US20040059885A1 - System and method to protect vital memory space from non-malicious writes in a multi domain system - Google Patents

System and method to protect vital memory space from non-malicious writes in a multi domain system Download PDF

Info

Publication number
US20040059885A1
US20040059885A1 US10/669,784 US66978403A US2004059885A1 US 20040059885 A1 US20040059885 A1 US 20040059885A1 US 66978403 A US66978403 A US 66978403A US 2004059885 A1 US2004059885 A1 US 2004059885A1
Authority
US
United States
Prior art keywords
data
storage device
key data
user data
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/669,784
Inventor
James Farmer
Kent Dickey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US10/669,784 priority Critical patent/US20040059885A1/en
Publication of US20040059885A1 publication Critical patent/US20040059885A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data

Definitions

  • the invention relates in general to data storage access and in particular to data storage access authorization.
  • a common prior art approach to restricting unauthorized access to a storage device involves employing one register for verification of a key value associated with proper authorization to transfer data and a separate register or other storage device for storage of the actual transmitted data, if a transfer is authorized.
  • the key value is generally a stored value which should be matched by an incoming write request in order for the target register or target data storage device to be made accessible or unlocked.
  • FIG. 1 depicts a flowchart 100 for authorization to write to a selected data storage location according a prior art solution.
  • the program generally begins at the start block 101 .
  • the prior art method generally transmits a message to a key register to unlock a target register.
  • the program generally determines whether a response from the key register indicates that authorization to write to the target register has been granted. If such authorization has not been granted, the program generally polls the key register until a response is issued.
  • step 104 If a response granting write authorization is received, data is generally written to the target register in step 104 . Afterward, the program awaits a response indicating that the write of data to the target register has been successfully completed. When a response arrives indicating successful execution of the write to the target register, the program generally writes data to the key register to again lock the target register in step 105 . In step 107 , the program then awaits an indication that the key register has been re-locked.
  • the target register may be written to not only by an intended source but is also vulnerable to being written to by any device in the surrounding computing system, thereby presenting the possibility of data corruption in the target register during the identified window of opportunity.
  • the program upon receiving an indication that the key register has been successfully re-locked, the program concludes at step 108 .
  • the above approach presents certain shortcomings which are outlined below.
  • a communication path to the target data storage device which may be a register, memory location or other storage mechanism, is 64 bits wide, although communication paths of any width could be employed.
  • the communication path preferably includes both user data and key data.
  • user data generally refers to data which the inventive mechanism seeks to store in a target storage device
  • key data generally refers to data employed to establish authorization to store the data in the pertinent storage device
  • packet or “data packet” generally refers to a combination of the user data and key data.
  • the number of bits dedicated to each of user data and key data is variable. For example, where the communication path to the target register is 64 bits wide, 32 bits could be dedicated to user data and 32 bits to key data. Alternative distributions of bits between user data and key data may be employed and all such variations are included within the scope of the present invention.
  • a single storage device and associated controller perform the functions of receiving and storing the user data (if authorized) and establishes authorization for the storage to occur by determining whether the key data portion of the received data packet properly authorizes storage of the user data portion of the received packet.
  • the granting of access to the target device, the writing of user data to the target device, and the restoration of security against unauthorized writing to the target device may preferably be accomplished in single transaction.
  • the user data and key data preferably arrive at the target device simultaneously, there is preferably no window of opportunity within which unauthorized data may be written to the target device.
  • an algorithm for determining the key data involves performing a boolean operation on a selection of the user data bits.
  • the algorithm and the user data bits upon which the algorithm is performed is established both at the microprocessor and at one or more data storage devices which will receive the data packets containing both user data and key data.
  • the algorithm for calculating key data from the user data may be fixed, or dynamically alterable in software or hardware.
  • the various target storage devices may each have unique key data calculation algorithms, or alternatively, two or more target storage devices may share a common key data calculation algorithm, and all such variations are included within the scope of the present invention.
  • FIG. 1 depicts a flowchart for authorization to write to a selected data storage location according a prior art solution
  • FIG. 2 depicts a flowchart for authorizing and writing data to a target storage device according to a preferred embodiment of the present invention
  • FIG. 3 depicts a selection of components suitable for use in the inventive memory protection scheme
  • FIG. 4 depicts an exemplary data packet according to a preferred embodiment of the present invention.
  • FIG. 5 depicts data processing equipment adaptable for use with a preferred embodiment of the present invention.
  • FIG. 2 depicts a flowchart 200 for authorizing and writing data to a target storage device according to a preferred embodiment of the present invention.
  • FIG. 3 generally depicts a simplified arrangement of devices for implementing the inventive memory protection scheme.
  • CPU 301 transmits data to memory controller 302 which preferably performs appropriate analysis of transmitted key data.
  • Memory controller 302 , in turn, then preferably communicates authorized data to memory 303 .
  • any storage device could be substituted for memory 303 and an appropriate controller for an alternative storage device could be inserted in place of memory controller 302 , and all such variations are included in the scope of the present invention.
  • FIG. 4 depicts an exemplary data packet 400 according to a preferred embodiment of the present invention.
  • Data packet 400 preferably includes N bits 401 of which M bits 402 are preferably employed to represent key data intended to enable authorization for writing P bits 403 of user data to the data storage device.
  • N 401 may be any number of bits and M may be any subset of N, meaning that there is generally no fixed number of bits in data packet 400 and no fixed distribution of such bits between user data and key data.
  • key data is generally considered “correct” or “valid” only when such key data properly authorizes user data with which it is associated to be written into the storage location to which data packet 400 was transmitted.
  • the program starts at step 201 .
  • the method preferably transmits data to a data storage device which includes key data to be used to evaluate whether authorization will be granted.
  • a controller associated with the data storage device such as memory controller 302 in FIG. 3, preferably determines whether the key data within the transmitted data is correct (valid). If the key data is correct, the user data portion of the data transmitted in step 202 is preferably written to the data storage device in step 204 . If the key data is not correct, an error is preferably indicated in step 205 . In addition to indicating an error, the controller associated with the data storage device may return the transmitted data to the source of the data along with an indication that the key data was incorrect.
  • data packet 400 (FIG. 4), and therefore user data 403 and key data 402 , is transmitted simultaneously. Such simultaneous transmission preferably operates to remove any time period during which the target storage device is vulnerable to an erroneous data transmission.
  • data packet 400 could be transmitted serially, in which case, although the key data and user data would arrive in close succession, their arrival at a controller for the target storage device would not be simultaneous.
  • an algorithm for determining the key is implemented at the CPU 300 and memory controller 302 .
  • the same algorithm should preferably be employed at CPU 301 as at memory controller 302 so that a properly established key is recognized as such by memory controller 302 .
  • a preferred algorithm for calculating the key data 402 is to perform a boolean operation on a selected number of user bits 403 .
  • P 403 includes more than 6 bits
  • M 402 includes three bits
  • the algorithm could consist of performing a logical AND operation of user data bits 1 , 2 , and 3 with user data bits 4 , 5 , and 6 , respectively.
  • correct key data associated with a user data 403 may be determined having knowledge of the algorithm and the user data itself, thereby removing a need a separate transmission of key data to memory controller 302 .
  • the key data is preferably calculated and added to the user data to form data packet 400 .
  • the memory controller 302 Upon reception at memory controller 302 , the memory controller 302 preferably repeats the calculation of key data 402 based on the user data 403 and compares the key data calculated at the memory controller 302 with the key data 402 included in memory packet 400 .
  • the system response to correct and incorrect key data was described above in connection with FIG. 2 and will therefore not be repeated here. It will be appreciated that a controller for any type of data storage device could be substituted for memory controller 302 in the above discussion.
  • algorithms employed at different storage devices in a complex computing system may either all use the same algorithm or alternatively, each storage device could employ an algorithm specific to that device. Where a plurality of different algorithms are employed, transmitting CPUs would preferably retain access to a log of the algorithms employed at the various different target storage devices. Algorithms employed at the various storage devices may be either fixed or re-programmable. In a simpler alternative approach, a key may be employed which is constant and independent of the user data.
  • FIG. 5 illustrates computer system 500 adaptable for use with a preferred embodiment of the present invention.
  • Central processing unit (CPU) 501 is coupled to system bus 502 .
  • the CPU 501 may be any general purpose CPU, such as an HP PA-8200.
  • Bus 502 is coupled to random access memory (RAM) 503 , which may be SRAM, DRAM, or SDRAM.
  • RAM 503 random access memory
  • ROM 504 is also coupled to bus 502 , which may be PROM, EPROM, or EEPROM.
  • RAM 503 and ROM 504 hold user and system data and programs as is well known in the art.
  • Bus 502 is also coupled to input/output (I/O) adapter 505 , communications adapter card 511 , user interface adapter 508 , and display adapter 509 .
  • I/O adapter 505 connects to storage devices 506 , such as one or more of hard drive, CD drive, floppy disk drive, tape drive, to the computer system.
  • Communications adapter 511 is adapted to couple the computer system 500 to a network 512 , which may be one or more of local (LAN), wide-area (WAN), Ethernet or Internet network.
  • User interface adapter 508 couples user input devices, such as keyboard 513 and pointing device 507 , to the computer system 500 .
  • Display adapter 509 is driven by CPU 501 to control the display on display device 510 .

Abstract

A system and method for protecting memory space in a target storage device during a write operation in a computer system, comprising creating a single data packet, including user data that is to be written to said target storage device and key data that is used to establish authorization to store said user data; transmitting said single data packet to the target storage device; determining whether said key data is valid; writing said user data into said target storage device only when said key data is valid.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of pending U.S. patent application Ser. No. 09/562,595 filed Apr. 29, 2000 entitled “SYSTEM AND METHOD TO PROTECT VITAL MEMORY SPACE FROM NON-MALICIOUS WRITES IN A MULTI DOMAIN SYSTEM.”[0001]
  • FIELD OF THE INVENTION
  • The invention relates in general to data storage access and in particular to data storage access authorization. [0002]
  • BACKGROUND
  • In multi-processor, multi-entity data processing environments, a number of different devices may transmit data to a number of different possible destinations. In this environment, it is possible for a malfunctioning processor or other device to send erroneous data to a number of possible destinations including sensitive data storage areas, such as random access memory and registers. In order to avoid corruption of data in such data storage devices, a mechanism for controlling access to data devices has been implemented in the prior art. [0003]
  • A common prior art approach to restricting unauthorized access to a storage device involves employing one register for verification of a key value associated with proper authorization to transfer data and a separate register or other storage device for storage of the actual transmitted data, if a transfer is authorized. The key value is generally a stored value which should be matched by an incoming write request in order for the target register or target data storage device to be made accessible or unlocked. [0004]
  • FIG. 1 depicts a [0005] flowchart 100 for authorization to write to a selected data storage location according a prior art solution. The program generally begins at the start block 101. At step 102, the prior art method generally transmits a message to a key register to unlock a target register. At step 103 the program generally determines whether a response from the key register indicates that authorization to write to the target register has been granted. If such authorization has not been granted, the program generally polls the key register until a response is issued.
  • If a response granting write authorization is received, data is generally written to the target register in [0006] step 104. Afterward, the program awaits a response indicating that the write of data to the target register has been successfully completed. When a response arrives indicating successful execution of the write to the target register, the program generally writes data to the key register to again lock the target register in step 105. In step 107, the program then awaits an indication that the key register has been re-locked. It will be appreciated that during a “window of vulnerability” in between steps 102 and 106, assuming both steps are successful at their respective tasks, the target register may be written to not only by an intended source but is also vulnerable to being written to by any device in the surrounding computing system, thereby presenting the possibility of data corruption in the target register during the identified window of opportunity. Generally, upon receiving an indication that the key register has been successfully re-locked, the program concludes at step 108. The above approach presents certain shortcomings which are outlined below.
  • It is a problem in the art that three separate transactions are generally conducted in order to temporarily grant access to a usually locked target register. [0007]
  • It is a further problem in the art that there is a period of time (window) between unlocking and re-locking the target register by the key register and during this window, erroneous information could potentially be written to the target register [0008]
  • BRIEF SUMMARY OF THE INVENTION
  • These and other objects, features and technical advantages are achieved by a system and method which incorporates user data to be written to a storage device and key data for establishing authority to write to the storage device into a single data transmission to a single target storage device. This approach preferably enables a protected write operation to be conducted in a single transaction without leaving open a window of opportunity for an erroneous data transmission to corrupt data storage in the target storage device. [0009]
  • In a preferred embodiment, a communication path to the target data storage device, which may be a register, memory location or other storage mechanism, is 64 bits wide, although communication paths of any width could be employed. The communication path preferably includes both user data and key data. Herein, “user data” generally refers to data which the inventive mechanism seeks to store in a target storage device, “key data” generally refers to data employed to establish authorization to store the data in the pertinent storage device, and “packet” or “data packet” generally refers to a combination of the user data and key data. The number of bits dedicated to each of user data and key data is variable. For example, where the communication path to the target register is 64 bits wide, 32 bits could be dedicated to user data and 32 bits to key data. Alternative distributions of bits between user data and key data may be employed and all such variations are included within the scope of the present invention. [0010]
  • In a preferred embodiment, a single storage device and associated controller perform the functions of receiving and storing the user data (if authorized) and establishes authorization for the storage to occur by determining whether the key data portion of the received data packet properly authorizes storage of the user data portion of the received packet. In this manner, the granting of access to the target device, the writing of user data to the target device, and the restoration of security against unauthorized writing to the target device may preferably be accomplished in single transaction. Moreover, since the user data and key data preferably arrive at the target device simultaneously, there is preferably no window of opportunity within which unauthorized data may be written to the target device. [0011]
  • In a preferred embodiment, an algorithm for determining the key data involves performing a boolean operation on a selection of the user data bits. Preferably, the algorithm and the user data bits upon which the algorithm is performed, is established both at the microprocessor and at one or more data storage devices which will receive the data packets containing both user data and key data. Within the various data storage devices, the algorithm for calculating key data from the user data may be fixed, or dynamically alterable in software or hardware. Where a plurality target storage devices are employed in conjunction with one or more processors, the various target storage devices may each have unique key data calculation algorithms, or alternatively, two or more target storage devices may share a common key data calculation algorithm, and all such variations are included within the scope of the present invention. [0012]
  • Therefore, it is an advantage of a preferred embodiment of the present invention that device access control operations and the writing of user data may be accomplished in a single write transaction. [0013]
  • It is a further advantage of a preferred embodiment of the present invention that the simultaneous arrival at the target device of user data and key data removes any window of opportunity within which erroneous data may overwrite data in the target storage device. [0014]
  • The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention. [0015]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawing, in which: [0016]
  • FIG. 1 depicts a flowchart for authorization to write to a selected data storage location according a prior art solution; [0017]
  • FIG. 2 depicts a flowchart for authorizing and writing data to a target storage device according to a preferred embodiment of the present invention; [0018]
  • FIG. 3 depicts a selection of components suitable for use in the inventive memory protection scheme; [0019]
  • FIG. 4 depicts an exemplary data packet according to a preferred embodiment of the present invention; and [0020]
  • FIG. 5 depicts data processing equipment adaptable for use with a preferred embodiment of the present invention.[0021]
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 2 depicts a [0022] flowchart 200 for authorizing and writing data to a target storage device according to a preferred embodiment of the present invention. FIG. 3 generally depicts a simplified arrangement of devices for implementing the inventive memory protection scheme. In FIG. 3, CPU 301 transmits data to memory controller 302 which preferably performs appropriate analysis of transmitted key data. Memory controller 302, in turn, then preferably communicates authorized data to memory 303. It will be appreciated that any storage device could be substituted for memory 303 and an appropriate controller for an alternative storage device could be inserted in place of memory controller 302, and all such variations are included in the scope of the present invention.
  • FIG. 4 depicts an [0023] exemplary data packet 400 according to a preferred embodiment of the present invention. Data packet 400 preferably includes N bits 401 of which M bits 402 are preferably employed to represent key data intended to enable authorization for writing P bits 403 of user data to the data storage device. N 401 may be any number of bits and M may be any subset of N, meaning that there is generally no fixed number of bits in data packet 400 and no fixed distribution of such bits between user data and key data. Herein, key data is generally considered “correct” or “valid” only when such key data properly authorizes user data with which it is associated to be written into the storage location to which data packet 400 was transmitted.
  • Returning to FIG. 2, the program starts at [0024] step 201. At step 202, the method preferably transmits data to a data storage device which includes key data to be used to evaluate whether authorization will be granted. At step 203, a controller associated with the data storage device, such as memory controller 302 in FIG. 3, preferably determines whether the key data within the transmitted data is correct (valid). If the key data is correct, the user data portion of the data transmitted in step 202 is preferably written to the data storage device in step 204. If the key data is not correct, an error is preferably indicated in step 205. In addition to indicating an error, the controller associated with the data storage device may return the transmitted data to the source of the data along with an indication that the key data was incorrect.
  • In a preferred embodiment, all of data packet [0025] 400 (FIG. 4), and therefore user data 403 and key data 402, is transmitted simultaneously. Such simultaneous transmission preferably operates to remove any time period during which the target storage device is vulnerable to an erroneous data transmission. In an alternative embodiment, data packet 400 could be transmitted serially, in which case, although the key data and user data would arrive in close succession, their arrival at a controller for the target storage device would not be simultaneous.
  • In a preferred embodiment, an algorithm for determining the key is implemented at the [0026] CPU 300 and memory controller 302. The same algorithm should preferably be employed at CPU 301 as at memory controller 302 so that a properly established key is recognized as such by memory controller 302. A preferred algorithm for calculating the key data 402 is to perform a boolean operation on a selected number of user bits 403.
  • In an exemplary case, [0027] P 403 includes more than 6 bits, and M 402 includes three bits, the algorithm could consist of performing a logical AND operation of user data bits 1, 2, and 3 with user data bits 4, 5, and 6, respectively. With this approach, correct key data associated with a user data 403 may be determined having knowledge of the algorithm and the user data itself, thereby removing a need a separate transmission of key data to memory controller 302. Once the user data is identified at CPU 301, the key data is preferably calculated and added to the user data to form data packet 400. Upon reception at memory controller 302, the memory controller 302 preferably repeats the calculation of key data 402 based on the user data 403 and compares the key data calculated at the memory controller 302 with the key data 402 included in memory packet 400. The system response to correct and incorrect key data was described above in connection with FIG. 2 and will therefore not be repeated here. It will be appreciated that a controller for any type of data storage device could be substituted for memory controller 302 in the above discussion.
  • It will be appreciated that the above approach is but one way to determine an algorithm for calculating key data and that numerous others may be practiced without departing from the scope of the present invention. Other data from which key data may be calculated includes but is not limited to: system clock settings, and memory address locations to which user data is directed. Alternatively, a key may be employed which is constant and not dependent upon a data source or an algorithm. [0028]
  • In a preferred embodiment, algorithms employed at different storage devices in a complex computing system may either all use the same algorithm or alternatively, each storage device could employ an algorithm specific to that device. Where a plurality of different algorithms are employed, transmitting CPUs would preferably retain access to a log of the algorithms employed at the various different target storage devices. Algorithms employed at the various storage devices may be either fixed or re-programmable. In a simpler alternative approach, a key may be employed which is constant and independent of the user data. [0029]
  • FIG. 5 illustrates [0030] computer system 500 adaptable for use with a preferred embodiment of the present invention. Central processing unit (CPU) 501 is coupled to system bus 502. The CPU 501 may be any general purpose CPU, such as an HP PA-8200. However, the present invention is not restricted by the architecture of CPU 501 as long as CPU 501 supports the inventive operations as described herein. Bus 502 is coupled to random access memory (RAM) 503, which may be SRAM, DRAM, or SDRAM. ROM 504 is also coupled to bus 502, which may be PROM, EPROM, or EEPROM. RAM 503 and ROM 504 hold user and system data and programs as is well known in the art.
  • [0031] Bus 502 is also coupled to input/output (I/O) adapter 505, communications adapter card 511, user interface adapter 508, and display adapter 509. I/O adapter 505 connects to storage devices 506, such as one or more of hard drive, CD drive, floppy disk drive, tape drive, to the computer system. Communications adapter 511 is adapted to couple the computer system 500 to a network 512, which may be one or more of local (LAN), wide-area (WAN), Ethernet or Internet network. User interface adapter 508 couples user input devices, such as keyboard 513 and pointing device 507, to the computer system 500. Display adapter 509 is driven by CPU 501 to control the display on display device 510.
  • Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps. [0032]

Claims (20)

What is claimed is:
1. A method for protecting memory space in a target storage device during a write operation in a computer system, the method comprising:
creating a single data packet, including user data that is to be written to said target storage device and key data that is used to establish authorization to store said user data;
transmitting said single data packet to the target storage device;
determining whether said key data is valid;
writing said user data into said target storage device only when said key data is, valid.
2. The method of claim 1 further comprising:
calculating key data based on said gathered user data; and
combining said gathered user data and said calculated key data to form said composed single data packet.
3. The method of claim 1 further comprising:
performing a boolean operation on selected bits of said user data to generate said key data.
4. The method of claim 1 further comprising:
generating verification data from said user data at a controller of said target storage device; and
comparing said key data in said single data packet with said verification data to determine if said key data matches said verification data.
5. The method of claim 4 further comprising:
storing said user data to said target storage device if said key data matches said verification data.
6. The method of claim 1 further comprising:
generating key data based on a destination address of said write operation.
7. The method of claim 1 further comprising:
generating key data based on a system clock setting of said computer system.
8. A system for conducting a protected memory write to a storage device in a single transaction within a computer system, the system comprising:
means for simultaneously delivering user data and key data to a controller of said storage device, wherein said user data is to be written to said storage device and said key data is used to establish authorization to store said user data; and
means for determining whether said key data authorizes writing said user data to said storage device.
9. The system of claim 8 further comprising:
means for writing said user data to said storage device only when said key data authorizes writing said user data.
10. The system of claim 8 further comprising:
means, at an originating device, for calculating said key data using an algorithm before said user data and said key data is sent to said storage device.
11. The system of claim 10 wherein said algorithm calculates said key data from said user data.
12. The system of claim 8 wherein said determining means further comprises:
means for generating verification data at said storage device controller; and
means for comparing said verification data to said key data.
13. The system of claim 8 wherein said determining means further comprises:
means for authorizing writing of said user data only where said verification data matches said key data.
14. The system of claim 11 wherein said algorithm calculates said key data based on a clock setting of said computer system.
15. A computer program product having a computer readable medium having computer program logic recorded thereon for protecting memory space in a target storage device during a write operation in a computer system, the computer program product comprising:
code for composing a single data packet including user data and key data, wherein said user data is to be written to said target storage device and said key data is used to establish authorization to store said user data;
code for transmitting said single data packet to said target storage device; and
code for determining whether said key data is valid.
16. The computer program product of claim 15 further comprising:
code for writing said user data into said target storage device only when said key data is valid.
17. The computer program product of claim 15 wherein the code for composing comprises:
code for gathering user data for transmission to said target storage device;
code for calculating key data based on said gathered user data; and
code for combining said gathered user data and said calculated key data to form said composed single data packet.
18. The computer program product of claim 17 wherein the code for calculating comprises:
code for performing a boolean operation on selected bits of said user data to generate said key data.
19. The computer program product of claim 17 wherein the code for determining comprises:
code for generating verification key data from said user data at a controller of said target storage device; and
code for establishing said calculated key data as valid only if said generated verification key data matches said key data included in said single data packet.
20. The computer program product of claim 19 wherein said the code for generating verification data comprises:
code for repeating said step of calculating key data at said controller of said target storage device.
US10/669,784 2000-04-29 2003-09-24 System and method to protect vital memory space from non-malicious writes in a multi domain system Abandoned US20040059885A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US10/669,784 US20040059885A1 (en) 2000-04-29 2003-09-24 System and method to protect vital memory space from non-malicious writes in a multi domain system

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/562,595 US6473844B1 (en) 2000-04-29 2000-04-29 System and method to protect vital memory space from non-malicious writes in a multi domain system
US10/247,098 US6658543B2 (en) 2000-04-29 2002-09-19 System and method to protect vital memory space from non-malicious writes in a multi domain system
US10/669,784 US20040059885A1 (en) 2000-04-29 2003-09-24 System and method to protect vital memory space from non-malicious writes in a multi domain system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/247,098 Continuation US6658543B2 (en) 2000-04-29 2002-09-19 System and method to protect vital memory space from non-malicious writes in a multi domain system

Publications (1)

Publication Number Publication Date
US20040059885A1 true US20040059885A1 (en) 2004-03-25

Family

ID=24246921

Family Applications (3)

Application Number Title Priority Date Filing Date
US09/562,595 Expired - Fee Related US6473844B1 (en) 2000-04-29 2000-04-29 System and method to protect vital memory space from non-malicious writes in a multi domain system
US10/247,098 Expired - Lifetime US6658543B2 (en) 2000-04-29 2002-09-19 System and method to protect vital memory space from non-malicious writes in a multi domain system
US10/669,784 Abandoned US20040059885A1 (en) 2000-04-29 2003-09-24 System and method to protect vital memory space from non-malicious writes in a multi domain system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US09/562,595 Expired - Fee Related US6473844B1 (en) 2000-04-29 2000-04-29 System and method to protect vital memory space from non-malicious writes in a multi domain system
US10/247,098 Expired - Lifetime US6658543B2 (en) 2000-04-29 2002-09-19 System and method to protect vital memory space from non-malicious writes in a multi domain system

Country Status (1)

Country Link
US (3) US6473844B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060031632A1 (en) * 2004-08-05 2006-02-09 M-Systems Flash Disk Pioneers, Ltd. Storage with persistent user data

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6473844B1 (en) * 2000-04-29 2002-10-29 Hewlett-Packard Company System and method to protect vital memory space from non-malicious writes in a multi domain system
GB2385956B (en) * 2002-03-01 2004-06-02 3Com Corp Key based register locking mechanism
KR100619657B1 (en) * 2002-06-05 2006-09-08 후지쯔 가부시끼가이샤 Memory managing unit, code verifying device, and code decoder

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4255811A (en) * 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system
US4396914A (en) * 1980-07-01 1983-08-02 Scovill Inc. Electronic security device
US4597061A (en) * 1983-01-03 1986-06-24 Texas Instruments Incorporated Memory system using pipeline circuitry for improved speed
US4604727A (en) * 1983-08-31 1986-08-05 Texas Instruments Incorporated Memory with configuration RAM
US4665506A (en) * 1983-01-03 1987-05-12 Texas Instruments Incorporated Memory system with write protection
US4918728A (en) * 1989-08-30 1990-04-17 International Business Machines Corporation Data cryptography operations using control vectors
US4933969A (en) * 1987-03-03 1990-06-12 Hewlett-Packard Company Data authentication and protection system
US5268962A (en) * 1992-07-21 1993-12-07 Digital Equipment Corporation Computer network with modified host-to-host encryption keys
US5692178A (en) * 1992-08-20 1997-11-25 Borland International, Inc. System and methods for improved file management in a multi-user environment
US5915025A (en) * 1996-01-17 1999-06-22 Fuji Xerox Co., Ltd. Data processing apparatus with software protecting functions
US6081785A (en) * 1995-10-09 2000-06-27 Matsushita Electric Industrial Co., Ltd. Optical disk, optical recorder, optical reproducer, crytocommunication system and program license system
US6151689A (en) * 1992-12-17 2000-11-21 Tandem Computers Incorporated Detecting and isolating errors occurring in data communication in a multiple processor system
US6212610B1 (en) * 1998-01-07 2001-04-03 Fujitsu Limited Memory protection mechanism for a distributed shared memory multiprocessor with integrated message passing support
US6473844B1 (en) * 2000-04-29 2002-10-29 Hewlett-Packard Company System and method to protect vital memory space from non-malicious writes in a multi domain system

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4255811A (en) * 1975-03-25 1981-03-10 International Business Machines Corporation Key controlled block cipher cryptographic system
US4396914A (en) * 1980-07-01 1983-08-02 Scovill Inc. Electronic security device
US4597061B1 (en) * 1983-01-03 1998-06-09 Texas Instruments Inc Memory system using pipleline circuitry for improved system
US4597061A (en) * 1983-01-03 1986-06-24 Texas Instruments Incorporated Memory system using pipeline circuitry for improved speed
US4665506A (en) * 1983-01-03 1987-05-12 Texas Instruments Incorporated Memory system with write protection
US4604727A (en) * 1983-08-31 1986-08-05 Texas Instruments Incorporated Memory with configuration RAM
US4933969A (en) * 1987-03-03 1990-06-12 Hewlett-Packard Company Data authentication and protection system
US4918728A (en) * 1989-08-30 1990-04-17 International Business Machines Corporation Data cryptography operations using control vectors
US5268962A (en) * 1992-07-21 1993-12-07 Digital Equipment Corporation Computer network with modified host-to-host encryption keys
US5692178A (en) * 1992-08-20 1997-11-25 Borland International, Inc. System and methods for improved file management in a multi-user environment
US6151689A (en) * 1992-12-17 2000-11-21 Tandem Computers Incorporated Detecting and isolating errors occurring in data communication in a multiple processor system
US6081785A (en) * 1995-10-09 2000-06-27 Matsushita Electric Industrial Co., Ltd. Optical disk, optical recorder, optical reproducer, crytocommunication system and program license system
US6301569B1 (en) * 1995-10-09 2001-10-09 Matsushita Electric Industrial Co., Ltd. Optical disk, optical recorder, optical reproducer, cryptocommunication system and program license system
US5915025A (en) * 1996-01-17 1999-06-22 Fuji Xerox Co., Ltd. Data processing apparatus with software protecting functions
US6212610B1 (en) * 1998-01-07 2001-04-03 Fujitsu Limited Memory protection mechanism for a distributed shared memory multiprocessor with integrated message passing support
US6473844B1 (en) * 2000-04-29 2002-10-29 Hewlett-Packard Company System and method to protect vital memory space from non-malicious writes in a multi domain system
US6658543B2 (en) * 2000-04-29 2003-12-02 Hewlett-Packard Development Company, L.P. System and method to protect vital memory space from non-malicious writes in a multi domain system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060031632A1 (en) * 2004-08-05 2006-02-09 M-Systems Flash Disk Pioneers, Ltd. Storage with persistent user data
US8275969B2 (en) * 2004-08-05 2012-09-25 Sandisk Il Ltd. Storage with persistent user data

Also Published As

Publication number Publication date
US6658543B2 (en) 2003-12-02
US6473844B1 (en) 2002-10-29
US20030018866A1 (en) 2003-01-23

Similar Documents

Publication Publication Date Title
AU730253B2 (en) Method and apparatus for operating resources under control of a security module or other secure processor
US8843767B2 (en) Secure memory transaction unit
US8839001B2 (en) Infinite key memory transaction unit
US5109413A (en) Manipulating rights-to-execute in connection with a software copy protection mechanism
EP1318456B1 (en) Electronic apparatus and debug authorization method
US20030093698A1 (en) System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
US5875248A (en) Method of counterfeit detection of electronic data stored on a device
CN114450918B (en) Memory device having regions with individually programmable security access features
US8146154B2 (en) Method and system for using shared secrets to protect access to testing keys for set-top box
NO309887B1 (en) Secure memory card
CN110825672B (en) High performance autonomous hardware engine for online encryption processing
CN101006433A (en) Information communication device, and program execution environment control method
CN108958649A (en) A kind of security isolation method and device for storage system
EP2990953B1 (en) Periodic memory refresh in a secure computing system
US20230018185A1 (en) Obfuscating data at-transit
US20090254761A1 (en) Secure data processing method and associated device
CN107659402A (en) A kind of transaction data endorsement method, device and the medium of digital encryption currency
US6658543B2 (en) System and method to protect vital memory space from non-malicious writes in a multi domain system
US20150363334A1 (en) Speculative cryptographic processing for out of order data
US20030191943A1 (en) Methods and arrangements to register code
WO2017163204A1 (en) A memory management system and method
US11809610B2 (en) Hardware protection of inline cryptographic processor
US9652232B2 (en) Data processing arrangement and method for data processing
US20040059948A1 (en) Computer system connected to a data communications network
WO1998003903A2 (en) Method and apparatus for operating resources under control of a security module or other secure processor

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION