[go: up one dir, main page]

WO1991003011A1 - Memoires electroniques - Google Patents

Memoires electroniques Download PDF

Info

Publication number
WO1991003011A1
WO1991003011A1 PCT/GB1990/001320 GB9001320W WO9103011A1 WO 1991003011 A1 WO1991003011 A1 WO 1991003011A1 GB 9001320 W GB9001320 W GB 9001320W WO 9103011 A1 WO9103011 A1 WO 9103011A1
Authority
WO
WIPO (PCT)
Prior art keywords
memory system
electronic memory
information
accessing
code
Prior art date
Application number
PCT/GB1990/001320
Other languages
English (en)
Inventor
Wayne Albert Jonas
Original Assignee
Goldbeam Computing Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goldbeam Computing Limited filed Critical Goldbeam Computing Limited
Publication of WO1991003011A1 publication Critical patent/WO1991003011A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Definitions

  • the present invention relates to electronic memories, and in particular to improving security of electronic memories against unauthorised access.
  • Microcomputer operation and control for various apparatus and devices is well-known and widespread. These days, such microcomputers use semiconductor integrated circuits commonly known as chips.
  • Conventional arrangements include a microprocessor chip; basic-function program control from an operating system chip that is most often a dense-storage read-only memory (ROM) serving to define the available computing capability of the microprocessor chip and which may even be incorporated into the microprocessor chip; an application program chip that is most often a programmably read-only memory (PROM) and can be of erasable and re-writable type (EPROM or EEPROM) serving to define the operation and control actually required by the particular microcomputer controlled apparatus or device concerned; and a memory access control chip that is often a dense-storage ROM or random access memory (RAM) serving to take program instructions as required from at least the application program chip but which is sometimes incorporated into the microprocessor chip.
  • ROM read-only memory
  • RAM random access memory
  • RAM random access memory
  • Electronic memories are prone to unauthorised tampering and that is a particular problem for programmable read only memory chips (PROMs), whose contents can be read by inserting the PROM into equipment no more complicated than of PROM programmer type, which is readily available at low cost and requires little skill to operate. It is thus possible for a third party to read the contents of at least such a memory chip. If the memory device is of erasable and rewritable type, it is, of course, possible for the third party to reprogram the memory. Otherwise, contents read out can be written into another programmable memory.
  • this invention can be implemented by modifying the way that addressing of an application program chip takes place at least for one stage, usually a first stage, of each use of or access to the microcomputer system.
  • that can be relative to performing a check using information abstracted from the application program chip, which information is stored in a way that is unusual or different compared with normal storage, say at memory storage locations requiring accessing non-sequentially, i.e. other than sequentially as is conventional.
  • the abstracted information and/or its order of storage/abstraction to be individual to the apparatus or device concerned.
  • the abstracted information itself may. represent an identifier which serves a control purpose, when compared with the same or related information stored normally, whether locally or at other equipment with which cooperative action is required to be controlled.
  • a preferred way to individualise at least order of storage/abstraction is at or before a first or other designated use of the apparatus or device to be controlled, and can conveniently involve writing to application program storage provision of PROM type in accordance with individual data entered either directly or as something for an algorithm to use, which algorithm may be part of the operating system or part of the application program, or some in each, say with at least necessary part of results stored in PROM type provisions.
  • the access control chip may be replaced by a chip altered so that address locations concerned in unusual read out are so read, preferably further incorporating application program storage that would otherwise be stored in a PROM as aforesaid.
  • such combined access control and application- program chip may be incorporated into a single application specific integrated circuit (ASIC) that may further include the microprocessor if of a type normally provided without requirement for a separate memory access chip. At least using an ASIC it is further preferred for that to include logic circuitry responsive to any deviant access, e.g. sequential, to blow a fuse that permanently disables the ASIC.
  • ASIC application specific integrated circuit
  • each telephone is given its own unique identity code which is usually stored in a programmable read-only memory (PROM), often of erasable and rewritable type (EPROM or EEPRO ).
  • PROM programmable read-only memory
  • EPROM or EEPRO erasable and rewritable type
  • the unique identity code can be the subscriber's telephone number or be derived therefrom, or also from additional identity coding, by an algorithm.
  • switching on the telephone causes a signal to be transmitted to the system base station.
  • the signal is related at least to the unique identity code of the telephone.
  • computer control at the base station checks to confirm whether the received signal is correct for the particular subscriber's telephone number concerned. If so, the caller is allowed access onto the system. Otherwise, access to the telephone system is prevented.
  • the signal received by the base station will be identical to that received from another subscriber, typically that for the telephone tampered with, and the base station will consider that the fraudulent user's telephone is, in fact, the tampered (or another) subscriber's telephone and that subscriber will be billed with the fraudulent user's telephone calls.
  • a first aspect of the present invention comprises an electronic memory for storing information in a plurality of address locations, and accessing means for reading the address locations containing the information in a predetermined order different from that usually used by programming equipment, which is normally sequential.
  • the electronic memory concerned advantageously comprises part of an application specific integrated circuit (ASIC).
  • ASIC application specific integrated circuit
  • a method 'of storing information electronically in a plurality of address locations of an electronic memory comprises inserting the information into address locations of the memory in a predetermined order different from that normally used by programming equipment so that latter cannot extract meaningful information.
  • an electronic memory device comprises an electronic memory for storing information, a code generator for generating an electronic verification code which is derived from at least a portion of the stored information, an electronic memory for storing the verification code and verification means for comparing the stored information with the verification code.
  • Such a system may further comprise output means which permit the information to be output upon verification of the stored information, and which prevent the information from being output when verification has not occurred.
  • output means may comprise a fuse which is adapted to be blown upon non-veri.fication.
  • a method of verifying electronically stored information in a memory system comprises comparing the electronically stored information with an electronically stored verification code which is derived from at least part of the electronically-stored information.
  • an electronic memory system comprises an electronic memory for storing information in a plurality of address locations, accessing means for sampling the address locations containing the information in a predetermined order and verification means for verifying the correctness of the information.
  • the verification means may comprise a verification code derived from the stored information and means for comparing the stored information with the verification code.
  • a method of storing and retrieving information electronically comprises storing information electronically in a plurality of address locations, accessing the address locations in a predetermined order and verifying the correctness of the information.
  • the verification may comprise comparison of the stored information with a verification code derived from the stored information.
  • Fig. 1 is a schematic representation of a first embodiment of electronic memory system in accordance with the present invention.
  • Fig. 2 is a schematic representation of a second embodiment of electronic memory system in accordance with the present invention.
  • Fig. 3 is a flow diagram of the operation of the systems of Fig. 1 and Fig. 2 during a first power-up;
  • Fig. 4 is a flow diagram of the operation of the embodiments of Figs. 1 and 2 during subsequent power- ups;
  • Fig. 5 is. a schematic representation of a third embodiment of electronic memory system in accordance with the present invention.
  • Fig. 6 is a schematic representation of application of the invention generally to computer controlled apparatus.
  • the memory system illustrated is that of a cellular telephone, but is not restricted to such, and may indeed be applied in respect of any electronically- stored information.
  • the system is in the form of an application specific integrated circuit (ASIC) 10 which in use is connected to a central processing unit (CPU) 12 which is in turn controlled by the operating system software illustrated generally at 14.
  • ASIC application specific integrated circuit
  • CPU 12 and the operating system are contained within the telephone on manufacture, and the ASIC is inserted as a separate unit, as will be explained.
  • the ASIC 10 comprises application software ROM 16, a PROM section containing an identification code section 18 and a verification code section 20, a verification logic ROM section 22 and two flags F 1 and F2.
  • This particular system is of particular use in, for example, a cellular telephone, where it is necessary to store an identification code which is unique to a particular telephone. • '
  • the identification code is inserted in the PROM shortly after manufacture, and flag F. is then set to prevent subsequent alteration.
  • the identification code is not stored in the address locations sequentially as would normally occur with a conventional programmer, but the software which programs the identification code is adapted to store the code in the address locations of the PROM in a predetermined sequence, and not in the sequence normally used by a conventional programmer.
  • the predetermined sequence and the software are compatible with the operating system software 14 of the system, such that the CPU is adapted to access the address locations of the PROM in the same sequential manner.
  • Fig. 1 the PROM of the ASIC is also used to store a verification code. This is assigned during the first power-up or when the chip is programmed, and the sequence of events is illustrated in Fig. 3, which is appropriate both for the Fig. 1 embodiment and for the Fig. 2 embodiment.
  • Step 24 of the sequence is as described above, in which the ASIC is already programmed with the identification code and F. is set to prevent alteration of this.
  • the CPU 12 is instructed by the operating system software 14 to access the address locations of the stored code in a predetermined sequence at step 26, as defined by the operating system software.
  • the address locations may be accessed in the order 2, 8, 9, 7, 4,... and so on, in a compatible sequence with the identification code programming sequence.
  • the accessing ⁇ sequence may also involve dummy accessing operations, for example the CPU may deliberately access and ignore address locations which do not contain portions of the identification code, or may access and ignore a particular address location on one occasion and read and use a particular address location on another occasion, to make it more difficult for a potential copier to ascertain the correct address location accessing sequence.
  • the code may be in the address location sequence 2, 8, 9, 7, 4 ... and the CPU may access the.address locations in the following order, the address locations which are actually read and used being underlined: 2, 1, 7, 8 , 3, 2, 10, £, 7, 1, 4, 3, 8,
  • the CPU may be arranged to access the relevant address locations only, i.e. 2, 8, 9, 7, 4, ..., without any dummy accessing.
  • the application software ROM is arranged upon initial power-up at step 27 to generate a verification code which is a function of the identification code, i.e. which is derived from the identification code characteristics.
  • the verification code may be a sequence of address locations relating to the identification code, and may conveniently be arranged to be the beginning of the sequence of address location accessing, e.g. 2, 8, 9, 7.
  • This verification code is then stored in the PROM at step 28, and flag F 2 is set to prevent alteration of the verification code.
  • the verification logic ROM 22 thereafter confirms at step 28 that the identification code which has been read by the CPU 12 under control from the operating system software 14 is compatible with the verification code which was generated from that identification code. If this is held to be the case (which it will be on the first power-up) then the identification code is fed at step 29 from the ASIC 10 to the CPU 12 and thereafter to the system of which the CPU 12 forms a part.
  • step 32 power-up is requested, and the CPU is directed at step 33 by the operating system software 14 to access the identification code held in the PROM in the predetermined order as defined in the operating system software 14.
  • the identification code is then extracted from the information read (if dummy addresses are included in the sequence) at step 34 and is then compared with the verification code in the verification logic ROM 22 at step 35. If the identification code and verification code are compatible (i.e. if the identification code has not been altered form that from which the verification code was derived) then at step 36 the verification logic ROM allows the identification code to output to the CPU 12. If the verification logic ROM 22 decides that the identification code and verification code are not compatible, i.e. that the identification code which has been read is not that from which the verification code was derived, then the identification code is not output to the CPU 12 at step 37.
  • the ASIC can be provided with an internal fuse X (illustrated schematically) so that if the identification code and verification code are held to be incompatible, not only is the identification code not output to the CPU, but the verification logic ROM is arranged to blow the fuse within the ASIC to render the ASIC unusable.
  • fuse X illustrated schematically
  • FIG. 2 A variation of the Fig. 1 embodiment is illustrated in Fig. 2, and the same items are indicated with the same reference numerals but with the addition of a dash.
  • the main difference is that the identification code and verification code are held in random access memory (RAM) rather than PROM, and the application software ROM 16' may be arranged to set flag F. once the identification code has been input.
  • RAM random access memory
  • the application software ROM 16' may be arranged to set flag F. once the identification code has been input.
  • the operation of the system is otherwise identical to that described for the first embodiment.
  • the advantage of having the identification code and verification code in RAM rather than RPM is that if the ASIC were removed in an attempt to read the identification code and/or verification code (even though these in themselves would not be sufficient to enable entry to the system to be gained) then the identification code and verification code would immediately be lost since the power supply to the ASIC would necessarily be cut.
  • the invention has been described with reference to protection of the identification code stored electronically in a cellular telephone, but it is not restricted to such an application. Rather the invention relates to all electronic memories where it is necessary to read information form the memory from time to time..
  • Fig. 6 shows one typical apparatus or device central system using a microprocessor chip 62 and associated operating system chip 64 together with and application program PROM or EPROM chip 66 read by way of an access control ROM or RAM chip 68.
  • application program chip 66 and the access control chip 68 are replaced by an ASIC further including protection logic (not shown).
  • an electronic memory system comprising application program storage for use by associated microprocessor means with related operating system, and access control storage for check or identifier information requiring accessing in a coded non-standard way to obtain said check or identifier information correctly, preferably further with means responsive to incorrect accessing of said check or identifier information for denying access to said application program storage, preferably including logic means for disabling the memory system, advantageously all on a single integrated circuit preferably further affording memory access control if not also microprocessor provisions.
  • the fuse may be arranged to wipe the information from the identification code and/or verification code memories.
  • the verification logic ROM can check that the original identification code has not been altered.
  • one or both of the flags F., F 2 to be activated by a further code, so that authorised access to the identification and/or verification codes would be permitted to an authorised user.
  • verification procedure occurs during the power-up sequence, but rather the verification might occur during any desired routine of the system.
  • verification code there may be more than one verification code, each with its own verification logic within the verification logic ROM 22.
  • the identification code memory and the application software ROM are shown as separate. However, the identification code memory may alternatively be implemented in the application software ROM.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

Dans un système de mémoire électronique à semi-conducteurs, la zone d'implantation normale du programme d'application du type mémoire programmable est remplacée par une puce (10) exigeant un accès au moins en partie d'une manière codée et différente du séquençage d'accès normal, afin d'extraire correctement les données de contrôle ou de l'identificateur (18). L'usage du système de mémoire sera à nouveau refusé pour toute extraction incorrecte des données de contrôle ou de l'identificateur (18), et le système de mémoire lui-même peut être invalidé par la logique non programmable (22) et un fusible (X) au cas où un ordre d'abstraction serait tenté d'une manière autre que ladite manière codée.
PCT/GB1990/001320 1989-08-24 1990-08-24 Memoires electroniques WO1991003011A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB8919301.5 1989-08-24
GB8919301A GB8919301D0 (en) 1989-08-24 1989-08-24 "electronic memory"

Publications (1)

Publication Number Publication Date
WO1991003011A1 true WO1991003011A1 (fr) 1991-03-07

Family

ID=10662081

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1990/001320 WO1991003011A1 (fr) 1989-08-24 1990-08-24 Memoires electroniques

Country Status (3)

Country Link
AU (1) AU6280590A (fr)
GB (1) GB8919301D0 (fr)
WO (1) WO1991003011A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0669580A3 (fr) * 1994-02-28 1996-04-17 Sega Enterprises Kk Appareil de sécurité de données.
DE19540428A1 (de) * 1994-10-31 1996-05-02 Ricoh Kk Sicherheitsinformationssystem mit einer Speichervorrichtung für Informationen und einer Zugriffsvorrichtung
US6615167B1 (en) * 2000-01-31 2003-09-02 International Business Machines Corporation Processor-independent system-on-chip verification for embedded processor systems
US6751598B1 (en) * 1996-07-03 2004-06-15 Hitachi, Ltd. Digital content distribution system and protection method
WO2007016395A3 (fr) * 2005-08-01 2007-06-07 Intel Corp Mecanisme d'activation de fonction de systeme informatique
EP0898747B1 (fr) * 1996-11-15 2008-01-09 Nxp B.V. Procede de protection contre les intrusions dans des memoires eeprom dans un dispositif de communication mobile comportant un processeur, et dispositif comportant ce mecanisme de protection
US8607328B1 (en) 2005-03-04 2013-12-10 David Hodges Methods and systems for automated system support
US8849717B2 (en) 2009-07-09 2014-09-30 Simon Cooper Methods and systems for upgrade and synchronization of securely installed applications on a computing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4268911A (en) * 1979-06-21 1981-05-19 Fairchild Camera And Instrument Corp. ROM Program security circuits
EP0154252A2 (fr) * 1984-02-23 1985-09-11 Fujitsu Limited Dispositif à mémoire morte programmable et système de mémoire l'utilisant
US4583196A (en) * 1983-10-28 1986-04-15 Honeywell Inc. Secure read only memory
US4584665A (en) * 1982-05-06 1986-04-22 U.S. Philips Corporation Arrangement for protecting against the unauthorized reading of program words stored in a memory
US4716586A (en) * 1983-12-07 1987-12-29 American Microsystems, Inc. State sequence dependent read only memory

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4268911A (en) * 1979-06-21 1981-05-19 Fairchild Camera And Instrument Corp. ROM Program security circuits
US4584665A (en) * 1982-05-06 1986-04-22 U.S. Philips Corporation Arrangement for protecting against the unauthorized reading of program words stored in a memory
US4583196A (en) * 1983-10-28 1986-04-15 Honeywell Inc. Secure read only memory
US4716586A (en) * 1983-12-07 1987-12-29 American Microsystems, Inc. State sequence dependent read only memory
EP0154252A2 (fr) * 1984-02-23 1985-09-11 Fujitsu Limited Dispositif à mémoire morte programmable et système de mémoire l'utilisant

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668945A (en) * 1994-02-28 1997-09-16 Sega Enterprises, Ltd. Data security apparatus and method
EP0669580A3 (fr) * 1994-02-28 1996-04-17 Sega Enterprises Kk Appareil de sécurité de données.
DE19540428A1 (de) * 1994-10-31 1996-05-02 Ricoh Kk Sicherheitsinformationssystem mit einer Speichervorrichtung für Informationen und einer Zugriffsvorrichtung
US6751598B1 (en) * 1996-07-03 2004-06-15 Hitachi, Ltd. Digital content distribution system and protection method
EP0898747B1 (fr) * 1996-11-15 2008-01-09 Nxp B.V. Procede de protection contre les intrusions dans des memoires eeprom dans un dispositif de communication mobile comportant un processeur, et dispositif comportant ce mecanisme de protection
US6615167B1 (en) * 2000-01-31 2003-09-02 International Business Machines Corporation Processor-independent system-on-chip verification for embedded processor systems
US8607328B1 (en) 2005-03-04 2013-12-10 David Hodges Methods and systems for automated system support
WO2007016395A3 (fr) * 2005-08-01 2007-06-07 Intel Corp Mecanisme d'activation de fonction de systeme informatique
GB2442904A (en) * 2005-08-01 2008-04-16 Intel Corp Computing system feature activation mechanism
GB2442904B (en) * 2005-08-01 2011-02-16 Intel Corp Computing system feature activation mechanism
US8769295B2 (en) 2005-08-01 2014-07-01 Intel Corporation Computing system feature activation mechanism
US8849717B2 (en) 2009-07-09 2014-09-30 Simon Cooper Methods and systems for upgrade and synchronization of securely installed applications on a computing device
US8880736B2 (en) 2009-07-09 2014-11-04 Simon Cooper Methods and systems for archiving and restoring securely installed applications on a computing device
US10521214B2 (en) 2009-07-09 2019-12-31 Apple Inc. Methods and systems for upgrade and synchronization of securely installed applications on a computing device

Also Published As

Publication number Publication date
AU6280590A (en) 1991-04-03
GB8919301D0 (en) 1989-10-11

Similar Documents

Publication Publication Date Title
US5442645A (en) Method for checking the integrity of a program or data, and apparatus for implementing this method
US5191608A (en) Method for the management of an application program loaded in a microcircuit medium
RU2159467C2 (ru) Система и способ загрузки прикладных задач на интеллектуальную карточку
US6957338B1 (en) Individual authentication system performing authentication in multiple steps
CA1211542A (fr) Dispositif et methode de securite pour rendre inoperant apres une defaillance un materiel electronique commande par micro-processeur
US5206938A (en) Ic card with memory area protection based on address line restriction
US5452431A (en) Microcircuit for a chip card comprising a protected programmable memory
US5504701A (en) Memory card
HK80897A (en) Method for verifying the integrity of software or data and system for implementing this method
RU2134904C1 (ru) Система передачи данных с терминалом и переносным устройством носителя данных и способ для перезаряда переносного устройства носителя данных посредством терминала
HK123695A (en) Method of generating a pseudo-random number in a dataprocessing-system, and a system for carrying out the method
US6944478B1 (en) Security module
WO1991003011A1 (fr) Memoires electroniques
CN107688756A (zh) 硬盘控制方法、设备及可读存储介质
US5902981A (en) Method and system for securing and restoring data of a portable chip-card if lost or stolen
KR100300794B1 (ko) 칩카드에정보를입력하는방법
US20040172370A1 (en) Verfication of access compliance of subjects with objects in a data processing system with a security policy
US20080275917A1 (en) Itso Fvc2 Application Monitor
US20090249085A1 (en) Security module and personalization method for such a security module
US6000606A (en) Method and system for securing and restoring data of a portable chip-card if lost or stolen
RU2483359C2 (ru) Карта с интегральной схемой, имеющая модифицируемую рабочую программу, и соответствующий способ модификации
CN100395771C (zh) 定制后能修改其性能的微电路卡
KR20000068374A (ko) 메인 파일과 보조 파일간의 링크를 생성하는 수단을 구비하는 보안 모듈
JPH05204766A (ja) 本人確認装置
CN118153126B (zh) 具有隐私保护的rfid智能卡信息交互方法、装置和系统

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA DK FI GB JP KR NO US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB IT LU NL SE

NENP Non-entry into the national phase in:

Ref country code: CA