitted to the information storage device together with the unlock command.
- the information storage device Upon receiving the encrypted data: E (LK, Rms), the information storage device first reads the host device ID stored in its own memory, that is, the ID of the host device that has executed the hack process, The lock key (LK) corresponding to the ID of the host device that executed the lock process is calculated by the hash value calculation process that applies the lock master key (LMK) to the read ID. That is,
- the information storage device performs an encryption process: E (LK, Rms) on the random number Rms stored in its own memory by applying the hack key (LK) obtained by the above-described hash value calculation. Then, the encryption processing data received from the host device: A collation processing is performed to determine whether or not the data matches E (LK, Rms).
- E (LK, Rms) matches the encryption processing data calculated by itself: E (LK, Rms), the host with a valid ID and LK combination data It determines that the request is an unlocking process request from the device, executes the unlocking process, and sends an unlock completion notification to the host device. If they do not match, it is determined that the host device does not have a valid ID and LK pair data, it is determined that the request is for an unlocking process from an unauthorized device, and an error is detected without performing the unlocking process. Send the notification to the host device.
- the unlocking process executed by the information storage device means the cancellation of the clicking process, and a memory unit configured by a flash memory or the like which is a data storage area for contents or the like (the memory unit in FIG. 3). This is the process of setting to allow access to 220).
- step S201 a random number (R sm) is generated based on the reception of a random number generation request command from the memory card as an information storage device.
- step S202 the generated random number is read by the host device together with the ID of the host device that has performed the hacking process earlier. The host device determines that unlocking is possible when the ID read from the memory card matches its own host ID.
- step S203 the host device receives the unlock command and the received random number (Rms). Is encrypted with the lock key (LK) of the host device: E (LK, Rms) is transmitted to the memory card as the information storage device.
- LK lock key
- step S204 the memory card writes the received encrypted data: E (LK, Rms) into the memory in the information storage device.
- the memory card executes the hooking process stored in the memory during the previous hooking process.
- the read host device ID is read, and a hash value is calculated by applying the read master ID (LMK) stored in its own memory to the read ID, that is,
- the memory card performs an encryption process on the random number (Rms) generated in step S201 first, and obtains encrypted data: E ( LK, Rms) are calculated as collation data.
- the host device determines that the device is a legitimate device having a paired data of a legitimate ID and a lock key (LK). Performs the undocking process in response to the wake-up command, that is, the setting that enables access to the memory.
- the host device that has transmitted the unlock command executes the lock process. The host device determines that the host device does not have the correct ID and LK key (LK), and sends an error notification to the host device without performing unlock processing, that is, unlocking.
- the host device having the valid combination data of the lock ID (LK) corresponding to the host device ID can execute the lock process for the information storage device, and
- the unlocking process as described above can be performed only by the host device that has executed the locking process.
- only the information storage device performs the so-called one-side authentication process of executing the authentication process of the host device, so that the processing load on the host device side is reduced.
- efficient processing becomes possible.
- the lock processing and the unlock processing described above have a configuration in which a random number generated for each processing is applied on the information storage device side, it is impossible to apply the recording data in the past processing. Unauthorized processing based on traces of past processing can be effectively prevented.
- the above-mentioned hacking process and undocking process are executed as processes corresponding to the information storage device for each host device, and only the host device which has executed the lock can perform the undocking process. It was an example. However, in a configuration in which a plurality of host devices use one information storage device (memory card), an information storage device (memory card) that stores data in a certain host device (device A) and reads the data is used. A situation occurs in which another host device (device B) wants to use it.
- a process for enabling access restriction to a memory section (memory section 220 in FIG. 3) constituted by a flash memory or the like, which is a data storage area of information storage device 520 such as a memory card, is used.
- the process of releasing the access restriction is called the unlock process. This is the same as the above-described processing example.
- the host device 5100 executes the wake-up process and the undocking process.
- the host device 5100 has an interface for executing data transfer with the information storage device 5200 such as a memory device, and the information storage device.
- the information storage device 5200 such as a memory device
- the information storage device Includes information processing devices such as PCs, PDAs, digital cameras, and DSCs (digital still cameras) that perform data use by writing data to or reading data from the information storage device.
- IDs for example, 16-byte data
- key data to be applied to the hacking process and the hacking process are stored.
- Lock key (LK s) (for example, 8-byte data) is stored.
- IDs and LKs are data sets corresponding to IDs and LKs in the above-described processing example, and can be applied to the same mouthpiece processing and the same mouthlessness processing as the above-described processing.
- IDs and LKs are a primary ID and a primary lock key, which are written into a memory such as a ROM in the host device at the time of manufacturing each host device, and are data which cannot be rewritten by a user.
- These primary IDs (IDs) and primary lock keys (LKs) are used in one-to-one correspondence between host device and information storage device in the same manner as the LMK application process described above. Applicable to This key set consisting of a primary ID and a primary lock key unique to each host device: [ID s, LK s] is called a primary key set.
- This primary key set The process of applying the lock [IDs, LKs] is called the standard lock process.
- the information processing device as the host device outputs a standard lock command to the information storage device.
- the standard lock is executed, and the unlock process is executed by the output of the unlock command.
- This subkey set: [ID en, LK en] is a key that can be stored in common in a plurality of host devices, and a subkey set stored in another host device by the processing procedure described below: [ID en, LK en] can be copied and stored in another host device via the information storage device.
- Subkeyset Apply [ID en, LK en] to the information storage device (memo Lip processing), and the sub-keyset applied to the lip processing can be copied and output to another host device via the information storage device (memory card).
- the lock processing is called export processing.
- This subkey set: Lock processing using [ID en, LK en] is called export lock processing, and an information processing device serving as a host device outputs an export lock command to an information storage device.
- the export lock is executed, and the unlock process is executed by the output of the unlock command.
- the sub-keyset [IDen, LKen] obtained by the host device from the information storage device (memory card) that has been exported can be written to the memory in the host device.
- This sub-keyset copy writing process is called the implementation process.
- the implementation process forms a group consisting of a plurality of host devices having the same subkeyset: [Iden, LKen].
- the sub-key set: [ID en, LK en] is a key set applicable to the lip processing that can be output to the outside, that is, the export lip processing. , L! [E].
- n in [en] indicates the subkeyset number, which corresponds to the set number of groups.
- Each host device can store multiple different subkey sets.
- subkeyset 1 [ID el, LK e 1] is transferred from three host devices, PC (Personal Computer) —a, PC—b, and PDA (Personal Digital Assistants) —a as host devices.
- PC Personal Computer
- PDA Personal Digital Assistants
- each host device stores the primary key set [ID s, LK s] consisting of the primary ID (ID s) and primary lock key (LK s) in memory. And store it,
- PC—a is [I D e l, LK e l], [I D e 2, L K e 2]
- PC—b is [ID el, LK el]
- PDA-a is [IDel, LKe1]
- PDA-b is [IDe2, LKe2]
- the sub key set consisting of each sub ID and the sublock key is stored.
- a sub-key set consisting of a set of these sub-IDs and sub-keys: [ID en, LK en] is written in its own memory 515 to form a host device group consisting of one or more host devices.
- the members of group n apply a common sub-ID (ID n) and a common sub-lock key (L Kn) to form a single information storage device (memory card). Locking and unlocking can be performed.
- a lock master key is stored in a memory 525 such as a ROM in a control unit in the information storage device 520 such as a memory card.
- Master key (LMK) stored in the information storage device 520, ID (including ID s and ID en) stored in the host device, and lock key (LK (including LK s and LK en)) Has the following relationship with
- the correspondence between the lock master key (LMK) and the ID and LK is exactly the same as the above-described processing of applying the LM K.
- the hash value calculation processing that applies the lock master key LMK to the primary ID (ID s) The primary lock key — (LK s) is calculated, and the sub-lock key (LK en) force is calculated by a hash value calculation process using the master key LMK for the sub ID (ID en).
- (a) applies a primary key set [ID s, LK s] 531 consisting of a primary ID (ID s) unique to each host device 501 and a primary lock key (LK s) This is the standard lock process.
- the lock process is executed by outputting a standard lock command from the host device 510 to the information storage device 5200, and the unlock process is executed by outputting the unlock command.
- the primary key set [IDs] is stored in the standard lock key set storage area 54 1 of the storage unit (flash memory) of the lock information storage device (memory card) 52 , LK s] is stored.
- the primary key set [IDs, LKs] applied to the standard lock is not output from the lock information storage device (memory card) 520 to the outside.
- the unlocking (unlocking) process can be executed only by the host device that has the same primary key set [IDs, LKs], that is, the only host device that has executed the standard lock process.
- the primary key set [ID s, LK s] including the primary ID (ID s) and the primary lock key (LK s) has a one-to-one correspondence between the host device and the information storage device, just like the LMK application processing described above.
- the present invention can be applied to the lip-locking process and the lip-locking process, and the lip-locking process and the unlock process in the same processes as those described with reference to FIGS. 5 to 8 are possible.
- (b) is an export port to which a sub-key set [ID en, LK en] 532 comprising a sub-ID (ID en) that can be shared by a plurality of host devices and a sub-key (LK en) is used. Process.
- the export lock processing using the subkey set [ID en, L en] 5 32 is executed by outputting the export lock command from the host device 5 10 to the information storage device 520, and the unlock lock command is output.
- the unlock process is executed by the output.
- the sub-key set [ID en, LK en] is stored in the export lock key set storage area 542 of the storage unit (flash memory) of the lock information storage device (memory card) 520. Is stored.
- the sub-key set [ID en, LK en] applied to the export port executes the imprint processing which will be described in detail later, so that another host device can execute the lock operation.
- Information storage device (memory card) obtained from 520 It is possible to do.
- the lock release (unlock) processing can be executed only by the host device that executed the lock processing and the subkey set [ID en] applied to the export lock by the implement processing. , LK e ⁇ ].
- a sub-key set [ID en, LK en] 532 consisting of a sub-ID (ID e ⁇ ) and a sub-key (LK e ⁇ ) that can be shared by each host device 501 is applied.
- This is the standard lock process. This process is called a group process.
- a standard lock command is output from the host device 5 10 to the information storage device 5 20.
- the unlock process is executed by the output of the unlock command.
- the key set applied in this process is the subkey set [IDen, LKen] 532.
- the key set to be applied is the subkey set [IDen, LKen] 532.
- the sub key set [ID en, LK en] is stored in the standard lock key set storage area 541 of the storage section (flash memory) of the lock information storage device (memory card) 520. Is stored.
- the sub key set [ID en, LK en] applied to the group lock is stored in the standard lock key set storage area 541, so that the lock information storage device (memory) No output is made from the card (520).
- the host device that has the same subkey set [ID en, LK en] can execute the group lock release (unlock) process. However, in this case, not only the host device that executed the group hack, but also the host device that already obtained the same sub key set [ID en, LK en] in advance. For example, the same subkey set [ID en, LK en] is applied in advance. The host device that has obtained the same supkey set [ID en, LK en] by imprinting at the time of the export process is executed, and stores the same in memory. Mouth can be made.
- the sequence of the standard lock applying the subkey set [ID en, LK en], that is, the lock processing and unlock processing in the group lock is the same as the LMK application processing described above (see FIGS. 5 to 8). . However, the difference is that there can be multiple host devices that can execute lock / unlock due to imprint processing.
- the sub-ID (ID en) and sub-key (LK en) that can be shared by multiple host devices, that is, the lock processing using the sap key set [ID en, LK en], and the information storage device (
- This section describes the process of storing the subkey set [ID en, LK en] in the host device via the memory card (printing process) and the process of unlocking the export device to release the export lock.
- the sub-keyset: [ID en, LK en] is applied to the information storage device (memory card), and the sub-key set applied to the information processing device (memory card) is processed. This enables export processing that enables copy output to other host devices via the.
- FIG. 11 shows a processing sequence diagram executed between the host device and the information storage device in the hacking process based on the sapki set.
- the host device and the information storage device are connected to each other so that data can be transferred.
- the information storage device has a mouth click status flag 5 5 1 1 1, to hold a value indicating mouth click state in the information storage device.
- the upper NVM is a memory section 220 composed of a flash memory and the like described in FIG.
- N VM (Non-Volatile Memory) area is a flag stored in the area
- the lower row is a flag stored in RAM213 in the control unit 210.
- SL is the standard lock
- EL is the export lock
- 1 indicates the locked state
- 0 indicates the unlocked state.
- the standard lock is a lock mode in which the external output of the key set [ID, LK] applied to the lock is not allowed
- the information storage device (memory card) has a data storage area in the memory section (flash memory (NVM)) for storing the key set applied to the standard lock and the key set applied to the export lotter, respectively.
- flash memory flash memory
- the host device In this initial state, first, the host device outputs a random number generation command to the information storage device.
- the information storage device that has received the random number generation command executes a process of generating a random number (Rms) of a predetermined length, for example, 16 bytes, and transmits the generated random number (Rms) to the host device.
- the information storage device stores the generated random numbers (Rms) in a memory such as a RAM in the control unit.
- the host device Upon receiving the random number (Rms) from the information storage device, the host device encrypts the received random number (Rms) using the sub-key (LKen) stored in the memory of the host device in advance as an encryption processing key. Processing: Execute E (LK en, Rms). Various algorithms can be applied to the ⁇ No. processing algorithm, for example, the DES No. ⁇ processing algorithm is applied.
- the host device performs symbol processing of the received random number (Rms) using the sap lock key (LKen) as an encryption processing key: E (LKen, Rms), and executes the resulting data [E (LKen, Rms)). ], And the sub ID (ID en) as a set of data corresponding to the sap lock key (LK en) stored in the memory in the host device in advance, together with the lock command, to the information storage device.
- the information storage device that has received the ID en, E (LK en, Rms) first sends the received master ID (LMK) stored in its own memory to the received sub ID (ID en).
- the sub-hook key (LKen) corresponding to the reception server ID (ID en) is calculated by the applied hash value calculation processing. That is,
- a sub-key (LKen) corresponding to the reception sub-ID (IDen) is calculated.
- the reception sub ID (IDen) is stored and held in its own memory.
- the reception sub ID (IDen) is used at the time of unpacking processing described later.
- the information storage device executes a cryptographic process: E (LK en, Rms) using the suplock key (LK en) obtained by the above hash value calculation on the random number Rms stored in its own memory. Then, a collation process is performed to determine whether or not it matches the symbol processing data received from the host device: E (LKen, Rms).
- E (LKen, Rms) Various algorithms can be applied as long as the encryption algorithm is the same as that of the host device.
- the valid sub-ID (ID en) is obtained. It determines that the request is a processing request from a legitimate host device that has a set of sub-keys (LK en), executes the export process, and sends a notification of the completion of the process to the host device. Send. In the case of a mismatch, it is determined that the host device does not have a pair data of a valid sub ID (ID en) and a suplock key (LK en). The error notification is transmitted to the host device without performing the lock process.
- the export process performed by the information storage device is An access to a memory section (memory section 220 in FIG. 3) constituted by a flash memory or the like, which is a data storage area, is executed by executing an unlocking process using a sub ID and a sub lock key described below.
- the export key set applied to the exporter: [ID en, LK en] is stored in the memory part of the information storage device (memory card) (flash memory (NVM)). It is stored in the export lock key set storage area. Further, the lock status flag is rewritten.
- the subkey stored in the set storage area can be output to another host device by an imprint process described later.
- step S301 the memory card as the information storage device generates a random number (R sm) based on the reception of the random number generation request command from the host device.
- the generated random number is read by the host device in step S302, and in step S303, the sub-ID (ID en) already stored in the storage unit of the host device together with the lock command is read.
- the received random number (Rms) is stored in the storage unit of the host device.
- Data is encrypted with K en) to generate data: E (LK en, Rms) and these concatenated data: ID en, E (LK en, R ms) are transmitted to the memory card as an information storage device I do.
- step S304 the memory card writes the received sub ID (IDen) and the encrypted data: E (LKen, Rms) to the memory in the information storage device.
- step S305 the memory card applies the lock master key (LMK) stored in its own memory to calculate the hash value of the received sub ID (IDen), that is,
- the memory card performs an encryption process on the random number (Rms) generated in step S301 based on the calculated sub-key (LKen) to obtain the encrypted data: E ( LK en, Rms) is calculated as collation data.
- step S306 the process proceeds to step S308.
- the host device that sent the lock command determines that the device is unauthorized and does not have the correct sub-ID (ID en) and sub-hook key (LK en) paired data, and executes the hooking process. Instead, an error notification is sent to the host device.
- the information storage device subjected to the export process uses the same sub-key set [ID en, LK en] can be unlocked by the same processing procedure as the unlocking process described in [Processing Based on Lock Master Key (LMK)] above. .
- unlocking is possible by replacing the applied ID and lock key with the sub ID (IDen) and sublock key (LKen).
- other host devices that do not have the same key set as the sub-key set [ID en, LK en] that performed the hacking process will send the sub-key set [ID en, LK en Unless [en] is obtained, the information storage device cannot be unlocked, that is, cannot be accessed.
- a host device having a primary key set [ID s, LK s] as a set of a valid primary ID (ID s) and a primary lock key (LK s) is used as an information storage device having an export lock.
- the stored sub-key set [ID en, LK en] can be obtained from the information storage device, and the obtained sub-key set [ID en, LK en] is applied to release the hook. Becomes possible. Acquisition of the subkey set [IDen, LKen] via the information storage device is called imprint processing.
- the mouth state is determined based on a certain subkey set [ID en, LK en], and the mouth state in which the sub key set [ID en, LK en] can be output to another host device is exported. It is referred to as a lip lock state.
- the host device obtains (imprints) the subkey set [ID en, LK en] applied to the expo trotta processing from the information storage device in the export port state, thereby obtaining the same sap set [ID].
- en, LK en] is a member of a group consisting of multiple host devices that have After that, the lock can be released by applying the obtained subkey set [ID en, LK en].
- the details of the imprint and the unlocking process will be described below. (Imprint and unlock processing)
- the host device From the information storage device locked by the export process described above, the host device obtains a subkey set consisting of a sublock key (LK en) and a sub ID (ID en) [ID en, LK en].
- LK en sublock key
- ID en sub ID [ID en, LK en].
- FIG. 13 shows a processing sequence diagram of imprint processing and unlock processing executed between the host device and the information storage device.
- the host device and the information storage device are connected to each other so that data can be transferred therebetween.
- the host device does not have the sub key set [ID en, LK en] including the sub ID (ID en) and the sub key (LK en) applied to the export storage device for the information storage device.
- the device stores the sub key set [ID en, LK en] in the export key storage area.
- the information storage device is in a so-called export lock state.
- the host device outputs a random number generation command to the information storage device.
- the information storage device that has received the random number generation command executes a process of generating a predetermined length, for example, a 16-byte random number (Rms), and stores the generated random number (Rms) in the memory at the time of the previous export poke process.
- the sub ID (ID en) in the sub key set [ID en, LK en] applied to the report lock processing is transmitted to the host device.
- the information storage device stores the generated random numbers (Rms) in a memory such as a RAM in the control unit.
- the host device that has received the sub ID (ID en) and the random number (Rms) from the information storage device first makes the receiving sub ID (ID en) its own primary ID (ID s) Is determined. If they match, unlocking using the same primary lock key (LK s) as in the LMK application process (see Fig. 7) is possible.
- receiving sub ID (ID en) does not match its own primary ID (ID s), it means that a lock has been performed by another host device, but this receiving sub ID (ID en) , And sublock key (LKen) can be assigned to the same group as another host device that has executed the export lock using the subkey set [ID en, LK en] Obviously
- the sub-key set [IDen, LKen] is stored in its own memory by executing the implementation process to obtain the sub-ID (IDen) and the sub-lock key (LKen), respectively, and as a set of these data. Then, it becomes a host device belonging to the group, and it becomes possible to release the export lock by applying the acquired subkey set [ID en, LK en].
- the host device stores the sub-ID (IDen) received from the information storage device in the memory.
- the host device that executes the implementation process then performs encryption processing of the received random number (Rms) using the primary lock key (LK s) previously stored in the memory in the host device as the encryption processing key: E (LK s, R ms) is executed, and the result data and the primary ID (ID s) are transmitted to the information storage device together with the standard lock command.
- This lock process is a process to apply a standard lock with the primary lock key (LK s) to the information storage device that has already been exported with the sub lock key (LK en). This is called a lock process.
- LK s primary lock key corresponding to the primary ID (ID s) is calculated.
- the information storage device applies a primary key (LK s) obtained by the above-described hash value calculation to the random number Rms stored in its own memory.
- E (LK s, Rms) And executes the collation processing to determine whether or not it matches the encryption processing data received from the host device: E (LK s, Rms). If the data received from the host device: E (LKs, Rms) and the signal processing data calculated by itself: E (LKs, Rms) match, a valid primary ID (IDs) is obtained.
- the host device having the primary key set [ID s, LK s] as the primary lock key (LK s) set data is determined to be an upper lock processing request from the host device, and the over lock process is executed. A lock completion notification is sent to the host device.
- E (LKs, Rms) If the received data from the host device: E (LKs, Rms) does not match the encryption processing data: E (LKs, Rms) calculated by itself, a valid primary ID (IDs) is used. Judgment that the host device does not have the primary key set [ID s, LK s] as the primary lock key (LK s) group data, and that it is an over-hook processing request from an unauthorized device Then, an error notification is sent to the host device without performing the overhook process.
- IDs primary ID
- the over-lock processing executed by the information storage device is a state in which the standard lock is further superimposed on the export lock state, and the acknowledgment status flag of the information storage device is as shown in the figure.
- the host device that has received the overlock completion notification shall continue the imprint process and the lock release.
- the host device transmits the random number utterance command to the information storage device again.
- the information storage device that has received the random number generation command newly performs a process of generating a second random number (Rms2),
- the information storage device stores the generated random number (Rms2) in a memory such as a RAM in the control unit.
- the host device that receives the data: IDs, Rms2, IDen, E (LKs, LKen) from the information storage device first stores the encrypted data: E (LKs, LKen) in its own memory. Decrypt by applying the stored primary lock key (LK s) to obtain the sap lock key (LK en). This is the sub-key (LKEn) corresponding to the previously acquired sub ID (IDen), and stores the obtained sub-key set [IDen, LKen] in the memory. With this implementation procedure, this host device can belong to the group of group No.n.
- the host device determines the information based on the sub-lock key (LK en) obtained by decrypting the encrypted data received from the information storage device: E (LK s, LK en) using the primary lock key (LK s).
- the random number (Rms2) received from the storage device is encrypted, and encrypted data: E (LKen, Rms2) is generated and transmitted to the information storage device together with the unlock command.
- the information storage device that has received the encrypted data: E (LKen, Rms2) from the host device together with the unlock command, first sends the encrypted master key to the sub ID (ID en) stored in its own memory. (LMK) applied hash
- the sub value key (LK en) corresponding to the sub ID (ID en) is calculated by the key value calculation process. That is,
- the information storage device performs encryption processing by applying the sub-key (LKen) obtained by the above-described hash value calculation to the random number Rms2 stored in its own memory: E (LKen, Rms 2) is executed, and a check is performed to determine whether or not the encryption processing data received from the host device: E (LKen, Rms 2). If the data received from the host device: E (LKen, Rms2) matches the encryption processing data calculated by itself: E (LKen, Rms2), a valid sub-ID (IDen) Release the lock from the host device that has the data of the pair of sub-keys (LKen), that is, determine that the request is an unlocking process, execute the unlocking process, and notify the host of the completion of unlocking. Send to device.
- E (LKen, Rms 2) is executed, and a check is performed to determine whether or not the encryption processing data received from the host device: E (LKen, Rms 2). If the data received from the host device: E (LKen, Rms2) matches
- E (LKen, Rms2) and the encryption processing data calculated by itself: E (LKen, Rms2) do not match, a valid support ID (ID) en) and the sub-key set [ID en, LK en] as the sub-key set (ID en, LK en).
- ID valid support ID
- the lock status flag change sequence first, the storage flag of the RAM in the control unit is rewritten, and then, for example, the flag information in the RAM is copied to the NVM before the power-off is executed as appropriate. This is a sequence in which the NVM flag information is copied to the RAM, and the control unit executes access restriction processing based on the RAM flag information.
- step S401 the memory card as the information storage device generates a random number (R sm) based on the reception of the random number generation request command from the host device.
- the generated random number is transmitted to the information storage device by the host device that previously executed the export lock process in step S402, and is stored in the export lock key set storage area of the memory unit of the information storage device. It is read by the host device together with the sub ID (ID en). At this point, the host device acquires the sub ID (IDen) in the subkey set [IDen, LKen].
- the host device confirms that the sub ID (ID en) read from the memory card and its own primary ID (ID s) do not match, so that the information storage device is not in the standard It is determined that it is in the state.
- step S403 the host device encrypts the received random number (Rms) with the primary lock key (LKs) of the host device together with the standard lock command as an over-the-top.
- Digitized data: E (LKs, Rms) and its own primary ID (IDs) are transmitted to a memory card as an information storage device.
- step S404 the information storage device (memory card) stores the primary ID (IDs) received from the host device and the encrypted data: E (LKs, Rms) in the memory in the information storage device.
- the memory card executes encryption processing of the random number (Rms) generated in step S401 first, and obtains encrypted data: E ( LK s, Rms) are calculated as collation data.
- the memory card hosts the encrypted data calculated in step S405: E (LKs, Rms) and the standard lock command in step S403.
- E (LKs, Rms) E (LKs, Rms) )? ].
- the host device determines the primary key set [ID s] as a set of valid and correct primary ID (ID s) and primary lock key (LK s).
- ID s primary ID
- LK s] is determined to be a valid device, and in step S407, a standard lock process is executed in accordance with the standard lock command.
- This is an overlock process in which the standard lock is further superimposed on the export lock state.
- the lock status flag of the information storage device is set in the RAM to indicate that the export lock and the standard lock are both valid.
- step S 406 if it is determined in step S 406 that the two values are not equal in step S 406, in step S 408, the host device that has transmitted the standard lock command transmits a valid primary ID (ID s) and the primary lock key (LK s), it is determined that the host device does not have the primary key set [ID s, LK s] as the set data. One notification is sent to the host device.
- ID s primary ID
- LK s primary lock key
- Standard lock is performed as overlock processing in step S407, and further.
- the process proceeds to step S501 in FIG.
- the host device that has received the notification of completion of over-acknowledging transmits the random number generation command to the information storage device again, and the information storage device that has received the random number generation command renews the random number generation command in step S501.
- the process of generating a random number of 2 (Rms2) is executed.
- IDs Primary ID
- IDen sub ID
- step S503 the host device transmits an unlock command as a hook release request to the information storage device.
- the host device transmits encrypted data E (LKen, Rms2) together with the unlock command.
- the method of generating the encrypted data E (LKen, Rms2) follows the following procedure.
- the host device that has read the data: IDs, Rms2, IDen, E (LKs, LKen) from the information storage device firstly encrypts the data: E (LKs, LKs, LKen).
- LK en) is decrypted by applying the primary lock key (LK s) stored in its own memory to obtain a sublock key (LK en). This is the sublock key (LKen) corresponding to the subID (IDen) obtained earlier.
- the host device performs an encryption process on the random number (Rms2) received from the information storage device based on the sap lock key (LKen), and generates encrypted data: E (LKen, Rms2). Generate.
- the host device stores the obtained subkey set: [IDen, LKen] in the memory, and the imprint process is completed. That is, the host device belongs to the group No. n by the imprint process.
- step S504 the information storage device that has received the encrypted data: E (LKe ⁇ , Rms2) from the host device writes the received data: E (LKen, Rms2) to the memory. Further, in step S505, calculation of collation data is executed.
- a lock master key (LMK) is assigned to a sub ID (ID en) stored in its own memory.
- the sub-key (LKen) corresponding to the sub-ID (ID en) is calculated by the applied hash value calculation processing. That is,
- the suplock key (LKen) corresponding to the sub ID (IDen) is calculated. Further, by using the random number Rms2 generated in step S501 and stored in the memory, an encryption process using the sub-key (LKen) obtained by the hash value calculation described above: E (LKen, Execute Rms 2) to generate collation data. In step S506, the information storage device determines whether the collation data: E (LKen, Rms2) matches the encryption processing data: E (LKen, Rms2) received from the host device. The collation process is performed.
- E (LK en, Rm S 2) matches the encryption processing data calculated by itself: E (LK en, Rm s 2), a valid sub-ID (ID en) It is determined that the request from the host device having the sub-key set [ID en, LK en] as the sub-key key (LK en) pair data is released, that is, the request is for the un-lack processing, Proceeding to step S507, an unlock process is executed, and an unlock completion notification is transmitted to the host device.
- step S is performed.
- an error notification is sent to the host device.
- multiple host devices have a common sap key set [ID e ⁇ , LK en] and can lock and unlock using one information storage device (memory card).
- the subkey set [ID en, LK en] can be copied and stored in another host device via the information storage device, thereby enabling flexible group formation.
- the copy of the subkey set [ID en, LK en] to the host device that is, the imprint, possesses a valid primary ID (ID s) and a primary lock key (LK s), and Sub-key set for unauthorized devices [ID en, LK en] Copy (imprint) can be prevented.
- the subkey set [IDen, LKen] is stored in the standard lock key storage area (see Fig. 10) of the information storage device, and the copy output to other host devices is not performed. Not done. In other words, only the host device that has already acquired the same subkey set [IDen, LKen] can be accessed by normal unlocking without imprinting.
- the information storage device unlocked in this way is obtained by an unauthorized third party due to loss, theft, or the like, the memory can be freely accessed. Such a situation is not desirable when storing confidential information.
- the example described below is made in view of the above-mentioned problem. Even when the host device turns off the power after unlocking the export port by the unlock process, the export port lock is performed. In this example, the information storage device is allowed to access the memory when the power of the information storage device is turned on again on condition that the export lock is released.
- a primary key set [IDs, LKs] including a primary ID (IDs) and a primary lock key (LKs) is stored in a memory such as a ROM in the host device.
- a master key (LMK) is stored in a memory such as a ROM in a control unit in an information storage device such as a memory card.
- the master key (LMK) stored in the information storage device, the ID (including ID s and ID en) stored in the host device, and the lock key (LK (including LK s and LK en)) are as follows: Have a relationship.
- Lock processing and unlock processing based on the primary ID (ID s) and primary lock key (LK s) by the host device are executed in the same sequence as described in [Process based on lip master key (LMK)].
- the lock processing based on the sub ID (ID en) and the sublock key (LK en) is executed by the same sequence as that described in the above [Lock processing configuration in device group].
- a description will be given of the process of maintaining the acknowledgment status flag in the imprint and unlock processes in this processing example. (Maintenance processing of the lip status flag in the imprint and unpacking processing)
- a sub-key set consisting of a sub-key (LK en) and a sub-ID (ID en) [ID en, LK en Figure 16 shows the imprint process for acquiring the information storage device, the unlock process for unlocking the information storage device that has been locked by the export lock process, and the process for maintaining the status flag of the lock executed by the information storage device. This will be described with reference to the following.
- the sequence diagram shown in FIG. 16 is executed between the host device described with reference to FIG. 13 and the information storage device in [Lock processing configuration in device group]. It is basically the same as the processing sequence diagram of the imprint processing and export lock unlock processing, and the processing procedure is also the same.
- the information processing device executes the NVM flag setting process after the completion notification of the unlocking executed as the final process of the sequence diagram.
- EL 0 indicating export lock release
- S indicating standard lock release 0 was set for N VM and RAM.
- FIG. 17 is a flow for explaining the processing procedure in the information storage device after receiving the unlock request (unlock command) in the sequence diagram of FIG. 16 (similar to FIG. 13). .
- step S601 when the information storage device (memory card) receives a lock release request (unlock command), the information storage device performs a verification process for determining whether or not the unlock command can be executed.
- step S602 the encrypted data received from the host device together with the unlock command: E (LK en, Rms 2), and the encrypted data generated by itself: E (LK en, Rms) 2) Execute the collation processing with. This process is the same as that described in [Hack Processing Configuration in Device Group].
- step S 607 If the data received from the host device: E (LK en, Rms 2) does not match the signal processing data calculated by itself: E (LK en, R ms 2), step S 607 In, an error notification is returned to the host, and the process ends.
- the power supply to the information storage device was stopped because the information storage device (memory card) was removed from the host device, and the NVM was set to NVM when the power was turned on again.
- the processing flow in FIG. 18 shows the processing when the power of the information storage device is once turned off and the power supply is turned on again.
- step S701 when the information storage device (memory card) is switched from the power-off state to the on-state, for example, by being set in the host device, the information storage device returns to the NVM in step S702. Copy the lip status flags (SL, EL) stored in the RAM of the control unit.
- the control unit executes control according to the status flag of the RAM.
- step S703 when a memory access request or an unlock command is input from the connected host device, the control unit of the information storage device Refer to the lock status flag of.
- step S704 in the processing flow of FIG. 18 is made.
- the result is Yes, and the process of step S705, that is, the memory access permitting process on the condition of the export lock release process (see FIGS. 13 to 15) is performed.
- the external device is in the export lock (EL) state in which the external output of the key set applicable to the hacking process or the hacking process is allowed
- the state information that can determine whether the external output of the key set applicable to the lock processing or the unlock processing is in the standard lock (SL) state where the external lock is not allowed.
- the information before the unlock process of the lock status flag is stored in the NVM, so that when the information storage device is turned on again after the power is turned off, it is unlocked based on the flag stored in the NVM. It is possible to faithfully reproduce the state of the mouth before the lock processing.
- the export lock state is maintained, and when the power of the information storage device is turned off and then turned on again, Memory access can be permitted on condition that the lock is released. Therefore, the hacking can be released only when the host device having the valid primary key set [ID s, LK s] executes the predetermined procedure including the above-mentioned over hacking process. Access can be eliminated.
- the reading of data from the information storage device (memory card) to the host device is monitored by the control unit of the information storage device, and the execution of reading of a predetermined data area (for example, a specific cluster) is triggered.
- a predetermined data area for example, a specific cluster
- the reading of data stored in the memory unit (memory unit 220 in FIG. 2) of the information storage device (memory card) is performed, for example, by using a reproduction management file generated in accordance with the stored data.
- the data is managed by an aisle (PBLIST), and the control unit reads data from the memory unit (the memory unit 220 in FIG. 2) according to the reproduction management file and outputs the data to the host device.
- control unit of the information storage device can monitor the read data.
- audio data compressed by ATRAC 3 can monitor a cluster as a predetermined data unit as a read data unit.
- audio data compressed by ATRAC 3 is composed of a cluster consisting of a plurality of SUs (sound units) as the minimum data unit, and a part composed of a plurality of clusters.
- SU sound unit
- a cluster is data consisting of several SUs (for example, two SUs). If one cluster consists of 42 SUs, one cluster can represent about 1 second of sound.
- Each cluster is assigned a logical number unique to each cluster, and is managed by the logical number.
- the control unit 210 (see FIG. 3) of the information storage device can check whether or not a specific cluster has been read based on the logical number. For example, when the output data is a music content, the logical number of one or more clusters corresponding to the intro or rust portion of the music content is extracted as a cluster corresponding to the content and extracted.
- the set cluster logical number is set as registration information corresponding to the content, and is stored together with the memory unit (flash memory) for storing the content.
- the registration information is temporarily stored in a memory (RAM) in the control unit of the information storage device. If the cluster matches the logical number of the cluster corresponding to the hack, perform the hack process.
- the timing of the lock processing may be the start time of reading the lock-capable cluster, the end time of reading the lock-capable cluster, or the lock-capable cluster.
- Various settings such as the end time of reading the entire content can be made. A detection process corresponding to the settings is executed, and a hack process is performed based on the detection of the setting conditions. If the lock is executed, re-reading must execute the unlock process.
- step S801 when the power of the information storage device is turned on, in step S802, the acknowledgment status flag stored in the NVM;) is stored in the control unit 210 (see FIG. 3). ) Is copied and stored in RAM 2 13. The control unit executes control according to the status flag of the RAM 2 13.
- the unlocking process is the same as the process described with reference to FIGS. 7 and 8, for example.
- the verification process in the information storage device verifies that the host device has a valid primary ID and primary lock key, and if the unlock succeeds (S805: Yes), the step S Proceed to 8 06. If unlocking has failed, an error notification is issued to the host device in step S810, and the process ends.
- step S806 the lock status flags of the RAM and NVM are updated based on the successful unlocking, that is, the setting process of S0 indicating the unlocked state is executed.
- step S 807 when data reading from the host device is started, the control unit of the information storage device monitors in step S 807 whether or not there is a preset reading process of the cluster corresponding to the hook. I do.
- Unlock processing can be performed only by the host device that has the same primary ID (ID s) and primary lock key (LK s) as the one that executed the lock, and the locked information storage device (memory card Will be prevented from being used randomly.
- the lock information is set to be released when the information storage device is turned off, or as described above, the lock status flag is set in the NVM even when the power is turned off, and the lock status flag of the NVM is turned on when the power is turned on again. May be copied to the RAM of the control unit, and the locked state before the power is turned off may be maintained and reproduced.
- the same configuration is also applied to the export lock, that is, the configuration is such that the reading of a predetermined data area is used as a trigger to apply the export port. Is possible.
- Fig. 21 shows an example of the configuration of the lock-Z unlocking dedicated device, which has an indicator for indicating the status of the lock and various processing switches.
- a lock / unlock dedicated device 720 having an interface capable of data transfer with the memory card 710 as an information storage device is used as a lock status indicator. [Unlocked] indicator that indicates the unlocked state 7 2 1 [Locked] indicator that indicates the unlocked state 7 2 2
- FIG. 21 shows an example of an indicator configuration and a processing request switch configuration example of a mouthpiece unlocking dedicated device
- the host device includes an information processing device such as a PC and a PDA, and a DSC and the like.
- an information processing device such as a PC and a PDA, and a DSC and the like.
- Various devices such as digital cameras and mobile communication terminals are included, and in these devices, a command transmission configuration to an information storage device (memory card) via respective input means is possible.
- FIG. 22 is a flowchart for explaining a hook state reading process executed when an information storage device (memory card) is connected to the host device, for example.
- the hook state reading process may be executed by a command input by the user, or may be automatically executed when an information storage device (memory card) is connected to the host device.
- step S901 the lip state is read from the information storage device. This state information is based on the acknowledgment status flag stored in the RAM 2 13 of the control unit 210 (see FIG. 3) of the information storage device described above.
- step S902 the indicators 72:! To 724 corresponding to the lip states are turned on based on the lip state read information. That is, when the standard lock or group lock is executed, the [Locked] indicator 722 indicating the lock status is displayed (lit), and when the export locker is executed, the export is performed. [ ⁇ — Locked] indicator 7 23 indicating the lock status is displayed (lit), and if not locked, [Unlocked] indicator 7 21 indicating the unlocked status is displayed (lit). .
- the click processing is executed based on the input by the processing request switches 73 2 to 7 34 in FIG.
- step S911 the locked state of the information storage device (memory card) is detected. If not, the error (ERR) indicator is displayed in step S914. Display. A If it is in the unlocked state, in step S912, either the standard lock process, the export lock process, or the group hack process is executed. Activates the display of the lip indicator, ie, the [Locked] indicator 72 2 indicating the lip status, or the [E—Locked] indicator 72 3 indicating the lip status of the export .
- the lip indicator ie, the [Locked] indicator 72 2 indicating the lip status, or the [E—Locked] indicator 72 3 indicating the lip status of the export .
- the unlocking process is executed by pressing the unlocking request switch 731 in FIG.
- the locked state of the information storage device is first detected.
- the state detection is executed based on the acknowledgment status flag of the RAM in the control unit described above. If it is not in the lip state (step S921: No), the display of the error (E RR) indicator 724 is executed in step S923.
- step S922 of reading the lock state it is determined whether the information storage device is in the export lock state or the standard lock state. Based on the lock status flag described above, it is determined whether it is in the export lock state or the standard lock state. Based on the identification result, the indicators 72 1 to 72 4 corresponding to the lip states shown in FIG. 21 light up.
- step S924: Yes the imprint and unpack process described with reference to FIGS. 16 to 18 is executed.
- step S925 the over-lock processing by the primary ID (IDs) and the primary lock key (LKs) shown in step S925, the sub-ID (IDen) of step S926 and the sublock key (LKen)
- step S927 the implementation (input storage) processing
- step S927 the unlocking processing using the sub ID (ID en) and the suplock key (LK en) in step S927.
- the details of this processing are as described above with reference to FIGS. 16 to 18.
- the unlock indicator 721 is displayed in step S922.
- step S922 if the lock state is other than the port lock, that is, if the lock state is the standard lock state, it is determined in step S922 whether or not the standard lock has been performed. If there is a lock, an unlock process is executed in step S930.
- the key set applied to this unlocking process is the primary key set [IDs, LKs] or, in the case of a group lock, the subkey set [IDen, LKen].
- a lock release indicator 7 21 is displayed in step S 9 28.
- step S924 the lock state is other than the export lock. If it is determined in step S929 that the lock is not the standard lock, the flow advances to step S931 to display an error (ERR) indicator 724. Is done.
- ERP error
- the series of processes described in the specification can be executed by hardware, software, or a composite configuration of both.
- executing the processing by software install the program recording the processing sequence in the memory of the computer built in dedicated hardware and execute it, or use a general-purpose computer that can execute various processing It is possible to install and run the program on a computer.
- the program can be recorded in a hard disk or a ROM (Read Only Memory) as a recording medium in advance.
- the program can be temporarily or permanently stored on a removable recording medium such as a flexible disk, CD-ROM (Compact Disc Read Only Memory), MO (Magneto optical) disk, DVD (Digital Versatile Disc), magnetic disk, or semiconductor memory. Can be stored (recorded).
- a removable recording medium can be provided as so-called package software.
- the program can be installed on the computer from the removable storage medium as described above, or transferred from the download site wirelessly to the computer, or wired to the computer via a network such as a LAN (Local Area Network) or the Internet.
- the computer can receive the transferred program and install it on a recording medium such as a built-in hard disk.
- a system is a logical set configuration of a plurality of devices, and is not limited to a device in which each component is in the same housing.
- INDUSTRIAL APPLICABILITY As described above, according to the configuration of the present invention, according to the configuration of the present invention, in the information storage device such as the memory card, the information from the memory in response to the request from the host device connected to the information storage device is obtained.
- the read data area determination process is executed based on the logical number of the cluster as the area information of the data stored in the memory, and the single or continuous clusters are determined.
- the acknowledgment status information is stored in the nonvolatile memory (NVM) in which the storage information is maintained even after the power is turned off.
- NVM nonvolatile memory
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/487,070 US20040236919A1 (en) | 2002-06-25 | 2003-06-19 | Information storage device, memory access control method, and computer program |
EP03760901A EP1519277A1 (en) | 2002-06-25 | 2003-06-19 | Information storage device, memory access control method, and computer program |
KR10-2004-7002773A KR20050013523A (ko) | 2002-06-25 | 2003-06-19 | 정보 기억 장치, 및 메모리 액세스 제어 방법, 및 컴퓨터프로그램 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002-183880 | 2002-06-25 | ||
JP2002183880A JP3979194B2 (ja) | 2002-06-25 | 2002-06-25 | 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004001610A1 true WO2004001610A1 (ja) | 2003-12-31 |
Family
ID=29996692
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/007782 WO2004001610A1 (ja) | 2002-06-25 | 2003-06-19 | 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム |
Country Status (6)
Country | Link |
---|---|
US (1) | US20040236919A1 (ja) |
EP (1) | EP1519277A1 (ja) |
JP (1) | JP3979194B2 (ja) |
KR (1) | KR20050013523A (ja) |
CN (1) | CN1292357C (ja) |
WO (1) | WO2004001610A1 (ja) |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE602005013344D1 (de) * | 2005-01-19 | 2009-04-30 | St Microelectronics Srl | Erweiterte sichere Speicherzugriffsmethode und Archtitektur |
US20080189557A1 (en) * | 2005-01-19 | 2008-08-07 | Stmicroelectronics S.R.I. | Method and architecture for restricting access to a memory device |
US7409532B2 (en) | 2005-03-24 | 2008-08-05 | International Business Machines Corporation | Method and apparatus for extending operations of an application in a data processing system |
CN101233469B (zh) * | 2005-07-21 | 2013-06-05 | 克莱夫公司 | 存储器加锁系统 |
ATE499658T1 (de) * | 2005-08-03 | 2011-03-15 | St Ericsson Sa | Sicheres endgerät, routine und verfahren zum schützen eines geheimen schlüssels |
US7613891B2 (en) * | 2006-05-04 | 2009-11-03 | Intel Corporation | Methods and apparatus for providing a read access control system associated with a flash device |
CN101377760B (zh) * | 2007-08-30 | 2010-06-02 | 佛山普立华科技有限公司 | 影像文件保护系统及其方法 |
US10783232B2 (en) | 2007-09-27 | 2020-09-22 | Clevx, Llc | Management system for self-encrypting managed devices with embedded wireless user authentication |
US10778417B2 (en) | 2007-09-27 | 2020-09-15 | Clevx, Llc | Self-encrypting module with embedded wireless user authentication |
US10181055B2 (en) * | 2007-09-27 | 2019-01-15 | Clevx, Llc | Data security system with encryption |
US11190936B2 (en) * | 2007-09-27 | 2021-11-30 | Clevx, Llc | Wireless authentication system |
US20100174913A1 (en) * | 2009-01-03 | 2010-07-08 | Johnson Simon B | Multi-factor authentication system for encryption key storage and method of operation therefor |
US9286493B2 (en) * | 2009-01-07 | 2016-03-15 | Clevx, Llc | Encryption bridge system and method of operation thereof |
JP5349114B2 (ja) * | 2009-03-31 | 2013-11-20 | 株式会社バッファロー | 記憶装置 |
JP5419776B2 (ja) | 2010-03-30 | 2014-02-19 | ルネサスエレクトロニクス株式会社 | 半導体装置及びデータ処理方法 |
JP2012108672A (ja) * | 2010-11-16 | 2012-06-07 | Toshiba Corp | 記録媒体 |
JP2012234334A (ja) * | 2011-04-28 | 2012-11-29 | Toshiba Corp | メモリ装置 |
CN103797491B (zh) * | 2011-09-28 | 2017-06-23 | 惠普发展公司,有限责任合伙企业 | 对存储设备进行解锁 |
JP5734492B1 (ja) * | 2014-05-08 | 2015-06-17 | ウィンボンド エレクトロニクス コーポレーション | 半導体記憶装置 |
US11030346B2 (en) * | 2018-07-13 | 2021-06-08 | Ememory Technology Inc. | Integrated circuit and data processing method for enhancing security of the integrated circuit |
US11169717B2 (en) | 2018-12-28 | 2021-11-09 | Micron Technology, Inc. | Unauthorized access command logging using a key for a protected region of memory |
US10768831B2 (en) | 2018-12-28 | 2020-09-08 | Micron Technology, Inc. | Non-persistent unlock for secure memory |
US11256427B2 (en) | 2018-12-28 | 2022-02-22 | Micron Technology, Inc. | Unauthorized memory access mitigation |
CN110851887A (zh) * | 2019-10-18 | 2020-02-28 | 浙江大华技术股份有限公司 | 多媒体存储卡的数据保护方法、装置、设备和存储介质 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61216059A (ja) * | 1985-02-21 | 1986-09-25 | Fujitsu Ltd | 記憶デ−タ保護方式 |
JPH02162442A (ja) * | 1988-12-15 | 1990-06-22 | Nec Corp | 読出し禁止機能付メモリ |
JPH04217052A (ja) * | 1990-12-19 | 1992-08-07 | Casio Comput Co Ltd | 記憶データ保護装置 |
JPH04362752A (ja) * | 1991-06-10 | 1992-12-15 | Sony Corp | メモリのライトプロテクト回路 |
JPH09293022A (ja) * | 1996-04-24 | 1997-11-11 | Toshiba Corp | データ記録再生装置及び同装置におけるデータ保護方法 |
JPH11237983A (ja) * | 1998-02-20 | 1999-08-31 | Mitsubishi Electric Corp | ワンチップマイコンおよびこのワンチップマイコンにおけるブート領域アクセスのためのエントリー方法 |
JP2001022642A (ja) * | 1999-07-08 | 2001-01-26 | Mitsubishi Electric Corp | メモリの機密保持回路 |
JP2002108713A (ja) * | 2000-09-29 | 2002-04-12 | Sony Corp | メモリ装置およびメモリアクセス制限方法 |
JP2002108714A (ja) * | 2000-09-29 | 2002-04-12 | Sony Corp | メモリ装置およびメモリアクセス制限方法 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US40423A (en) * | 1863-10-27 | Improvement in corn-planters | ||
US3602896A (en) * | 1969-06-30 | 1971-08-31 | Ibm | Random access memory with flexible data boundaries |
US4405829A (en) * | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4736419A (en) * | 1984-12-24 | 1988-04-05 | American Telephone And Telegraph Company, At&T Bell Laboratories | Electronic lock system |
US5148534A (en) * | 1986-11-05 | 1992-09-15 | International Business Machines Corp. | Hardware cartridge representing verifiable, use-once authorization |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4937736A (en) * | 1987-11-30 | 1990-06-26 | International Business Machines Corporation | Memory controller for protected memory with automatic access granting capability |
US5231310A (en) * | 1990-09-05 | 1993-07-27 | Oh Soo Young | Electrical and electronic appliance lock |
US5287519A (en) * | 1992-09-17 | 1994-02-15 | International Business Machines Corp. | LAN station personal computer system with controlled data access for normal and unauthorized users and method |
US5293424A (en) * | 1992-10-14 | 1994-03-08 | Bull Hn Information Systems Inc. | Secure memory card |
US5282247A (en) * | 1992-11-12 | 1994-01-25 | Maxtor Corporation | Apparatus and method for providing data security in a computer system having removable memory |
GB9323453D0 (en) * | 1993-11-13 | 1994-01-05 | Calluna Tech Ltd | Security system for portable hard disk drive |
US6002772A (en) * | 1995-09-29 | 1999-12-14 | Mitsubishi Corporation | Data management system |
US5963142A (en) * | 1995-03-03 | 1999-10-05 | Compaq Computer Corporation | Security control for personal computer |
US6169687B1 (en) * | 1995-04-21 | 2001-01-02 | Mark B. Johnson | High density and speed magneto-electronic memory for use in computing system |
US6131090A (en) * | 1997-03-04 | 2000-10-10 | Pitney Bowes Inc. | Method and system for providing controlled access to information stored on a portable recording medium |
US6330624B1 (en) * | 1999-02-09 | 2001-12-11 | International Business Machines Corporation | Access limiting to only a planar by storing a device public key only within the planar and a planar public key only within the device |
US6832317B1 (en) * | 2001-05-10 | 2004-12-14 | Advanced Micro Devices, Inc. | Personal computer security mechanism |
JP4690600B2 (ja) * | 2001-08-23 | 2011-06-01 | 富士通株式会社 | データ保護方法 |
-
2002
- 2002-06-25 JP JP2002183880A patent/JP3979194B2/ja not_active Expired - Lifetime
-
2003
- 2003-06-19 WO PCT/JP2003/007782 patent/WO2004001610A1/ja not_active Application Discontinuation
- 2003-06-19 EP EP03760901A patent/EP1519277A1/en not_active Withdrawn
- 2003-06-19 KR KR10-2004-7002773A patent/KR20050013523A/ko not_active Application Discontinuation
- 2003-06-19 CN CNB038011360A patent/CN1292357C/zh not_active Expired - Fee Related
- 2003-06-19 US US10/487,070 patent/US20040236919A1/en not_active Abandoned
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61216059A (ja) * | 1985-02-21 | 1986-09-25 | Fujitsu Ltd | 記憶デ−タ保護方式 |
JPH02162442A (ja) * | 1988-12-15 | 1990-06-22 | Nec Corp | 読出し禁止機能付メモリ |
JPH04217052A (ja) * | 1990-12-19 | 1992-08-07 | Casio Comput Co Ltd | 記憶データ保護装置 |
JPH04362752A (ja) * | 1991-06-10 | 1992-12-15 | Sony Corp | メモリのライトプロテクト回路 |
JPH09293022A (ja) * | 1996-04-24 | 1997-11-11 | Toshiba Corp | データ記録再生装置及び同装置におけるデータ保護方法 |
JPH11237983A (ja) * | 1998-02-20 | 1999-08-31 | Mitsubishi Electric Corp | ワンチップマイコンおよびこのワンチップマイコンにおけるブート領域アクセスのためのエントリー方法 |
JP2001022642A (ja) * | 1999-07-08 | 2001-01-26 | Mitsubishi Electric Corp | メモリの機密保持回路 |
JP2002108713A (ja) * | 2000-09-29 | 2002-04-12 | Sony Corp | メモリ装置およびメモリアクセス制限方法 |
JP2002108714A (ja) * | 2000-09-29 | 2002-04-12 | Sony Corp | メモリ装置およびメモリアクセス制限方法 |
Also Published As
Publication number | Publication date |
---|---|
JP2004030101A (ja) | 2004-01-29 |
US20040236919A1 (en) | 2004-11-25 |
JP3979194B2 (ja) | 2007-09-19 |
KR20050013523A (ko) | 2005-02-04 |
CN1292357C (zh) | 2006-12-27 |
EP1519277A1 (en) | 2005-03-30 |
CN1564981A (zh) | 2005-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4016741B2 (ja) | 情報記憶装置、メモリアクセス制御システム、および方法、並びにコンピュータ・プログラム | |
JP3979195B2 (ja) | 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム | |
WO2004001608A1 (ja) | 情報記憶装置、およびメモリアクセス制御システム、および方法、並びにコンピュータ・プログラム | |
WO2004001610A1 (ja) | 情報記憶装置、およびメモリアクセス制御方法、並びにコンピュータ・プログラム | |
JP4687703B2 (ja) | 記録システム、情報処理装置、記憶装置、記録方法及びプログラム | |
NZ545771A (en) | Digital rights management structure, portable storage device, and contents management method using the portable storage device | |
JP2008015622A (ja) | 著作権保護記憶媒体、情報記録装置及び情報記録方法、並びに情報再生装置及び情報再生方法 | |
JP2001014441A (ja) | 半導体メモリカード及び読み出し装置 | |
WO2001056224A1 (fr) | Systeme d'authentification de dispositif de stockage | |
US20110022850A1 (en) | Access control for secure portable storage device | |
JP2003233795A (ja) | 半導体メモリカード及び読み出し装置 | |
JP2003195758A (ja) | データ処理装置、インタフェースボードおよびデータ秘匿方法 | |
JP2006277697A (ja) | コンテンツ転送システム,コンテンツ転送装置,コンテンツ再生装置,コンテンツ転送方法およびコンテンツ再生方法 | |
JP4765377B2 (ja) | コンテンツ提供サーバ,および携帯電話 | |
WO2023178724A1 (zh) | 智能门铃防盗版方法、系统、智能门铃及计算机可读存储介质 | |
JP4863309B2 (ja) | 通信システム、無線通信端末、接続方法およびプログラム | |
JP2011123625A (ja) | トラステッド・プラットフォーム・モジュールに適したパスワード管理及び認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN KR US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003760901 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047002773 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 20038011360 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10487070 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2003760901 Country of ref document: EP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2003760901 Country of ref document: EP |