WO2004046935A2 - Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module - Google Patents

Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module Download PDF

Info

Publication number
WO2004046935A2
WO2004046935A2 PCT/IB2003/005209 IB0305209W WO2004046935A2 WO 2004046935 A2 WO2004046935 A2 WO 2004046935A2 IB 0305209 W IB0305209 W IB 0305209W WO 2004046935 A2 WO2004046935 A2 WO 2004046935A2
Authority
WO
WIPO (PCT)
Prior art keywords
code
memory module
rom
module
data
Prior art date
Application number
PCT/IB2003/005209
Other languages
French (fr)
Other versions
WO2004046935A3 (en
Inventor
Wolfgang Buhr
Original Assignee
Philips Intellectual Property & Standards Gmbh
Koninklijke Philips Electronics N.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Philips Intellectual Property & Standards Gmbh, Koninklijke Philips Electronics N.V. filed Critical Philips Intellectual Property & Standards Gmbh
Priority to AU2003276575A priority Critical patent/AU2003276575A1/en
Priority to JP2004553018A priority patent/JP4611027B2/en
Priority to US10/535,370 priority patent/US7395165B2/en
Priority to EP03811456A priority patent/EP1565802A2/en
Publication of WO2004046935A2 publication Critical patent/WO2004046935A2/en
Publication of WO2004046935A3 publication Critical patent/WO2004046935A3/en
Priority to US12/125,737 priority patent/US8155309B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Definitions

  • the present invention relates to a circuit arrangement for electronic data processing
  • - having at least one non- volatile memory module for storing data to be protected against unauthorized access by means of en-/decryption; - having at least one memory module interface logic circuit assigned to the memory module
  • the quality of the key code may be further improved by supplementary or additional measures, such as for example by at least one additional address dependency or by scrambling by means of at least one scrambling logic circuit, which then counteracts the relatively regular structure of ROM codes.
  • This circuit arrangement 100 comprises a multi-component N[on]V[olatile] memory module 10, which takes the form of an E[lectrical] Erasable] P[rogrammable]R[ead]0[nly]M[emory] and by means of which data may be stored which are to be protected from unauthorized access by encryption or decryption.
  • N[on]V[olatile] memory module 10 is a memory module interface logic circuit 12, by means of which - the memory module 10 may be addressed (--> reference numeral 120a: address data "ADDR(a:0)" from the memory module interface logic circuit 12 to the memory module 10),
  • each write access (--> reference numeral 120w) to the NV memory 10 or with each read access (--> reference numeral 120r) to the page register of the NV memory 10 one byte of the ROM code is also read out from the code ROM module 20.
  • the ROM code address 220a from which reading is performed is determined by the key address generation unit 16 of the en-/decryption logic circuit 14 but has to be unambiguous and reproducible for each NV memory address 120a.
  • this ROM code byte is then used as a key byte or as part of the key byte, such that in an extreme case a key space is produced which is of exactly the same size as the code space of the N[on]V[olatile] memory module 10.
  • the content of these key registers 18 is used as the key or as parts of the key for encrypting or decrypting the NV memory data "DIN(d:0)" or "DOUT(d:0)" respectively.

Abstract

In order further to develop a circuit arrangement (100) for electronic data processing - having at least one non-volatile memory module (10) for storing data to be protected against unauthorized access by means of encryption or decryption -having at least one code R`ead! O`nly!M`emory! module (20) for storing and/or supplying at least one R`ead!O`nly!M`emory! code; and -having at least one code ROM module interface logic circuit (22) assigned to the code ROM module (20) and an en-/decryption method based thereon in such a way that on the one hand the key code may be changed for different controller versions with different ROM codes and on the other hand the length of the key code is not limited, it is proposed that the data assigned to the memory module (10) be encrypted or decrypted by means of the ROM code supplied by the code ROM module (20).

Description

Circuit arrangement with non- volatile memory module and method of en-/decrypting data in the non- volatile memory module
The present invention relates to a circuit arrangement for electronic data processing
- having at least one non- volatile memory module for storing data to be protected against unauthorized access by means of en-/decryption; - having at least one memory module interface logic circuit assigned to the memory module
-- for addressing the memory module,
— for writing the data to the memory module and -- for reading the data from the memory module; - having at least one code R[ead]O[nly]M[emory] module for storing at least one R[ead]O[nly]M[emory] code; and
- having at least one code ROM module interface logic circuit assigned to the code ROM module
— for addressing the code ROM module and -- for reading the ROM code from the code ROM module.
The present invention further relates to a method of en-/decrypting data to be protected against unauthorized access in at least one non-volatile memory module.
Conventionally, key codes necessary for encrypting or decrypting the contents of a N[on] V[olatile] memory module are either hard-coded, defined by means of fuse cells especially instantiated therefor or saved themselves in a specially protected area of the nonvolatile memory module.
Each of these known procedures has disadvantages, however: in the case of hard-coded keys, the key code cannot be changed for different controller versions with different ROM codes; in the case of the more flexible definition of the key code in fuse cells or in the case of protected E[lectrical] Erasable] Programmable] R[ead]O[nly]M[emory] areas, the key length is limited as a result of cell or surface area requirements.
Taking as basis the above-described disadvantages and shortcomings and acknowledging the outlined prior art, it is an object of the present invention so to develop a circuit arrangement of the above-mentioned type and an en-/decryption method of the above- mentioned type based thereon that on the one hand the key code may be changed for different controller versions with different ROM codes and on the other hand the length of the key code is not limited.
This object is achieved with a circuit arrangement having the features indicated in claim 1 and by an en-/decryption method based thereon having the features indicated in claim 6. Advantageous embodiments and expedient further developments of the present invention are identified in the respective dependent claims.
According to the teaching of the present invention, therefore, a completely new approach is disclosed to the generation of at least one especially long key for the en- /decryption of at least one N[on]V[olatile] memory module from R[ead]O[nly]M[emory] code data, for example for embedded security controllers.
For this en-/decryption of the NV memory module, the key code is extracted from the ROM code available to the (micro-)controller, which ROM code is a constant from the point of view of the NV memory module; in this manner, a key code is generated which, with up to one byte of key per byte of plain/cipher text, may be described as relatively long. According to a particularly inventive further development, the key (code) may be generated
- either by reading out the ROM code from the code ROM module in parallel with writing or reading of the non- volatile memory module - or by one-off reading out of particular ROM code bytes at the time of the so- called "reset sequence" and by storing these ROM code bytes in at least one key register, until the ROM code bytes are required for at least one write operation or read operation of the NV memory module.
According to an advantageous development of the present invention, the quality of the key code may be further improved by supplementary or additional measures, such as for example by at least one additional address dependency or by scrambling by means of at least one scrambling logic circuit, which then counteracts the relatively regular structure of ROM codes.
The above-described invention is advantageously not limited methodologically to particular en-/decryption methods, but may be adapted with regard to key length and/or with regard to quality to the respective requirements of the method used.
Through double use of the ROM code as a source for long key codes, the security of the encryption or decryption of the N[on]V[olatile] memory module is increased by greater key lengths, without such a greater key length resulting in a corresponding additional surface area requirement for storing this key code.
Furthermore, the person skilled in the art of cryptology will particularly appreciate the fact that the key codes generated according to the invention are dependent on the ROM code of the code ROM module, i.e. change with varying ROM codes.
The present invention further relates to a microcontroller, in particular an "embedded security controller", comprising at least one data processing device according to the above-described type. Accordingly, the above-described method may preferably be built into all smart card developments, for example. The present invention finally relates to the use of at least one circuit arrangement of the above-described type in at least one chip unit, in particular in at least one "embedded security controller".
As already discussed above, there are various possible ways of advantageously embodying and developing the teaching of the present invention. Reference is made, in this regard, to the claims subordinate to claims 1 and 6, and the invention will be further described with reference to examples of embodiments shown in the drawings to which, however, the invention is not restricted. In the Figures: Fig. 1 is a schematic block diagram of an example of embodiment of a circuit arrangement according to the present invention, by means of which the en-/decryption method may be performed according to the present invention.
Fig. 1 shows an example of embodiment of a circuit arrangement 100 for electronic data processing; in particular, the circuit arrangement 100 is provided for use in a microcontroller of the "embedded security controller" type.
This circuit arrangement 100 comprises a multi-component N[on]V[olatile] memory module 10, which takes the form of an E[lectrical] Erasable] P[rogrammable]R[ead]0[nly]M[emory] and by means of which data may be stored which are to be protected from unauthorized access by encryption or decryption.
Assigned to this N[on]V[olatile] memory module 10 is a memory module interface logic circuit 12, by means of which - the memory module 10 may be addressed (--> reference numeral 120a: address data "ADDR(a:0)" from the memory module interface logic circuit 12 to the memory module 10),
- the memory module 10 may be written to (--> reference numeral 120w: signal data "DIN(d:0)" from the memory module interface logic circuit 12 to the memory module 10) and
- the memory module 10 may be read out (--> reference numeral 120r: signal data "DOUT(d:0)" from the memory module 10 to the memory module interface logic circuit 12). In addition, the circuit arrangement 100 comprises a code
R[ead]O[nly]M[emory] module 20 for storing and supplying R[ead]O[nly]M[emory] codes. Assigned to this code ROM module 20 is code ROM module interface logic circuit 22, by means of which
- the code ROM module 20 may be addressed (--> reference numeral 220a: address data "A" from the code ROM module interface logic circuit 22 to the code ROM module 20) and
- the code ROM module 20 may be read out (--> reference numeral 220r: ROM code data or ROM code bytes "DO" from the code ROM module 20 to the code ROM module interface logic circuit 22). The special feature of the circuit arrangement 100 according to Fig. 1 is that the key code for encrypting or decrypting the data assigned to the memory module 10 may be extracted and generated from the ROM code of the code ROM module 20.
To this end, the memory module interface logic circuit 12 comprises an en- /decryption logic circuit 14 having a key address generation unit 16 and a key register 18. The key address generation unit 16 is provided in this context for the purpose of generating an ROM key address (--> reference numeral 162a: ROM key address data from the key address generation unit 16 to a multiplexing unit 24 of the code ROM module interface logic circuit 22) in the case of write or read access to the memory module 10 using a memory module address coming from the C[entral]P[rocessing]U[nit] (--> reference numeral C12a: address data "CPU NV addr" from the CPU to the memory module interface logic circuit 12). This multiplexing unit 24 integrated into the code ROM module interface logic circuit 22 receives not only an ROM key address of the key address generation unit 16, but also the address data coming from the CPU (--> reference numeral C22a: CPU ROM address data "CPU ROM addr" from the CPU to the multiplexing unit 24 of the code ROM module interface logic circuit 22).
The ROM code is then fetched from the code ROM module 20 by means of the ROM key address and used as an en-/decryption key for encryption or decryption of - the address data "CPU NV addr" from the CPU via the memory module interface logic circuit 12 to the memory module 10 (--> reference numeral C12a),
- the signal data "CPU NV write data" from the CPU via the memory module interface logic circuit 12 to the memory module 10 (--> reference numeral C12w) and
- the signal data "CPU NV read data" from the memory module 10 via the memory module interface logic circuit 12 to the CPU (--> reference numeral C12r).
The nub of the present invention is therefore that the circuit arrangement 100 according to Fig. 1 allows a method for encrypting or decrypting data to be protected against unauthorized access in the non- volatile memory module 10 to be performed, wherein the data assigned to the memory module 10 are encrypted or decrypted by means of the ROM code supplied by the code ROM module 20.
The quality of the key code generated may be further improved by scrambling by means of a scrambling logic circuit known per se (c.f. prior art DE 199 01 829 Al) but not shown explicitly in Fig. 1 for reasons of clarity, which then counteracts the relatively regular structure of the ROM code supplied by the code ROM module 20. This scrambling logic circuit comprises
- a permutation stage for permuting bits of different value of the address signals "ADDRføO)" and/or data signals "DIN(d:0)" or "DOUT(d:0)" supplied to the scrambling logic circuit,
- an inversion stage for inverting the values of the bits of the address signals "ADDR(a:0)" and/or data signals "DIN(d:0)" or "DOUT(d:0)", wherein the permutation stage and the inversion stage are controlled by the scrambling pattern signals, and
- a decoding stage for obtaining control signals for the permutation stage and the inversion stage from the scrambling pattern signals.
With regard to generation of the key code serving in encryption or decryption, a distinction is drawn according to the present invention in principle between two variants (i) and (ii):
(i) generation of the key code in parallel with NV memory access, i.e. by reading out the ROM code in parallel with write/read access to the memory module 10: Here, the en-/decryption logic circuit 14 in the respective interface (= memory module interface logic circuit 12) of the NV memory 10 obtains direct access to the unencrypted output data 220r of the code ROM module 20. In parallel with each write access (--> reference numeral 120w) to the NV memory 10 or with each read access (--> reference numeral 120r) to the page register of the NV memory 10, one byte of the ROM code is also read out from the code ROM module 20. The ROM code address 220a from which reading is performed is determined by the key address generation unit 16 of the en-/decryption logic circuit 14 but has to be unambiguous and reproducible for each NV memory address 120a.
For encryption (in the event of write access, reference numeral 120w) or decryption (in the event of read access, reference numeral 120r) of the NV memory data
"DIN(d:0)" or "DOUT(d:0)", this ROM code byte is then used as a key byte or as part of the key byte, such that in an extreme case a key space is produced which is of exactly the same size as the code space of the N[on]V[olatile] memory module 10.
(ii) Generation of the key code in the reset phase, i.e. by one-off reading out of particular ROM code bytes, in particular at the time of the reset sequence, and by storing these ROM code bytes in the key register 18 until the time of a write/read access to the memory module 10, i.e. until these ROM code bytes are required for a write operation or a read operation of the memory module 10:
As a part of the "reset sequence" of the controller, a number of ROM code bytes are read out from the code ROM module 20 and stored in the key registers 18.
In the event of write or read access to the memory module 10, the content of these key registers 18 is used as the key or as parts of the key for encrypting or decrypting the NV memory data "DIN(d:0)" or "DOUT(d:0)" respectively.
LIST OF REFERENCE NUMERALS
100 Circuit arrangement for electronic data processing 10 N[on]V[olatile] memory module
12 Memory module interface logic circuit
14 En-/decryption logic circuit of the memory module interface logic circuit 12
16 Key address generation unit of the en-/decryption logic circuit 14
18 Key register of the en-/decryption logic circuit 14
20 Code R[ead]O[nly]M[emory] module
22 Code ROM module interface logic circuit 24 Multiplexing unit of the code ROM module interface logic circuit 22
120a Address data "ADDR(a:0)" from the memory module interface logic circuit 12 to the memory module 10 120r Signal data "DOUT(d:0)" from the memory module 10 to the memory module interface logic circuit 12 120w Signal data "DIN(d:0)" from the memory module interface logic circuit 12 to the memory module 10 162a ROM key address data from the key address generation unit 16 to the multiplexing unit 24 220a Address data "A" from the multiplexing unit 24 to the code ROM module 20
220r ROM code data or ROM code bytes "DO" from the code ROM module 20 to the code ROM module interface logic circuit 22 C12a Address data "CPU NV addr" from the CPU to the memory module interface logic circuit 12 C12r Signal data "CPU NV read data" from the memory module interface logic circuit 12 to the CPU C12w Signal data "CPU NV write data" from the CPU to the memory module interface logic circuit 12 C22a CPU ROM address data "CPU ROM addr" from the CPU to the multiplexing unit 24 C22r ROM code data "CPU ROM read data" from the code ROM module
20 to the CPU

Claims

CLAIMS:
1. A circuit arrangement (100) for electronic data processing
- having at least one non- volatile memory module (10) for storing data to be protected against unauthorized access by means of encryption or decryption;
- having at least one memory module interface logic circuit (12) assigned to the memory module (10)
-- for addressing the memory module (10) and
- for writing the data to the memory module (10) or
-- for reading out the data from the memory module (10);
- having at least one code R[ead]O[nly]M[emory] module (20) for storing and/or supplying at least one R[ead]O[nly]M[emory] code; and
- having at least one code ROM module interface logic circuit (22) assigned to the code ROM module (20)
- for addressing the code ROM module (20) and
-- for reading out the ROM code from the code ROM module (20), characterized in that at least one key code for encrypting or decrypting the data assigned to the memory module (10) may be extracted and/or generated from the at least one ROM code of the code ROM module (20).
2. A circuit arrangement as claimed in claim 1, characterized in that the memory module interface logic circuit (12) comprises at least one en-/decryption logic circuit (14)
- having at least one key address generation unit (16) and
- having at least one key register (18).
3. A circuit arrangement as claimed in claim 1 or 2, characterized in that the code ROM module interface logic circuit (22) comprises at least one multiplexing unit (24).
4. A circuit arrangement as claimed in at least one of claims 1 to 3, characterized in that the memory module (10) takes the form of
- at least one Erasable] P[rogrammable]R[ead]O[nly]M[emory], - at least one E[lectrical]E[rasable] P[rogrammable]R[ead]O[nly]M[emory] or
- at least one Flash memory.
5. A microcontroller, in particular an "embedded security controller", comprising at least one circuit arrangement as claimed in at least one of claims 1 to 4.
6. A method of encrypting or decrypting data to be protected against unauthorized access in at least one non- volatile memory module (10), characterized in that the data assigned to the memory module (10) are encrypted or decrypted by means of at least one ROM code supplied by at least one code R[ead]O[nly]M[emory] module (20).
7. A method as claimed in claim 6. characterized in that the key code serving in encryption or decryption is generated
- by reading out the ROM code in parallel with at least one access to the memory module (10), i.e. in parallel with at least one write operation or read operation of the memory module (10) or
- by one-off reading out of particular ROM code bytes, in particular at the time of the reset sequence, and by storing these ROM code bytes in at least one key register (18) until the time of at least one access to the memory module (10), i.e. until these ROM code bytes are required for at least one write operation or read operation of the memory module (10).
8. A method as claimed in claim 6 or claim 7, characterized in that,
- on access to the memory module (10) by means of at least one memory module address coming from at least one C[entral]P[rocessing]U[nit], at least one ROM key address is generated,
- the ROM code is fetched from the code ROM module (20) by means of the ROM key address and
- the ROM code is used as at least one en-/decryption key for encryption or decryption
-- of the address of the memory module (10) and/or
- of the data to be written to the memory module (10) or -- of the data to be read out from the memory module (10).
9. A method as claimed in at least one of claims 6 to 8, characterized in that
- the address of the memory module (10) and/or
- the data to be written to the memory module (10) or
- the data to be read out from the memory module (10) are scrambled by means of at least one scrambling logic circuit.
10. Use of at least one circuit arrangement (100) as claimed in at least one of claims 1 to 4 in at least one chip unit, in particular in at least one "embedded security controller".
PCT/IB2003/005209 2002-11-21 2003-11-14 Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module WO2004046935A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
AU2003276575A AU2003276575A1 (en) 2002-11-21 2003-11-14 Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module
JP2004553018A JP4611027B2 (en) 2002-11-21 2003-11-14 Circuit configuration having non-volatile memory module and method for data encryption / decryption in non-volatile memory module
US10/535,370 US7395165B2 (en) 2002-11-21 2003-11-14 Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module
EP03811456A EP1565802A2 (en) 2002-11-21 2003-11-14 Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module
US12/125,737 US8155309B2 (en) 2002-11-21 2008-05-22 Circuit arrangement with non-volatile memory module and method for en-/decrypting data in the non-volatile memory module

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE10254320.8 2002-11-21
DE10254320A DE10254320A1 (en) 2002-11-21 2002-11-21 Circuit arrangement with non-volatile memory module and method for encrypting / decrypting data of the non-volatile memory module

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US10535370 A-371-Of-International 2003-11-14
US12/125,737 Continuation US8155309B2 (en) 2002-11-21 2008-05-22 Circuit arrangement with non-volatile memory module and method for en-/decrypting data in the non-volatile memory module

Publications (2)

Publication Number Publication Date
WO2004046935A2 true WO2004046935A2 (en) 2004-06-03
WO2004046935A3 WO2004046935A3 (en) 2005-03-17

Family

ID=32240233

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2003/005209 WO2004046935A2 (en) 2002-11-21 2003-11-14 Circuit arrangement with non-volatile memory module and method of en-/decrypting data in the non-volatile memory module

Country Status (7)

Country Link
US (2) US7395165B2 (en)
EP (1) EP1565802A2 (en)
JP (1) JP4611027B2 (en)
CN (1) CN100397284C (en)
AU (1) AU2003276575A1 (en)
DE (1) DE10254320A1 (en)
WO (1) WO2004046935A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1768028A1 (en) * 2005-09-22 2007-03-28 STMicroelectronics (Research & Development) Limited Addressing peripherals in an ic
JP2007195190A (en) * 2006-01-20 2007-08-02 Seagate Technology Llc Encryption key in storage system
US8364975B2 (en) 2006-12-29 2013-01-29 Intel Corporation Methods and apparatus for protecting data

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9170812B2 (en) * 2002-03-21 2015-10-27 Pact Xpp Technologies Ag Data processing system having integrated pipelined array data processor
CN101431407B (en) * 2008-12-15 2012-03-28 西安电子科技大学 Cipher processor supporting thread-level encryption and decryption and its cipher operation method
TWI427641B (en) * 2009-03-02 2014-02-21 A flash memory with data encryption and the method using the same
KR101565968B1 (en) * 2009-03-04 2015-11-05 삼성전자주식회사 Memory for protecting data memory system including of the same and driving method for thereof
JP5423088B2 (en) * 2009-03-25 2014-02-19 ソニー株式会社 Integrated circuit, encryption communication device, encryption communication system, information processing method, and encryption communication method
US8230495B2 (en) * 2009-03-27 2012-07-24 International Business Machines Corporation Method for security in electronically fused encryption keys
KR101538741B1 (en) 2009-10-21 2015-07-22 삼성전자주식회사 Data storage medium having security function and output apparatus therefor
PL2461265T3 (en) * 2010-12-03 2019-10-31 Novomatic Ag Device for and method of handling sensitive data
US9298918B2 (en) 2011-11-30 2016-03-29 Elwha Llc Taint injection and tracking
US9443085B2 (en) 2011-07-19 2016-09-13 Elwha Llc Intrusion detection using taint accumulation
US9471373B2 (en) 2011-09-24 2016-10-18 Elwha Llc Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority
US9465657B2 (en) 2011-07-19 2016-10-11 Elwha Llc Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority
US9575903B2 (en) * 2011-08-04 2017-02-21 Elwha Llc Security perimeter
US9460290B2 (en) 2011-07-19 2016-10-04 Elwha Llc Conditional security response using taint vector monitoring
US9558034B2 (en) 2011-07-19 2017-01-31 Elwha Llc Entitlement vector for managing resource allocation
US9798873B2 (en) 2011-08-04 2017-10-24 Elwha Llc Processor operable to ensure code integrity
US10169618B2 (en) * 2014-06-20 2019-01-01 Cypress Semiconductor Corporation Encryption method for execute-in-place memories
GB201511385D0 (en) * 2015-06-29 2015-08-12 Nagravision Sa Secure programming of secret data
CN105097003A (en) * 2015-09-18 2015-11-25 芯佰微电子(北京)有限公司 Secret key built-in read-only memory protection circuit for security chip
JP7109992B2 (en) * 2018-05-22 2022-08-01 キオクシア株式会社 Memory system and control method
WO2020093398A1 (en) * 2018-11-09 2020-05-14 华为技术有限公司 Over-the-air upgrade method and related device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0330404A2 (en) * 1988-02-20 1989-08-30 Fujitsu Limited Integrated circuit cards
EP1022659A2 (en) * 1999-01-19 2000-07-26 Philips Corporate Intellectual Property GmbH Circuit for electronic data management
US20010015919A1 (en) * 1999-12-22 2001-08-23 Kean Thomas A. Method and apparatus for secure configuration of a field programmable gate array
US20020099948A1 (en) * 1999-09-02 2002-07-25 Cryptography Research, Inc. Digital Content Protection Method and Apparatus

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4319079A (en) * 1979-09-13 1982-03-09 Best Robert M Crypto microprocessor using block cipher
JP2534532B2 (en) * 1988-02-20 1996-09-18 富士通株式会社 History management method
JPH025158A (en) * 1988-06-22 1990-01-10 Fujitsu Ltd Expanded ic card and its accessing method
US5063596A (en) * 1989-02-24 1991-11-05 Miu Automation Corporation Encryption printed circuit board
US5293424A (en) * 1992-10-14 1994-03-08 Bull Hn Information Systems Inc. Secure memory card
US6900720B2 (en) * 2001-12-27 2005-05-31 Micro Enhanced Technology, Inc. Vending machines with field-programmable locks
US6006190A (en) * 1997-04-28 1999-12-21 Tartaroukos Llc Computer implemented method and a computer system for enforcing software licenses
US6473861B1 (en) * 1998-12-03 2002-10-29 Joseph Forte Magnetic optical encryption/decryption disk drive arrangement
FR2808947B1 (en) * 2000-05-09 2002-10-18 Bull Cp8 METHOD FOR AUTHENTICATING A PORTABLE OBJECT, CORRESPONDING PORTABLE OBJECT, AND APPARATUS FOR CARRYING OUT THE METHOD
JP2001339383A (en) * 2000-05-29 2001-12-07 Hitachi Ltd Semiconductor device for authentication communication
US7440572B2 (en) * 2001-01-16 2008-10-21 Harris Corportation Secure wireless LAN device and associated methods
US7203841B2 (en) * 2001-03-08 2007-04-10 Igt Encryption in a secure computerized gaming system
US7489779B2 (en) * 2001-03-22 2009-02-10 Qstholdings, Llc Hardware implementation of the secure hash standard
GB2378539B (en) * 2001-09-05 2003-07-02 Data Encryption Systems Ltd Apparatus for and method of controlling propagation of decryption keys
AU2003247146A1 (en) * 2002-08-08 2004-02-25 Dani Dariel Integrated circuit for digital rights management
JP2005128272A (en) * 2003-10-24 2005-05-19 Pioneer Electronic Corp Image display device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0330404A2 (en) * 1988-02-20 1989-08-30 Fujitsu Limited Integrated circuit cards
EP1022659A2 (en) * 1999-01-19 2000-07-26 Philips Corporate Intellectual Property GmbH Circuit for electronic data management
US20020099948A1 (en) * 1999-09-02 2002-07-25 Cryptography Research, Inc. Digital Content Protection Method and Apparatus
US20010015919A1 (en) * 1999-12-22 2001-08-23 Kean Thomas A. Method and apparatus for secure configuration of a field programmable gate array

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1768028A1 (en) * 2005-09-22 2007-03-28 STMicroelectronics (Research & Development) Limited Addressing peripherals in an ic
US8151120B2 (en) 2005-09-22 2012-04-03 Stmicroelectronics (Research & Development) Ltd. Addressing peripherals in an IC
JP2007195190A (en) * 2006-01-20 2007-08-02 Seagate Technology Llc Encryption key in storage system
US8234505B2 (en) 2006-01-20 2012-07-31 Seagate Technology Llc Encryption key in a storage system
US8364975B2 (en) 2006-12-29 2013-01-29 Intel Corporation Methods and apparatus for protecting data

Also Published As

Publication number Publication date
CN1714330A (en) 2005-12-28
CN100397284C (en) 2008-06-25
JP2006507583A (en) 2006-03-02
AU2003276575A8 (en) 2004-06-15
AU2003276575A1 (en) 2004-06-15
DE10254320A1 (en) 2004-06-03
JP4611027B2 (en) 2011-01-12
WO2004046935A3 (en) 2005-03-17
US20060025952A1 (en) 2006-02-02
EP1565802A2 (en) 2005-08-24
US7395165B2 (en) 2008-07-01
US8155309B2 (en) 2012-04-10
US20090132831A1 (en) 2009-05-21

Similar Documents

Publication Publication Date Title
US8155309B2 (en) Circuit arrangement with non-volatile memory module and method for en-/decrypting data in the non-volatile memory module
US6345359B1 (en) In-line decryption for protecting embedded software
KR930008041B1 (en) Microcontroller
US7876894B2 (en) Method and system to provide security implementation for storage devices
US6182217B1 (en) Electronic data-processing device and system
KR20070118589A (en) Method and system for microprocessor data security
US8045712B2 (en) Stream ciphering of the content of a memory external to a processor
JP4683442B2 (en) Processing apparatus and integrated circuit
JP5246863B2 (en) Logic program data protection system and protection method for reconfigurable logic device
US10389530B2 (en) Secure method for processing content stored within a component, and corresponding component
CN108073528B (en) Storage in non-volatile memory
JP2001237825A (en) Electronic safety component
JP2005332221A (en) Storage device
JP2005149262A (en) Information processor
CN114153376A (en) Safety flash memory controller
JP2005228181A (en) Method for issuing ic card, program for ic card, and ic card
JP2000181802A (en) Semiconductor storage device
JP2008191208A (en) Encryption processing circuit, arithmetic unit, and electronic equipment
JPH10143441A (en) Semiconductor device provided with secrecy holding function code processing method and storage medium storing software therefor
JP4664655B2 (en) Information processing apparatus and address control method thereof
CN104517650B (en) Secure memory using uniquely identified elements
JP2009080515A (en) Method and device for providing secure load sequence
JP2000357085A (en) External rom information protection system
JP2006072843A (en) Semiconductor device
JP2007226525A (en) System and method for protecting data of microcomputer

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003811456

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2006025952

Country of ref document: US

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 10535370

Country of ref document: US

WWE Wipo information: entry into national phase

Ref document number: 2004553018

Country of ref document: JP

Ref document number: 20038A39441

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2003811456

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 10535370

Country of ref document: US